{"id":3865,"date":"2015-07-27T15:26:30","date_gmt":"2015-07-27T20:26:30","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=3865"},"modified":"2015-07-14T14:20:40","modified_gmt":"2015-07-14T19:20:40","slug":"ssl-and-beyond-part-3-securing-the-future","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/ssl-and-beyond-part-3-securing-the-future\/","title":{"rendered":"SSL And Beyond, Part 3: Securing the Future"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva,sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3934\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/ssl-securing-the-future-post.png\" alt=\"SSL - Securing the Future - post\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/ssl-securing-the-future-post.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/ssl-securing-the-future-post-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\"><span style=\"color: #808080;\">In our previous installment, we considered how the various kinds of <a href=\"\/blog\/ssl-and-beyond-part-2-compatibility-deployment-across-the-board\/\">SSL certificate are deemed compatible<\/a> with a range of web browsers, applications, and operating environments.<\/span><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">To conclude this series, we\u2019ll look at how SSL and TLS may be deployed in the future, and the spread of SSL\/TLS-based encryption into the mainstream.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>Why Should SSL Matter to Me?<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">These days, everyone with an internet connection transmits sensitive information of one kind or another. With personal data, credit card details and the like moving through unsecured channels, it\u2019s no longer just big corporations and governments that have to worry about some or all of that information being intercepted by unscrupulous third parties.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Information is most vulnerable when it\u2019s moving between systems, and the encryption offered by SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) is currently the best defense for that data while it\u2019s in transit.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>The Scope of The Threat<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">The allegations raised by the <a href=\"\/blog\/is-your-network-being-monitored-by-the-nsa\/\">whistleblower Edward Snowden<\/a> in 2013 \u00ad\u2013 that government intelligence agencies across the globe were and are gathering reams of sensitive data from the phone and email communications of rival agencies, corporate bodies, and citizens alike \u2013 brought the security problem to light.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Ciphertext or encrypted data from emails and digital communications was included in the haul of intercepted information, along with the metadata from mobile phone calls. Though it would be tough to crack the encryption used in these messages now, an organization with time on its hands may gain hold of the keys needed to decrypt it in the months or years to come.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">But there\u2019s more to it than that. Cybercriminals continue to target individuals and organizations using a variety of techniques:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">\u00a0 \u2022 False links, <a href=\"\/blog\/are-malware-threats-making-antivirus-software-obsolete\/\">spam emails and phishing<\/a> attempts are used to lure people to fake websites that are deliberately designed to look like the real sites that people normally visit.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">\u00a0 \u2022 So-called \u201cman-in-the-middle attacks\u201d occur when information moving between clients and web servers is intercepted and used to <a href=\"\/blog\/understanding-a-ddos-attack\/\">steal login details<\/a> and user accounts.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">\u00a0 \u2022 Domains can be \u201c<a href=\"\/blog\/why-is-network-security-important\/\">spoofed<\/a>\u201d or tampered with, allowing cybercriminals to monitor exchanges and send emails to targeted users.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">\u00a0 \u2022 Using various ruses (email attachments, booby-trapped links, etc.), malware can be installed on a targeted system, unwittingly turning it into a bot, which may be used in the activities of criminal networks.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">For an organization, the damage from falling victim to these attacks may extend to a loss in consumer confidence and an erosion of trust in the validity of their website.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>The Zero Trust Model (ZTM)<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">ZTM is a network security strategy first proposed by analyst John Kindervag of Forrester Research. As its name suggests, the Zero Trust Model presumes that each element of a network distrusts every other element. All data passing between devices is assumed to have slipped through whatever security nets are in place.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">So at each stage, it\u2019s imperative that data which is being transmitted should be secured as it\u2019s in transit. Which means SSL or TLS comes into play.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">In the ZTM, a so-called \u201cnetwork segmentation gateway\u201d regulates device availability and security over a web of high-speed links giving access to various zones of the network. Each device must gain insights into packet data, and have access to application layers. This data must first be decrypted, and then encrypted again, once the device has done its job. This re-encryption of SSL data is gaining popularity in wider circles.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>Certified Truths<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">SSL and its visible signs are indicators of trust to the user community.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">The HTTP Secure (HTTPS) protocol merges the standard HTTP with Secure Sockets Layer, and presents in the address bar of a user\u2019s browser. Behind the scenes, the \u201chttps\u201d prefix results from a website having been authenticated on presentation of a valid SSL certificate. Moreover, communications between its server and a client\u2019s machine are being securely encrypted.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">A green coloring on the first part of an address bar denotes the use of an Extended Validation (or EV) SSL certificate, by the web server. This indicates that the site owner has gone the extra mile to ensure confidence by submitting their organization to more intensive vetting and validation procedures. These guidelines have been laid down by the CA\/B Forum.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">An EV-certified site will also display more information about the business verified to use that web address, and the Certification Authority (CA) which issued the certificate.