{"id":569,"date":"2021-07-17T00:31:22","date_gmt":"2021-07-17T00:31:22","guid":{"rendered":"https:\/\/informationwarfare.news\/?p=569"},"modified":"2021-07-25T18:04:06","modified_gmt":"2021-07-25T18:04:06","slug":"ten-ways-to-insure-your-cryptocurrency-is-safe-and-protected","status":"publish","type":"post","link":"https:\/\/informationwarfare.news\/index.php\/2021\/07\/17\/ten-ways-to-insure-your-cryptocurrency-is-safe-and-protected\/","title":{"rendered":"THE TOP TEN WAYS TO INSURE YOUR CRYPTOCURRENCY IS SAFE AND PROTECTED"},"content":{"rendered":"\n<p class=\"has-vivid-cyan-blue-color has-text-color has-medium-font-size\"><strong>Hacking into cryptocurrency accounts is on the increase<\/strong>.<\/p>\n\n\n\n<p>Because of their popularity and price rises, virtual currencies such as Bitcoin and Ethereum are often targeted by hackers looking to profit from these valuable commodities. \u201cThe economics of hacking suggests that attackers will continue to gravitate towards digital currencies as they increase in value and become more prevalent in our daily lives,\u201d says Jack Mannino, CEO of nVisium, a Falls Church, Virginia-based application security company. Hackers\u2019 work may be difficult to track since their digital traces can be erased. Investors have little legal recourse if their cryptocurrency account is hacked since the virtual currencies are currently unregulated by a government body or central bank. Here are some suggestions for safeguarding your bitcoin investment.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-medium-font-size\"><strong>For when it comes to digital wallet security, use a mixed strategy.<\/strong><\/p>\n\n\n\n<p>Online wallets are becoming more popular, attracting the attention of hackers. According to Terence Jackson, chief information security officer of Thycotic, a Washington, D.C.-based supplier of privileged access management solutions, consumers should retain the bulk of their cryptocurrencies in offline or physical wallets, with just a small amount in an online wallet. \u201cThe physical wallet should also be stored in a secure place such as a safe or safety deposit box,\u201d he advises. \u201cSeparating the private and public keys is also a good idea. When feasible, both should be protected using strong passwords and multifactor authentication. More conventional alternatives will develop as bitcoin becomes more popular, but in the meanwhile, you are responsible for keeping your money secure.\u201d<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-medium-font-size\"><strong>The need for two strong passwords cannot be overstated.<\/strong><\/p>\n\n\n\n<p>Never use the same password for several accounts, particularly because bitcoin services are a popular target for cybercriminals. Assume that every single one of them will eventually suffer a data breach, says Kevin Dunne, president of Greenlight, an integrated risk management solutions company headquartered in Flemington, New Jersey. \u201cWhile cryptocurrency is an innovative technology that is evolving quickly, the quickest and easiest ways to secure your wallet is with tried-and-true security tactics,\u201d he adds. \u201cLimit your exposure by using a different, strong password for each, preferably with two-factor verification and password rotation. Using a reputable password manager may help automate this procedure and eliminating the guessing.\u201d<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\"><strong>Use trustworthy bitcoin wallets, exchanges, brokerages, and mobile applications.<\/strong><\/p>\n\n\n\n<p>Investors should thoroughly study each platform\u2019s security features before choosing which to use to understand how their data will be safeguarded. \u201cEntities to be trusted should incorporate best security practices such as requiring multifactor authentication, SSL\/TLS encryption and using air-gapped devices that are kept offline when storing cryptocurrency,\u201d says Austin Merritt, a cyberthreat intelligence analyst at Digital Shadows, a San Francisco-based provider of digital risk protection solutions. Using several cryptocurrency platforms may be safer provided owners create unique, difficult passwords for each one. \u201cWhether using one or more cryptocurrency platforms, it is imperative to maintain a secure password manager to ensure that passwords are not lost,\u201d he adds.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\"><strong>Avoid becoming a victim of mobile phishing.<\/strong><\/p>\n\n\n\n<p>Many individuals who have a bitcoin wallet use a smartphone app to keep track of their funds. According to Hank Schless, senior manager of security solutions at Lookout, a San Francisco-based provider of mobile security solutions, as the price of these commodities rises, malicious hackers are motivated to target investors with mobile phishing campaigns in order to steal your login credentials. These social engineering assaults may originate from a variety of sources on a mobile device, including SMS, social media, third-party messaging services, and email. \u201cBeyond phishing, there are also malicious mobile apps that have the hidden ability to log your keystrokes or watch the activity on your screen,\u201d he adds. Many people use antivirus software on their PCs, and they\u2019re beginning to understand that their smartphones and tablets should have the same protection. \u201cGiven the amount of data we entrust to those devices,\u201d Schless adds, \u201cthey are the most important to secure.