{"id":85698,"date":"2017-08-18T13:38:11","date_gmt":"2017-08-18T08:08:11","guid":{"rendered":"https:\/\/fossbytes.com\/?p=85698"},"modified":"2017-08-18T13:58:06","modified_gmt":"2017-08-18T08:28:06","slug":"usb-data-leakage","status":"publish","type":"post","link":"https:\/\/fossbytes.com\/usb-data-leakage\/","title":{"rendered":"Your &#8220;Innocent&#8221; USB Port Could Be Leaking Personal Data To Hackers"},"content":{"rendered":"<p><em><strong>Short Bytes:<\/strong> The USB ports on your laptop or desktop computer can be used to steal your sensitive information. According to a latest finding by the researchers at the University of Adelaide, a &#8216;safe&#8217; port can leak data to a compromised USB device connected to an adjacent port. The researchers have advised the users to avoid connecting random and unsafe USB drives to their computer to stay safe from USB data leakage.<\/em><\/p>\n<span class=\"su-dropcap su-dropcap-style-flat\" style=\"font-size:1.5em\">A<span style=\"color: #333333;\"><\/span>s\u00a0t<\/span>heir name suggests, USB connections are the most common communication interface being used by different devices. They come in different form factors and capabilities to make our lives easier. But, surprisingly, the same USB interface is vulnerable to information leakage.<\/p>\n<p><a href=\"https:\/\/www.adelaide.edu.au\/news\/news94082.html\" rel=\"nofollow\">According to an Australian research<\/a>, your USB ports might be leaking personal information. The researchers at the University of Adelaide tested more than 50 computers and USB hubs to infer that about 90% of them were leaking information to an external USB device.<\/p>\n<p>One can imagine different scenarios like USB-connected keyboards, fingerprint readers, card swipers, etc. Earlier, it was thought that information is just passed to the computer, and it&#8217;s protected from compromised devices. However, the research showed that if a compromised device is plugged into another USB port on same device or hub, it can be used to steal sensitive information.<\/p>\n<p>The researchers say that one can understand the process with \u2018channel-to-channel crosstalk leakage\u2019 analogy of water pipes. This way, keystrokes with passwords and personal data can be stolen.<\/p>\n<p>In the past, we&#8217;ve come across researches that indicate that if a USB stick is dropped somewhere, in 75% cases, they are picked up and plugged into a computer. This human behavior can be exploited to spread malware and steal data using USB data leakage. You can also read our article on &#8220;<a href=\"https:\/\/fossbytes.com\/stray-random-usb-drive-dont-use-laptop\/\" target=\"_blank\" rel=\"noopener noreferrer\">why you shouldn&#8217;t use a random USB drive?<\/a>&#8221;<\/p>\n<p>\u201cThe USB has been designed under the assumption that everything connected is under the control of the user and that everything is trusted \u2013 but we know that\u2019s not the case,&#8221; <a href=\"https:\/\/www.adelaide.edu.au\/news\/news94082.html\">Dr. Yuval Yarom<\/a>, Research Associate with the University of Adelaide said. So, you are advised to avoid picking up random USB drives and connecting them to your PC.<\/p>\n<p>Did you find this article on USB data leakage helpful? Don&#8217;t forget to share your views with us.<\/p>\n<p><strong>Bonus Video:<\/strong><\/p>\n<p>https:\/\/youtu.be\/a81p79WTdkQ<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Short Bytes: The USB ports on your laptop or desktop computer can be used to steal&#8230;<\/p>\n","protected":false},"author":2,"featured_media":85701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ub_ctt_via":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[35,1831],"tags":[12919,1310,12918,2421,12920],"class_list":["post-85698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-data-leakage","tag-usb","tag-usb-data-leakage","tag-usb-drive","tag-usb-hack"],"featured_image_src":"https:\/\/fossbytes.com\/wp-content\/uploads\/2017\/08\/usb-port-data-leak.jpg","author_info":{"display_name":"Adarsh Verma","author_link":"https:\/\/fossbytes.com\/author\/adarsh\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.5 (Yoast SEO v21.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your &quot;Innocent&quot; USB Port Could Be Leaking Personal Data To Hackers<\/title>\n<meta name=\"description\" content=\"According to a latest finding by the researchers at University of Adelaide, a &#039;safe&#039; port can leak data to a compromised USB device connected to an adjacent port.