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>Watching the Watchmen<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">CAs aren\u2019t perfect, and may need help to maintain a strong measure of SSL security. The Open Web Application Security Project (OWASP) publishes a best practices guide, for SSL operations. Among their recommendations are diligent hardware monitoring and network security measures, methods of authenticating the ownership of domains, ensuring regular independent audits, and the use of hardware-based systems for signing SSL certificates cryptographically.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">For system administrators, the SSL Labs project provides tools for testing and evaluating the security of websites and their associated servers. Part of their focus is on making sure ciphertext remains unreadable long into the future, and best practices for protecting and storing encryption keys.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>The Future Perfect<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\"><a href=\"\/blog\/perfect-forward-security-and-ssl-encryption\/\" target=\"_blank\">Perfect Forward Secrecy (PFS)<\/a> is a passive surveillance feature recently added to SSL that puts an extra layer of security on the exchange of messages when a client and server try to establish their encryption key protocol. PFS can be activated by a cryptographic cipher contained within the SSL termination device. Once set, it becomes very difficult for a hacker to gain access to the key needed to decrypt any previous communications.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>Some Government Backing<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><span style=\"color: #808080;\">In March 2015, the Obama administration announced<\/span> <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/info.ssl.com\/white-house-agrees-with-ssl-com-cost-of-https-worth-the-benefits\/\" target=\"_blank\" rel=\"nofollow\">a proposal for SSL<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span> <span style=\"color: #808080;\">to become standard practice for federal websites. \u201cThe HTTPS-Only Standard\u201d initiative was issued by the CIO Council (a think tank composed of the CIOs of various federal institutions), and will (if it becomes law) \u201crequire the use of HTTPS on all publicly accessible Federal websites and web services\u201d.<\/span><\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>HTTPS Everywhere? Not yet\u2026<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">In 2010, the Tor Project and the Electronic Frontier Foundation produced a browser plugin dubbed \u201cHTTPS Everywhere\u201d, initially a Firefox extension. Once installed, the utility would automatically select the encrypted (\u201chttps\u201d) version of any website you visited if one was available. This meant secure browsing with reduced hassle.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Sadly, the major manufacturers have yet to include this behavior as standard in their browsers.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>HSM: Guarding Against Heartbleed<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">In 2014, a serious error in the \u201cheartbeat\u201d code of the popular OpenSSL software library was uncovered. Dubbed \u201cHeartbleed\u201d, it had the potential to quietly feed the contents of a device\u2019s memory to a malicious user. At the time of its discovery, Heartbleed had been in place for over two years \u2013 enough time for private encryption keys and administrator login details to have been siphoned off much of the web.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">From then until now, SSL users who employ FIPS 140-2 Hardware Security Modules (HSMs) were safe. An HSM is built around a cryptographic core and an encryption key store, as a separate hardware and software layer of added security. Keys are confined to the store (not transferred into memory on a network host), and are <a href=\"\/blog\/the-heartbleed-bug-pa-product-upgrades\/\" target=\"_blank\">not vulnerable to Heartbleed<\/a> leaks.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Though they can be expensive, HSMs are now being used as centralized key stores, making encryption services available across an organization\u2019s internal network. Network-attached HSMs (netHSMs) are active in remote data centers and private clouds, allowing decryption services to be ported across the global reach of an enterprise.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Public netHSM (a.k.a. CloudHSM) devices are increasingly being deployed on public clouds, often in conjunction with Application Delivery Controllers, to filter encryption requests between them.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>\u2018Freak\u2019 Shows\u2026<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Hot on the heels of the <a href=\"\/blog\/heartbleed-bug-are-you-affected\/\" target=\"_blank\">Heartbleed<\/a>, <a href=\"\/blog\/shellshock-vulnerability-worse-than-heartbleed\/\" target=\"_blank\">Shellshock<\/a> and <a href=\"http:\/\/whatis.techtarget.com\/definition\/POODLE-attack\" target=\"_blank\" rel=\"nofollow\">Poodle<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> scares, many organizations invested heavily in the Linux Foundation, whose OpenSSL provides a variant on the original SSL technology. The \u201cFreak\u201d bug, which later came to light, threw even this alternative into doubt. But it\u2019s not as bad as all that.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Freak affects Apple\u2019s Safari browser on the iPhone, iPad, desktop Macintosh, and on the internal browser supplied with Android systems. Firefox, Internet Explorer and Google Chrome are unaffected however. As so many users have more than one browser installed, the actual risk of their data being intercepted in transit is low. Existing SSL certificates will not have been compromised and remain valid.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.cbronline.com\/news\/cybersecurity\/data\/what-freak-means-for-the-future-of-ssl-encryption-4526471\" target=\"_blank\" rel=\"nofollow\">The Freak incident demonstrates<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span> <span style=\"color: #808080;\">the importance of having alternatives, and can teach us other lessons as well.<\/span><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">The bug derives from the U.S. government\u2019s long-standing policy of imposing restrictions on the export of strong encryption technology. When SSL emerged in the 1990s, it was limited by law to an encryption key length of 512 bits. Freak allows some browsers and web servers to downgrade their encryption strength until a client can make a connection.