\u201d<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\"><strong>Pay attention to how your wallet is being utilized in transactions.<\/strong><\/p>\n\n\n\n<p>According to Dirk Schrader, worldwide vice president of New Net Technologies, a Naples, Florida-based supplier of cybersecurity and compliance software, apply the fundamental concepts of \u201ccyber resilience\u201d to your wallet. \u201cAny crypto wallet is just a collection of data and code, but it\u2019s a collection with a lot of value for you and others. Know how it\u2019s utilized in transactions, make sure your systems and networks aren\u2019t hacked if you\u2019re utilizing them for such activities, and have physical security in place \u201che declares Those that trade greater values should take their time to assess the dangers. \u201cAttacks on the internet are orchestrated. They gain a footing and grow before going for the main objective (your money) \u201cAccording to Schrader. \u201cThe cyber protections applied to your wallet are only as good as your understanding of them.\u201d<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\">Learn about the many techniques and procedures for safeguarding your digital money.<\/p>\n\n\n\n<p>People who do not have a technological background but want to diversify their portfolio are increasingly interested in investing in cryptocurrencies. Because no official institution or central bank manages digital assets, it is up to the user to keep their money safe, according to Brandon Hoffman, chief information security officer at Netenrich, a San Jose, California-based supplier of IT, cloud, and cybersecurity operations and services. The chances of recouping such losses are little to none. Secret key protection, recovery seed protection, and cryptominer malware security are the three most essential components to understand.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\"><strong>Keep the hidden key to yourself.<\/strong><\/p>\n\n\n\n<p>According to Hoffman, the secret key is used to verify that the individual sending or receiving the digital currency is the owner of the wallet in question. This private key or secret should never be disclosed. \u201cThe safest way to store your private key is by using cold storage,\u201d he adds. \u201cCold storage essentially means printing out your key and removing all digital traces of it.\u201d Using a seed, a sequence of randomly produced phrases that a user may exploit, is a semifailsafe way of retrieving your private key. \u201cThis seed phrase should only be written down or printed on paper and stored somewhere safe,\u201d Hoffman advises. \u201cWith how easily attackers can get access to end-user machines and other digital storage applications, keeping this phrase somewhere digital is very risky.\u201d<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\">Avoid utilizing provider-hosted wallets.<\/p>\n\n\n\n<p>Wallets stored on your laptop or desktop, as well as wallets hosted by providers, are other options for keeping Bitcoin. Provider-hosted wallets are the \u201cworst choice because you are allowing them to store your private key on their servers which are totally out of your control,\u201d according to Hoffman, because you\u2019re letting them to store your private key on their servers, which are completely out of your control. \u201cThis is the most popular option since it needs the least amount of technical knowledge. This exposes your private key to a variety of threats, including a breach of the provider\u2019s server, the company going out of business, or even a government or other legal body seizing control of the infrastructure.\u201d He recommends using a hardware wallet, which is a USB-based device that encrypts and saves your private key as well as any other pertinent information. Decryption is sometimes done physically, which is considerably safer than other techniques.<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\"><strong>For active traders, cold wallets have disadvantages.<\/strong><\/p>\n\n\n\n<p>According to Thomas Beek, senior cybersecurity expert at Digital Shadows, a cold wallet is completely offline and involves either writing down the secret address on a piece of paper that only the owner has access to or buying a physical device that securely holds bitcoin money. The time it takes to keep your bitcoins is a disadvantage, and if you\u2019re trading, the procedure of \u201cconsistently transferring funds between an exchange and the cold wallet can incur repetitive withdrawal fees,\u201d according to him. \u201cThe benefits of a cold wallet include peace of mind that only you have access to your funds.