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fossbytes.com\/usb-data-leakage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your &quot;Innocent&quot; USB Port Could Be Leaking Personal Data To Hackers\" \/>\n<meta property=\"og:description\" content=\"According to a latest finding by the researchers at University of Adelaide, a &#039;safe&#039; port can leak data to a compromised USB device connected to an adjacent port.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fossbytes.com\/usb-data-leakage\/\" \/>\n<meta property=\"og:site_name\" content=\"Fossbytes\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fossbytes\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/avis.blue\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-18T08:08:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-18T08:28:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fossbytes.com\/wp-content\/uploads\/2017\/08\/usb-port-data-leak.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"647\" \/>\n\t<meta property=\"og:image:height\" content=\"361\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adarsh Verma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/x.com\/_adarshverma\" \/>\n<meta name=\"twitter:site\" content=\"@fossbytes14\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adarsh Verma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/fossbytes.com\/usb-data-leakage\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/fossbytes.com\/usb-data-leakage\/\"},\"author\":{\"name\":\"Adarsh Verma\",\"@id\":\"https:\/\/fossbytes.com\/#\/schema\/person\/44e4dd6ec049b138750b466299d6aa52\"},\"headline\":\"Your &#8220;Innocent&#8221; USB Port Could Be Leaking Personal Data To Hackers\",\"datePublished\":\"2017-08-18T08:08:11+00:00\",\"dateModified\":\"2017-08-18T08:28:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/fossbytes.com\/usb-data-leakage\/\"},\"wordCount\":403,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/fossbytes.com\/#organization\"},\"keywords\":[\"data leakage\",\"USB\",\"USB data leakage\",\"USB Drive\",\"USB hack\"],\"articleSection\":[\"News\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/fossbytes.com\/usb-data-leakage\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fossbytes.com\/usb-data-leakage\/\",\"url\":\"https:\/\/fossbytes.com\/usb-data-leakage\/\",\"name\":\"Your \\\"Innocent\\\" USB Port Could Be Leaking Personal Data To Hackers\",\"isPartOf\":{\"@id\":\"https:\/\/fossbytes.com\/#website\"},\"datePublished\":\"2017-08-18T08:08:11+00:00\",\"dateModified\":\"2017-08-18T08:28:06+00:00\",\"description\":\"According to a latest finding by the researchers at University of Adelaide, a 'safe' port can leak data to a compromised USB device connected to an adjacent port.\",\"breadcrumb\":{\"@id\":\"https:\/\/fossbytes.com\/usb-data-leakage\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fossbytes.com\/usb-data-leakage\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fossbytes.com\/usb-data-leakage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fossbytes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/fossbytes.com\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Your &#8220;Innocent&#8221; USB Port Could Be Leaking Personal Data To Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fossbytes.com\/#website\",\"url\":\"https:\/\/fossbytes.com\/\",\"name\":\"Fossbytes\",\"description\":\"Technology Simplified\",\"publisher\":{\"@id\":\"https:\/\/fossbytes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fossbytes.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fossbytes.com\/#organization\",\"name\":\"Fossbytes Media Pvt Ltd\",\"url\":\"https:\/\/fossbytes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fossbytes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fossbytes.com\/wp-content\/uploads\/2021\/01\/FOSSBYTES-LOGO-NEW-1-1.png\",\"contentUrl\":\"https:\/\/fossbytes.com\/wp-content\/uploads\/2021\/01\/FOSSBYTES-LOGO-NEW-1-1.png\",\"width\":1126,\"height\":281,\"caption\":\"Fossbytes Media Pvt Ltd\"},\"image\":{\"@id\":\"https:\/\/fossbytes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/fossbytes\",\"https:\/\/twitter.com\/fossbytes14\",\"https:\/\/instagram.com\/fossbytes\/\",\"https:\/\/www.linkedin.com\/company\/9360813\",\"https:\/\/www.pinterest.com\/source\/fossbytes.com\/\",\"https:\/\/www.youtube.com\/@FossbytesOfficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/fossbytes.com\/#\/schema\/person\/44e4dd6ec049b138750b466299d6aa52\",\"name\":\"Adarsh Verma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fossbytes.