{"id":77809,"date":"2015-08-11T22:55:12","date_gmt":"2015-08-12T02:55:12","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-08T20:09:22","modified_gmt":"2021-08-09T00:09:22","slug":"smartwatches-not-ready-for-primetime","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/smartwatches-not-ready-for-primetime\/","title":{"rendered":"SmartWatches &#8211; Not Ready for Primetime"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150420124359\/http:\/\/blog.synaptics.com\/?p=349\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101103\" title=\"SmartWatches - Not Ready for Primetime\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wearable_tech-e1566343683173-150x132.jpg?resize=114%2C100&#038;ssl=1\" alt=\"SmartWatches - Not Ready for Primetime\" width=\"114\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wearable_tech-e1566343683173.jpg?resize=150%2C132&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wearable_tech-e1566343683173.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wearable_tech-e1566343683173.jpg?w=226&amp;ssl=1 226w\" sizes=\"auto, (max-width: 114px) 100vw, 114px\" \/><\/a>Pundits predict that <strong>Apple <a title=\"iWatch\" href=\"https:\/\/www.lapdonline.org\/iwatchla\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">iWatch<\/a><\/strong> sales will <strong>surpass iPad <\/strong>first-year sales. The experts <a href=\"http:\/\/www.cultofmac.com\/282907\/iwatch-bigger-hit-ipad\/\" target=\"_blank\" rel=\"noopener noreferrer\">expect<\/a> Apple to sell 21 million watches in fiscal 2015. Many believe that the iWatch will drive wearable tech into the enterprise. With this kind of hype, security vendors have started to take a look at iWatch and other smartwatches.<\/p>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20161214121222\/http:\/\/pumpsandcircumstance.com:80\/new-thing-wearable-technology\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101107 \" title=\"wearable tech\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsung_galaxy-watch-e1566343766819-138x150.png?resize=90%2C98&#038;ssl=1\" alt=\"wearable tech\" width=\"90\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsung_galaxy-watch-e1566343766819.png?resize=138%2C150&amp;ssl=1 138w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsung_galaxy-watch-e1566343766819.png?resize=69%2C75&amp;ssl=1 69w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsung_galaxy-watch-e1566343766819.png?resize=768%2C835&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/samsung_galaxy-watch-e1566343766819.png?w=856&amp;ssl=1 856w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>FierceMobileIT<\/em> <a href=\"https:\/\/web.archive.org\/web\/20150813071408\/http:\/\/www.fiercemobileit.com\/story\/are-smartwatches-safe-enterprise-data\/2015-08-06\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a>\u00a0that just in time for <a href=\"https:\/\/www.blackhat.com\/us-15\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlackHat<\/a>, <strong><a title=\"MobileIron\" href=\"http:\/\/www.mobileiron.com\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">MobileIron<\/a><\/strong> released a <a href=\"https:\/\/www.mobileiron.com\/en\/whitepaper\/smartwatches-wearables-and-mobile-enterprise-security\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a>\u00a0looking at the <strong>security risks<\/strong> smartwatches pose to corporate data. According to the <a title=\"Enterprise mobility management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Enterprise_mobility_management\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">enterprise mobility management<\/a> firm, workers are increasingly using <strong>smartwatches<\/strong> to connect wirelessly to their smartphones and access <strong>corporate email<\/strong>, calendar, contacts, and apps.<\/p>\n<p>MobileIron looked at\u00a0the security of smartwatches that can be paired with <strong><a title=\"IOS\" href=\"http:\/\/www.apple.com\/ios\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">iOS<\/a> and Android<\/strong> smartphones accessing enterprise resources as well as the pairing apps on the smartphones. The author says the EMM vendor analyzed the\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a href=\"http:\/\/www.apple.com\/watch\/\" target=\"_blank\" rel=\"noopener noreferrer\">Watch<\/a>, Motorola <a href=\"https:\/\/web.archive.org\/web\/20150831150914\/http:\/\/moto360.motorola.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">Moto 360<\/a>, <a title=\"Samsung Electronics Co.\" href=\"http:\/\/www.samsung.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Samsung<\/a>\u00a0(<a title=\"KS : 005930\" href=\"https:\/\/www.tradingview.com\/symbols\/KRX-005930\/\" target=\"_blank\" rel=\"noopener\">005930<\/a>) <a href=\"https:\/\/web.archive.org\/web\/20160712080259\/http:\/\/www.samsung.com:80\/us\/mobile\/wearable-tech\/SM-R3810ZKAXAR\" target=\"_blank\" rel=\"noopener noreferrer\">Gear 2 Neo<\/a>, and <a href=\"http:\/\/www.alibaba.com\/product-detail\/2015-Hot-Products-U8-Bluetooth-Smartwatch_60283667648.html\" target=\"_blank\" rel=\"noopener noreferrer\">Shenzhen Qini U8.<\/a><\/p>\n<p><a href=\"https:\/\/www.mobileiron.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101109 \" title=\"MobileIron logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104-150x38.png?resize=146%2C37&#038;ssl=1\" alt=\"MobileIron logo\" width=\"146\" height=\"37\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?resize=150%2C38&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?resize=75%2C19&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?resize=768%2C195&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?resize=1024%2C260&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?w=1880&amp;ssl=1 1880w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobileiron_logo-e1566343817104.png?