\u201d<\/p>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color has-normal-font-size\"><strong>Hot wallets are more handy for traders, but the risk of losing money is higher.<\/strong><\/p>\n\n\n\n<p>Retail investors may utilize hot wallets, which are storage options that are always linked to the internet to allow for quicker access and the opportunity to sell and purchase other cryptocurrencies more easily, according to Beek. The cost of entrusting the platform with the protection of both your public and private addresses is security, which \u201chistorically has resulted in the loss of significant funds following the successful breach of an exchange,\u201d he adds. This situation should only be considered for active traders, and the quantity of money they need should be assessed on a regular basis. Large exchanges will always be a target for hackers, particularly as the number of individual investors rises. \u201cIrrespective of whether a platform is centralized or decentralized, without proper storage processes implemented by the investor themselves, they are likely to remain at threat from a potential attack,\u201d he adds.<\/p>\n\n\n\n<ul><li>Methods for securing your bitcoin include:When it comes to digital wallet security, use a mixed strategy.<\/li><li>The need of two strong passwords cannot be overstated.<\/li><li>Use trustworthy bitcoin wallets, exchanges, brokerages, and mobile applications.<\/li><li>Avoid becoming a victim of mobile phishing.<\/li><li>Pay attention to how your wallet is being utilized in transactions.<\/li><li>Learn about the many techniques and procedures for safeguarding your digital money.<\/li><li>Keep the hidden key to yourself.<\/li><li>Avoid utilizing provider-hosted wallets.<\/li><li>For active traders, cold wallets have disadvantages.<\/li><li>Hot wallets are more practical.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Hacking into cryptocurrency accounts is on the increase. Because of their popularity and price rises, virtual currencies such as Bitcoin and Ethereum are often targeted by hackers looking to profit from these valuable commodities. \u201cThe economics of hacking suggests that attackers will continue to gravitate towards digital currencies as they increase in value and become [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":479,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>Hacking into cryptocurrency accounts is on the increase<\/strong>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Because of their popularity and price rises, virtual currencies such as Bitcoin and Ethereum are often targeted by hackers looking to profit from these valuable commodities. \u201cThe economics of hacking suggests that attackers will continue to gravitate towards digital currencies as they increase in value and become more prevalent in our daily lives,\u201d says Jack Mannino, CEO of nVisium, a Falls Church, Virginia-based application security company. Hackers\u2019 work may be difficult to track since their digital traces can be erased. Investors have little legal recourse if their cryptocurrency account is hacked since the virtual currencies are currently unregulated by a government body or central bank. Here are some suggestions for safeguarding your bitcoin investment.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\">For when it comes to digital wallet security, use a mixed strategy.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Online wallets are becoming more popular, attracting the attention of hackers. According to Terence Jackson, chief information security officer of Thycotic, a Washington, D.C.-based supplier of privileged access management solutions, consumers should retain the bulk of their cryptocurrencies in offline or physical wallets, with just a small amount in an online wallet. \u201cThe physical wallet should also be stored in a secure place such as a safe or safety deposit box,\u201d he advises. \u201cSeparating the private and public keys is also a good idea. When feasible, both should be protected using strong passwords and multifactor authentication. More conventional alternatives will develop as bitcoin becomes more popular, but in the meanwhile, you are responsible for keeping your money secure.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>The need for two strong passwords cannot be overstated.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Never use the same password for several accounts, particularly because bitcoin services are a popular target for cybercriminals. Assume that every single one of them will eventually suffer a data breach, says Kevin Dunne, president of Greenlight, an integrated risk management solutions company headquartered in Flemington, New Jersey. \u201cWhile cryptocurrency is an innovative technology that is evolving quickly, the quickest and easiest ways to secure your wallet is with tried-and-true security tactics,\u201d he adds. \u201cLimit your exposure by using a different, strong password for each, preferably with two-factor verification and password rotation. Using a reputable password manager may help automate this procedure and eliminating the guessing.