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a2c30c49b8d3984ba9117e30d2929e68?s=96&d=mm\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a2c30c49b8d3984ba9117e30d2929e68?s=96&d=mm\",\"caption\":\"Adarsh Verma\"},\"description\":\"Fossbytes co-founder and an aspiring entrepreneur who keeps a close eye on open source, tech giants, and security. Get in touch with him by sending an email \u2014 adarsh.verma@fossbytes.com\",\"sameAs\":[\"https:\/\/www.facebook.com\/avis.blue\",\"https:\/\/www.instagram.com\/imadarsh\/\",\"https:\/\/www.linkedin.com\/in\/vermaadarsh\/\",\"https:\/\/twitter.com\/https:\/\/x.com\/_adarshverma\",\"https:\/\/youtube.com\/fossbytes\"],\"honorificPrefix\":\"Mr\",\"birthDate\":\"1993-08-18\",\"gender\":\"Male\",\"knowsAbout\":[\"Big Tech\",\"Apple\",\"Open Source\",\"SEO\",\"Social Media\"],\"knowsLanguage\":[\"English\",\"Hindi\"],\"jobTitle\":\"COO\",\"worksFor\":\"Fossbytes Media\",\"url\":\"https:\/\/fossbytes.com\/author\/adarsh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Your \"Innocent\" USB Port Could Be Leaking Personal Data To Hackers","description":"According to a latest finding by the researchers at University of Adelaide, a 'safe' port can leak data to a compromised USB device connected to an adjacent port.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fossbytes.com\/usb-data-leakage\/","og_locale":"en_US","og_type":"article","og_title":"Your \"Innocent\" USB Port Could Be Leaking Personal Data To Hackers","og_description":"According to a latest finding by the researchers at University of Adelaide, a 'safe' port can leak data to a compromised USB device connected to an adjacent port.","og_url":"https:\/\/fossbytes.com\/usb-data-leakage\/","og_site_name":"Fossbytes","article_publisher":"https:\/\/www.facebook.com\/fossbytes","article_author":"https:\/\/www.facebook.com\/avis.blue","article_published_time":"2017-08-18T08:08:11+00:00","article_modified_time":"2017-08-18T08:28:06+00:00","og_image":[{"width":647,"height":361,"url":"https:\/\/fossbytes.com\/wp-content\/uploads\/2017\/08\/usb-port-data-leak.jpg","type":"image\/jpeg"}],"author":"Adarsh Verma","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/x.com\/_adarshverma","twitter_site":"@fossbytes14","twitter_misc":{"Written by":"Adarsh Verma","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fossbytes.com\/usb-data-leakage\/#article","isPartOf":{"@id":"https:\/\/fossbytes.com\/usb-data-leakage\/"},"author":{"name":"Adarsh Verma","@id":"https:\/\/fossbytes.com\/#\/schema\/person\/44e4dd6ec049b138750b466299d6aa52"},"headline":"Your &#8220;Innocent&#8221; USB Port Could Be Leaking Personal Data To Hackers","datePublished":"2017-08-18T08:08:11+00:00","dateModified":"2017-08-18T08:28:06+00:00","mainEntityOfPage":{"@id":"https:\/\/fossbytes.com\/usb-data-leakage\/"},"wordCount":403,"commentCount":0,"publisher":{"@id":"https:\/\/fossbytes.com\/#organization"},"keywords":["data leakage","USB","USB data leakage","USB Drive","USB hack"],"articleSection":["News","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fossbytes.com\/usb-data-leakage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fossbytes.com\/usb-data-leakage\/","url":"https:\/\/fossbytes.com\/usb-data-leakage\/","name":"Your \"Innocent\" USB Port Could Be Leaking Personal Data To Hackers","isPartOf":{"@id":"https:\/\/fossbytes.com\/#website"},"datePublished":"2017-08-18T08:08:11+00:00","dateModified":"2017-08-18T08:28:06+00:00","description":"According to a latest finding by the researchers at University of Adelaide, a 'safe' port can leak data to a compromised USB device connected to an adjacent port.","breadcrumb":{"@id":"https:\/\/fossbytes.com\/usb-data-leakage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fossbytes.com\/usb-data-leakage\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fossbytes.com\/usb-data-leakage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fossbytes.com\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/fossbytes.com\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Your &#8220;Innocent&#8221; USB Port Could Be Leaking Personal Data To Hackers"}]},{"@type":"WebSite","@id":"https:\/\/fossbytes.com\/#website","url":"https:\/\/fossbytes.com\/","name":"Fossbytes","description":"Technology Simplified","publisher":{"@id":"https:\/\/fossbytes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fossbytes.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/fossbytes.com\/#organization","name":"Fossbytes Media Pvt Ltd","url":"https:\/\/fossbytes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fossbytes.com\/#\/schema\/logo\/image\/","url":"https:\/\/fossbytes.com\/wp-content\/uploads\/2021\/01\/FOSSBYTES-LOGO-NEW-1-1.png","contentUrl":"https:\/\/fossbytes.com\/wp-content\/uploads\/2021\/01\/FOSSBYTES-LOGO-NEW-1-1.png","width":1126,"height":281,"caption":"Fossbytes Media Pvt Ltd"},"image":{"@id":"https:\/\/fossbytes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fossbytes","https:\/\/twitter.com\/fossbytes14","https:\/\/instagram.com\/fossbytes\/","https:\/\/www.linkedin.com\/company\/9360813","https:\/\/www.pinterest.com\/source\/fossbytes.com\/","https:\/\/www.youtube.com\/@FossbytesOfficial\/"]},{"@type":"Person","@id":"https:\/\/fossbytes.com\/#\/schema\/person\/44e4dd6ec049b138750b466299d6aa52","name":"Adarsh Verma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fossbytes.