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 146px) 100vw, 146px\" \/><\/a>The Qini U8 had a pairing app that displayed some &#8220;<strong>suspicious behaviors<\/strong>&#8221; that could pose a risk to personally identifiable data such as access to downloaded and cached content and phone hardware data, judged MobileIron. The pairing app was downloaded from an unknown IP address in China and not the relative safety of the official <a title=\"Google Play\" href=\"http:\/\/en.wikipedia.org\/wiki\/Google_Play\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Google Play store<\/a>, which scans apps from malicious traits.<\/p>\n<p>Another security concern noted in the article is the implementation of <strong>passcodes<\/strong> on smartwatches. Smartphone passcodes are usually time-based so that if the device is not used within a certain time period, the device is locked and access requires entering the passcode.<\/p>\n<p>Smart<a href=\"https:\/\/web.archive.org\/web\/20210919202159\/https:\/\/www.arnnet.com.au\/slideshow\/523801\/pictures-14-smartwatches-here-coming-rumoured\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101112\" title=\"Disck Tracy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Dick_tracy.jpg?resize=133%2C100&#038;ssl=1\" alt=\"Disck Tracy\" width=\"133\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Dick_tracy.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Dick_tracy.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Dick_tracy.jpg?w=525&amp;ssl=1 525w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><\/a>watch passcodes examined by MobileIron are <strong>proximity-based<\/strong>\u00a0so that the device is locked when the smartwatch loses wireless connection with the smartphone. However, only the Apple Watch prompted the user to set up a passcode, suggesting that many users of the other <strong>smartwatches do not enable the passcode option<\/strong>.<\/p>\n<p>In addition, smartwatches <strong>do not have enterprise mobility application<\/strong> programming interfaces to do policy enforcement on the devices. The Apple Watch stood out in terms of security by wiping enterprise apps from the device when its companion iPhone is quarantined or retired and the enterprise apps are removed from the phone.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101114\" title=\"smartwatches do not have enterprise mobility application programming interfaces\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacking_the-internet-of-things.jpg?resize=120%2C120&#038;ssl=1\" alt=\"smartwatches do not have enterprise mobility application programming interfaces\" width=\"120\" height=\"120\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacking_the-internet-of-things.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacking_the-internet-of-things.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hacking_the-internet-of-things.jpg?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/>In terms of data encryption, there is <strong>no encryption<\/strong> on the Shenzhen Qini U8, while it is optional at the app level for the Motorola Mobility Moto 360 and the Samsung Gear 2 Neo. For the Apple Watch, encryption is enabled for the data on the watch and optional at the app level. The MobileIron report concluded,\u00a0<em>&#8220;As enterprises embrace these devices for enterprise applications &#8230; \u00a0we expect smartwatch vendors to place an even stronger emphasis on security.&#8221;<\/em><\/p>\n<p>Not only has MobileIron recently scrutinized smartwatches so has HP. <strong>HP&#8217;s Fortify<\/strong> security unit tested 10 different smartwatches and found that all of them were vulnerable to cyberattacks.<\/p>\n<p><a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HP<\/a> (<a title=\"NYSE : HPQ\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:HPQ\" target=\"_blank\" rel=\"noopener noreferrer\">HPQ<\/a>) did not say which brand of smartwatches it tested. However,\u00a0<em><a href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\">FierceITSecurity<\/a><\/em>\u00a0<a href=\"https:\/\/web.archive.org\/web\/20160325112943\/http:\/\/www.fierceitsecurity.com:80\/story\/all-smartwatches-tested-hp-are-vulnerable-cyberattack\/2015-07-27\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that HP did test the devices and their Android and iOS cloud and mobile app components, indicating that the Apple Watch was one of those tested.<\/p>\n<p style=\"text-align: left;\"><strong>HP Fortify<\/strong> found that <strong>all the smartwatches they tested were insecure<\/strong>. Jason Schmitt, general manager of HP security at Fortify said<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em><a href=\"https:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101116 \" title=\"HP logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hp-logo-1.png?resize=66%2C66&#038;ssl=1\" alt=\"HP logo\" width=\"66\" height=\"66\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hp-logo-1.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hp-logo-1.