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>Use trustworthy bitcoin wallets, exchanges, brokerages, and mobile applications.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Investors should thoroughly study each platform\u2019s security features before choosing which to use to understand how their data will be safeguarded. \u201cEntities to be trusted should incorporate best security practices such as requiring multifactor authentication, SSL\/TLS encryption and using air-gapped devices that are kept offline when storing cryptocurrency,\u201d says Austin Merritt, a cyberthreat intelligence analyst at Digital Shadows, a San Francisco-based provider of digital risk protection solutions. Using several cryptocurrency platforms may be safer provided owners create unique, difficult passwords for each one. \u201cWhether using one or more cryptocurrency platforms, it is imperative to maintain a secure password manager to ensure that passwords are not lost,\u201d he adds.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>Avoid becoming a victim of mobile phishing.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Many individuals who have a bitcoin wallet use a smartphone app to keep track of their funds. According to Hank Schless, senior manager of security solutions at Lookout, a San Francisco-based provider of mobile security solutions, as the price of these commodities rises, malicious hackers are motivated to target investors with mobile phishing campaigns in order to steal your login credentials. These social engineering assaults may originate from a variety of sources on a mobile device, including SMS, social media, third-party messaging services, and email. \u201cBeyond phishing, there are also malicious mobile apps that have the hidden ability to log your keystrokes or watch the activity on your screen,\u201d he adds. Many people use antivirus software on their PCs, and they\u2019re beginning to understand that their smartphones and tablets should have the same protection. \u201cGiven the amount of data we entrust to those devices,\u201d Schless adds, \u201cthey are the most important to secure.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>Pay attention to how your wallet is being utilized in transactions.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>According to Dirk Schrader, worldwide vice president of New Net Technologies, a Naples, Florida-based supplier of cybersecurity and compliance software, apply the fundamental concepts of \u201ccyber resilience\u201d to your wallet. \u201cAny crypto wallet is just a collection of data and code, but it\u2019s a collection with a lot of value for you and others. Know how it\u2019s utilized in transactions, make sure your systems and networks aren\u2019t hacked if you\u2019re utilizing them for such activities, and have physical security in place \u201che declares Those that trade greater values should take their time to assess the dangers. \u201cAttacks on the internet are orchestrated. They gain a footing and grow before going for the main objective (your money) \u201cAccording to Schrader. \u201cThe cyber protections applied to your wallet are only as good as your understanding of them.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\">Learn about the many techniques and procedures for safeguarding your digital money.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>People who do not have a technological background but want to diversify their portfolio are increasingly interested in investing in cryptocurrencies. Because no official institution or central bank manages digital assets, it is up to the user to keep their money safe, according to Brandon Hoffman, chief information security officer at Netenrich, a San Jose, California-based supplier of IT, cloud, and cybersecurity operations and services. The chances of recouping such losses are little to none. Secret key protection, recovery seed protection, and cryptominer malware security are the three most essential components to understand.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>Keep the hidden key to yourself.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>According to Hoffman, the secret key is used to verify that the individual sending or receiving the digital currency is the owner of the wallet in question. This private key or secret should never be disclosed. \u201cThe safest way to store your private key is by using cold storage,\u201d he adds. \u201cCold storage essentially means printing out your key and removing all digital traces of it.\u201d Using a seed, a sequence of randomly produced phrases that a user may exploit, is a semifailsafe way of retrieving your private key. \u201cThis seed phrase should only be written down or printed on paper and stored somewhere safe,\u201d Hoffman advises. \u201cWith how easily attackers can get access to end-user machines and other digital storage applications, keeping this phrase somewhere digital is very risky.