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a2c30c49b8d3984ba9117e30d2929e68?s=96&d=mm","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a2c30c49b8d3984ba9117e30d2929e68?s=96&d=mm","caption":"Adarsh Verma"},"description":"Fossbytes co-founder and an aspiring entrepreneur who keeps a close eye on open source, tech giants, and security. Get in touch with him by sending an email \u2014 adarsh.verma@fossbytes.com","sameAs":["https:\/\/www.facebook.com\/avis.blue","https:\/\/www.instagram.com\/imadarsh\/","https:\/\/www.linkedin.com\/in\/vermaadarsh\/","https:\/\/twitter.com\/https:\/\/x.com\/_adarshverma","https:\/\/youtube.com\/fossbytes"],"honorificPrefix":"Mr","birthDate":"1993-08-18","gender":"Male","knowsAbout":["Big Tech","Apple","Open Source","SEO","Social Media"],"knowsLanguage":["English","Hindi"],"jobTitle":"COO","worksFor":"Fossbytes Media","url":"https:\/\/fossbytes.com\/author\/adarsh\/"}]}},"taxonomy_info":{"category":[{"value":35,"label":"News"},{"value":1831,"label":"Security"}],"post_tag":[{"value":12919,"label":"data leakage"},{"value":1310,"label":"USB"},{"value":12918,"label":"USB data leakage"},{"value":2421,"label":"USB Drive"},{"value":12920,"label":"USB hack"}]},"featured_image_src_large":["https:\/\/fossbytes.com\/wp-content\/uploads\/2017\/08\/usb-port-data-leak.jpg",647,361,false],"comment_info":0,"category_info":[{"term_id":35,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":35,"taxonomy":"category","description":"As our tagline \"Fresh Bytes of Technology\" implies, our team works tirelessly to deliver the latest updates from the tech world in a crisp and easy-to-follow format. Follow us on different social media channels as well as Google News to keep yourself updated with the latest knowhow of tech giants, security\/privacy, smartphones, operating systems, and latest innovations in the field of electric vehicles and artificial intelligence.","parent":0,"count":5980,"filter":"raw","cat_ID":35,"category_count":5980,"category_description":"As our tagline \"Fresh Bytes of Technology\" implies, our team works tirelessly to deliver the latest updates from the tech world in a crisp and easy-to-follow format. Follow us on different social media channels as well as Google News to keep yourself updated with the latest knowhow of tech giants, security\/privacy, smartphones, operating systems, and latest innovations in the field of electric vehicles and artificial intelligence.","cat_name":"News","category_nicename":"news","category_parent":0},{"term_id":1831,"name":"Security","slug":"security","term_group":0,"term_taxonomy_id":1833,"taxonomy":"category","description":"","parent":0,"count":796,"filter":"raw","cat_ID":1831,"category_count":796,"category_description":"","cat_name":"Security","category_nicename":"security","category_parent":0}],"tag_info":[{"term_id":12919,"name":"data leakage","slug":"data-leakage","term_group":0,"term_taxonomy_id":12920,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":1310,"name":"USB","slug":"usb","term_group":0,"term_taxonomy_id":1312,"taxonomy":"post_tag","description":"","parent":0,"count":29,"filter":"raw"},{"term_id":12918,"name":"USB data leakage","slug":"usb-data-leakage","term_group":0,"term_taxonomy_id":12919,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":2421,"name":"USB Drive","slug":"usb-drive","term_group":0,"term_taxonomy_id":2423,"taxonomy":"post_tag","description":"","parent":0,"count":8,"filter":"raw"},{"term_id":12920,"name":"USB hack","slug":"usb-hack","term_group":0,"term_taxonomy_id":12921,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/posts\/85698"}],"collection":[{"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/comments?post=85698"}],"version-history":[{"count":6,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/posts\/85698\/revisions"}],"predecessor-version":[{"id":85719,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/posts\/85698\/revisions\/85719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/media\/85701"}],"wp:attachment":[{"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/media?parent=85698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/categories?post=85698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fossbytes.com\/wp-json\/wp\/v2\/tags?post=85698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}