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">The problem is exacerbated by web server configurations, which allow the use of so-called export grade (i.e. lower strength) encryption ciphers. These often tend to be called into action by older machines running legacy versions of browsers. As we move into the future, the trend should be towards increasing levels of encryption strength \u2013 and making encryption facilities more widely available.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>Consider the Cloud<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">An organization using the <a href=\"\/blog\/the-future-of-data-centres\/\" target=\"_blank\">cloud for data<\/a> and application storage needs to ensure the safety of its data in transit. Credit card details, health records, and sensitive personal information require protection if they\u2019re to be moved off site. SSL\/TLS encryption and validation can address some of these concerns, but there are issues specific to cloud service provision that have to be considered.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Service level agreements (SLAs) need to specify that the cloud provider should use SSL encryption \u2013 preferably strong 128-bit or higher. There are also requirements for regulatory compliance, especially where secure e-commerce transactions are concerned.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">SSL certificates may need to cover multiple domains under a single IP address, and allow for frequent updates, as cloud applications evolve and storage needs change. Cloud service providers must also be affiliated with trusted Certification Authorities, which will not issue certificates to servers in prohibited countries or store data in web servers located in those areas.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>The \u201cLet\u2019s Encrypt\u201d Initiative <\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">This is an online resource, a free, open, and automated Certification Authority, backed by the Internet Security Research Group (ISRG), a public benefit corporation based in California. The \u201cLet\u2019s Encrypt\u201d Initiative was launched by the Electronic Frontier Foundation, a non-profit organization and digital rights advocacy.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Purchasing a strong and legitimate SSL certificate may be beyond the means of individuals and small businesses. Setting one up can prove just as daunting. Even IT professionals in large firms can expect to spend at least an hour referring back to Google and all the sources necessary for certificate validation. Then there\u2019s certificate maintenance and renewal.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/letsencrypt.org\/howitworks\/\" target=\"_blank\" rel=\"nofollow\">\u201cLet\u2019s Encrypt\u201d<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span> <span style=\"color: #808080;\">installs as a small utility in your web server. Its back end contains a full Certification Authority. The procedure for generating and installing an SSL certificate takes about twenty seconds or less. And the utility renews and manages certificates automatically.<\/span><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">The initiative is due to launch in \u201cmid-2015\u201d (that\u2019s any time from now), and already has strong backing from a consortium that includes Cisco and Mozilla.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>ACME (Automated Certificate Management Environment): No Joke<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">Though it sounds like something from a Road Runner cartoon, the Automated Certificate Management Environment (ACME) is an integral part of and partner to the \u201cLet\u2019s Encrypt\u201d initiative. It\u2019s a protocol dedicated to setting up an HTTPS server and acquiring a 99+% browser-compatible SSL certificate without human intervention. ACME achieves this by establishing a certificate management agent on your web server.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">On the server, your Let\u2019s Encrypt-compatible (ACME) management agent first proves to the Certification Authority that your server actually controls a legitimate domain. A set of challenges are issued from the CA to verify this. Once validated, the agent can request new SSL certificates and renew them and revoke them as required.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><span style=\"color: #808080;\">The push from \u201cLet\u2019s Encrypt\u201d and ACME is<\/span> <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.privateinternetaccess.com\/blog\/2015\/01\/why-effs-lets-encrypt-initiative-is-more-important-than-it-seems\/\" target=\"_blank\" rel=\"nofollow\">towards simplicity<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span>. <span style=\"color: #808080;\">If obtaining certificates for SSL encryption is made less complex then more people will be inclined to do it.<\/span><\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>Impetus From Google<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">In August 2014, Google announced a change in its criteria for search rankings. Sites with <a href=\"\/help\/sslhints\/\">valid SSL certification<\/a> and HTTPS will now be placed higher on their lists.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/blog.searchmetrics.com\/us\/2015\/03\/03\/https-vs-http-website-ssl-tls-encryption-ranking-seo-secure-connection\/\" target=\"_blank\" rel=\"nofollow\">The policy will be phased<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span> <span style=\"color: #808080;\">in gradually. At present, less than 5% of websites have achieved the HTTPS status needed to be bumped up the charts. But Google seems to be indicating that its filtering process will increase in strength and scope as time goes on.<\/span><\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif; color: #ff6600;\"><b>SSL Everywhere?<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif; color: #808080;\">That\u2019s the plan. And if the \u201cLet\u2019s Encrypt\u201d Initiative rolls out fully this year, we may see it start coming together.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our previous installment, we considered how the various kinds of SSL certificate are deemed compatible with a range of web browsers, applications, and operating environments. To conclude this series, we\u2019ll look at how SSL and TLS may be deployed in the future, and the spread of SSL\/TLS-based encryption into the mainstream. Why Should SSL [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":3932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-3865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=3865"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3865\/revisions"}],"predecessor-version":[{"id":3965,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3865\/revisions\/3965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/3932"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=3865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=3865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=3865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}