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\">Avoid utilizing provider-hosted wallets.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Wallets stored on your laptop or desktop, as well as wallets hosted by providers, are other options for keeping Bitcoin. Provider-hosted wallets are the \u201cworst choice because you are allowing them to store your private key on their servers which are totally out of your control,\u201d according to Hoffman, because you\u2019re letting them to store your private key on their servers, which are completely out of your control. \u201cThis is the most popular option since it needs the least amount of technical knowledge. This exposes your private key to a variety of threats, including a breach of the provider\u2019s server, the company going out of business, or even a government or other legal body seizing control of the infrastructure.\u201d He recommends using a hardware wallet, which is a USB-based device that encrypts and saves your private key as well as any other pertinent information. Decryption is sometimes done physically, which is considerably safer than other techniques.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>For active traders, cold wallets have disadvantages.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>According to Thomas Beek, senior cybersecurity expert at Digital Shadows, a cold wallet is completely offline and involves either writing down the secret address on a piece of paper that only the owner has access to or buying a physical device that securely holds bitcoin money. The time it takes to keep your bitcoins is a disadvantage, and if you\u2019re trading, the procedure of \u201cconsistently transferring funds between an exchange and the cold wallet can incur repetitive withdrawal fees,\u201d according to him. \u201cThe benefits of a cold wallet include peace of mind that only you have access to your funds.\u201d<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"textColor\":\"vivid-green-cyan\",\"fontSize\":\"normal\"} -->\n<p class=\"has-vivid-green-cyan-color has-text-color has-normal-font-size\"><strong>Hot wallets are more handy for traders, but the risk of losing money is higher.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Retail investors may utilize hot wallets, which are storage options that are always linked to the internet to allow for quicker access and the opportunity to sell and purchase other cryptocurrencies more easily, according to Beek. The cost of entrusting the platform with the protection of both your public and private addresses is security, which \u201chistorically has resulted in the loss of significant funds following the successful breach of an exchange,\u201d he adds. This situation should only be considered for active traders, and the quantity of money they need should be assessed on a regular basis. Large exchanges will always be a target for hackers, particularly as the number of individual investors rises. \u201cIrrespective of whether a platform is centralized or decentralized, without proper storage processes implemented by the investor themselves, they are likely to remain at threat from a potential attack,\u201d he adds.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul><li>Methods for securing your bitcoin include:When it comes to digital wallet security, use a mixed strategy.<\/li><li>The need of two strong passwords cannot be overstated.<\/li><li>Use trustworthy bitcoin wallets, exchanges, brokerages, and mobile applications.<\/li><li>Avoid becoming a victim of mobile phishing.<\/li><li>Pay attention to how your wallet is being utilized in transactions.<\/li><li>Learn about the many techniques and procedures for safeguarding your digital money.<\/li><li>Keep the hidden key to yourself.<\/li><li>Avoid utilizing provider-hosted wallets.<\/li><li>For active traders, cold wallets have disadvantages.<\/li><li>Hot wallets are more practical.<\/li><\/ul>\n<!-- \/wp:list -->","_et_gb_content_width":"","footnotes":""},"categories":[26],"tags":[],"_links":{"self":[{"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/posts\/569"}],"collection":[{"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/comments?post=569"}],"version-history":[{"count":7,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/posts\/569\/revisions"}],"predecessor-version":[{"id":605,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/posts\/569\/revisions\/605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/media\/479"}],"wp:attachment":[{"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/media?parent=569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/categories?post=569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/informationwarfare.news\/index.php\/wp-json\/wp\/v2\/tags?post=569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}