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hp-logo-1.png?w=750&amp;ssl=1 750w\" sizes=\"auto, (max-width: 66px) 100vw, 66px\" \/><\/a>[Smartwatches] &#8230; will become vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting smartwatches into corporate networks\u00a0<\/em><\/p>\n<p style=\"text-align: left;\">HP combined manual testing and automated tools to check the devices against the open web application security project&#8217;s <a href=\"https:\/\/web.archive.org\/web\/20190807234010\/https:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Top_Ten_Project\" target=\"_blank\" rel=\"noopener noreferrer\">Internet of Things Top 10 security risks<\/a>. HP found that data collected on the smartwatch was often sent to multiple backend destinations (often including third parties). The researchers used HP&#8217;s Fortify on Demand to find many more smartwatch\u00a0<a href=\"https:\/\/web.archive.org\/web\/20150908110150\/http:\/\/go.saas.hp.com\/fod\/internet-of-things\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerabilities<\/a>\u00a0(PDF, reg. req).<\/p>\n<ul>\n<li style=\"text-align: left;\"><a href=\"https:\/\/web.archive.org\/web\/20190418152811\/http:\/\/theclockmanonline.com:80\/grandfather-clock-repair.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101118\" title=\"Broken watch\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/broken_watch-e1566344003753-150x126.jpg?resize=108%2C91&#038;ssl=1\" alt=\"Broken watch\" width=\"108\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/broken_watch-e1566344003753.jpg?resize=150%2C126&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/broken_watch-e1566344003753.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/broken_watch-e1566344003753.jpg?w=226&amp;ssl=1 226w\" sizes=\"auto, (max-width: 108px) 100vw, 108px\" \/><\/a>100% tested were paired with a mobile interface that <strong>l<\/strong><strong>acked two-factor authentication<\/strong> and the ability to <strong>lock out accounts<\/strong> after 3-5 failed password attempts.<\/li>\n<li style=\"text-align: left;\">90% allowed watch communications to be easily intercepted.<br \/>\n\u2022 70% of the time firmware was transmitted without encryption.<br \/>\n\u2022 Only 50% of tested devices offered the ability to add a <strong>screen lock<\/strong> (PIN or Pattern), which could hinder access if lost or stolen.<br \/>\n\u202240% of the cloud connections were vulnerable to the <strong><a href=\"http:\/\/whatis.techtarget.com\/definition\/POODLE-attack\" target=\"_blank\" rel=\"noopener noreferrer\">POODLE attack<\/a><\/strong>, allow the use of weak ciphers, or still used SSL v2. Transport encryption is critical because personal information is being moved to multiple locations in the cloud.<\/li>\n<\/ul>\n<p>HP offered recommendations for consumers\u00a0looking to use smartwatches more securely:<\/p>\n<ol>\n<li>Do not enable sensitive access control functions (e.g., car or home access) unless strong authentication is offered (<strong>two-factor,<\/strong> etc).<\/li>\n<li>Enable passcodes to prevent unauthorized access to your data, the opening of doors, or payments on your behalf.<\/li>\n<li>Enable security functionality (passcodes, screen locks, two-factor, and encryption).<\/li>\n<li>Use strong passwords for any interface such as mobile or cloud applications associated with your watch.<\/li>\n<li>Do not approve any unknown pairing requests to the watch.<\/li>\n<\/ol>\n<p>These security measures are also critical as smartwatches enter the workplace and are connected to corporate networks. HP recommends that enterprise technical teams:<\/p>\n<ol>\n<li>Ensure <strong>TLS implementations<\/strong> are configured and implemented properly.<\/li>\n<li>Require strong passwords to protect user accounts and sensitive data.<\/li>\n<li>Implement controls to prevent man-in-the-middle attacks.<\/li>\n<\/ol>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>As smartwatches become more mainstream, they will increasingly store more sensitive information such as health data, and enable physical access functions including unlocking cars and homes. HP&#8217;s Schmitt warns that, <\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Smartwatches &#8230; open the door to new threats to sensitive information and activities &#8230;\u00a0vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting smartwatches into corporate networks.<\/em><\/p>\n<p><em>All smartwatches collected some form of personal information, such as name, address, weight, gender, heart rate, and other health information. Given the account issues and weak passwords identified by MobileIron and HP, the exposure of this personal information is a concern. I am calling smartwatches not ready for prime-time.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartwatches are trendy &#038; full of security holes that put your PII Bank Account Health Info at risk &#8211; Wait<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,202,610,101,536,92,2510,168,904,1135,944,296,304,2511,1357,209,2339,393,4,2461,583],"class_list":["post-77809","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-android","tag-app-store","tag-apple","tag-goog","tag-google","tag-google-play","tag-hp","tag-hpq","tag-ios","tag-iot","tag-ipad","tag-iphone","tag-mobileiron","tag-motorola-mobility","tag-password","tag-poodle","tag-samsung","tag-security","tag-smartwatch","tag-tls"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77809"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77809\/revisions"}],"predecessor-version":[{"id":131136,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77809\/revisions\/131136"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}