{"id":80328,"date":"2016-05-26T23:15:17","date_gmt":"2016-05-27T03:15:17","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-08-10T12:37:49","modified_gmt":"2022-08-10T16:37:49","slug":"lessons-from-the-linkedin-data-breach","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/lessons-from-the-linkedin-data-breach\/","title":{"rendered":"Lessons From the LinkedIn Data Breach"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98260\" title=\"Lessons From the LinkedIn Data Breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-sticker-1.jpg?resize=94%2C86&#038;ssl=1\" alt=\"Lessons From the LinkedIn Data Breach\" width=\"94\" height=\"86\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-sticker-1.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-sticker-1.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password-sticker-1.jpg?w=305&amp;ssl=1 305w\" sizes=\"auto, (max-width: 94px) 100vw, 94px\" \/>Readers of the <a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> know that <strong><a href=\"https:\/\/wp.me\/p2wgaW-3Fx\" target=\"_blank\" rel=\"noopener noreferrer\">passwords<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-wC\" target=\"_blank\" rel=\"noopener noreferrer\">suck<\/a><\/strong> and that people are awful at picking passwords. The <a href=\"http:\/\/www.businessinsider.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Business Insider<\/em><\/a> offers <strong>more proof<\/strong>. According to a recent <a href=\"http:\/\/www.businessinsider.com\/linkedin-hack-data-shows-people-pick-awful-common-passwords-2016-5\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a>, the <strong><a title=\"2012 LinkedIn hack\" href=\"https:\/\/nakedsecurity.sophos.com\/2012\/06\/06\/millions-of-linkedin-passwords-reportedly-leaked-take-action-now\/\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">2012 LinkedIn data breach<\/a><\/strong> exposed a whopping <strong>167 million accounts<\/strong> that were compromised, including 117 million passwords.<\/p>\n<p><a href=\"https:\/\/nakedsecurity.sophos.com\/2012\/06\/06\/millions-of-linkedin-passwords-reportedly-leaked-take-action-now\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98263 \" title=\"LinkedIn hack\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-thumb-e1563832795533-150x132.jpg?resize=101%2C89&#038;ssl=1\" alt=\"\" width=\"101\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-thumb-e1563832795533.jpg?resize=150%2C132&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-thumb-e1563832795533.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/linkedin-thumb-e1563832795533.jpg?w=219&amp;ssl=1 219w\" sizes=\"auto, (max-width: 101px) 100vw, 101px\" \/><\/a>The article says the passwords were hashed or encrypted so they can&#8217;t be read, but researchers at <a href=\"https:\/\/web.archive.org\/web\/20170118131112\/http:\/\/www.leakedsource.com:80\/main\/faq\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>LeakedSource<\/em><\/a> have been able to decrypt them. Their findings should be no surprise to Bach Seat followers. The results show just how much the same<strong> passwords get used over and over (and over and over and over and over) again<\/strong>.<\/p>\n<h3>Most often used passwords<\/h3>\n<p>92% of the top <strong>leaked LinkedIn passwords<\/strong> were identified as the top <strong>25 most often used passwords<\/strong> in 2011 or 2012. Nearly half of the passwords listed were the most commonly used password in 2011, 2012, or 2013. The top 5 bad passwords were used to \u201csecure\u201d over 1.2 million accounts.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160420021514\/http:\/\/www.fiercebigdata.com:80\/story\/data-monetization-twist-1-5-employees-say-they-would-sell-their-passwords\/2016-03-23\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98266 \" title=\"Passwords\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords.jpg?resize=100%2C70&#038;ssl=1\" alt=\"Passwords\" width=\"100\" height=\"70\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/passwords.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>The <em>LeakedSource<\/em> data says the <strong>most<\/strong> <strong>popular password<\/strong> for LinkedIn in 2012 was <strong>123456<\/strong>. That password was used by more than 750,000 accounts. <a href=\"https:\/\/wp.me\/p2wgaW-kzJ\" target=\"_blank\" rel=\"noopener noreferrer\">Data<\/a> the <em>Bach Seat<\/em> has collected says that 123456 has been the top 1 or 2 passwords every year used since 2011.<\/p>\n<p>The remarkably unstealthy password <strong>\u2019linkedin\u2019<\/strong> is the second most used password on these breached LinkedIn accounts with 172,523 users. That is just so wrong on so many levels.<\/p>\n<p>The <strong>password \u2018password\u2019<\/strong> is number three with 144,458 hacked LinkedIn users relying on it to secure their professional profile. Our historical data says that \u2018password\u2019 has swapped the top ranking with \u2018123456\u2019 since 2011.<\/p>\n<p><strong>\u2018<a href=\"https:\/\/web.archive.org\/web\/20160322165736\/http:\/\/jackcollier7.com\/2016\/02\/27\/women-and-advice\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98268 \" title=\"password is \u2018password\u2019\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/exasperated-woman.jpg?resize=120%2C90&#038;ssl=1\" alt=\"password is \u2018password\u2019\" width=\"120\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/exasperated-woman.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/exasperated-woman.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/exasperated-woman.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/><\/a>12345678\u2019<\/strong> is the fourth most popular bad LinkedIn password with 94,214 users according to <em>LeakedSource<\/em>. This password has been a consistent #3 in my data.<\/p>\n<p>The data for the top 49 passwords is below. You can <strong>search for your user name<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20201024114301\/http:\/\/leakedsource.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>\u00a0 Fix your passwords.<\/p>\n\n<table id=\"tablepress-43\" class=\"tablepress tablepress-id-43\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Rank<\/th><th class=\"column-2\">Password<\/th><th class=\"column-3\">Frequency<\/th><th class=\"column-4\">Notes<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">123456<\/td><td class=\"column-3\">753,305<\/td><td class=\"column-4\">#2 in 2012<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">linkedin<\/td><td class=\"column-3\">172,523<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">password<\/td><td class=\"column-3\">144,458<\/td><td class=\"column-4\">#1 In 2012<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">123456789<\/td><td class=\"column-3\">94,314<\/td><td class=\"column-4\">#6 in 2012<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">12345678<\/td><td class=\"column-3\">63,769<\/td><td class=\"column-4\">#3 in 2012<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">111111<\/td><td class=\"column-3\">57,210<\/td><td class=\"column-4\">#12 in 2011<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">1234567<\/td><td class=\"column-3\">49,652<\/td><td class=\"column-4\">#7 in 2011<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">sunshine<\/td><td class=\"column-3\">39,118<\/td><td class=\"column-4\">#15 in 2011<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">qwerty<\/td><td class=\"column-3\">37,538<\/td><td class=\"column-4\">#4 in 2011<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">654321<\/td><td class=\"column-3\">33,854<\/td><td class=\"column-4\">#21 in 2011<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">000000<\/td><td class=\"column-3\">32,490<\/td><td class=\"column-4\">#25 in 2013<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">password1<\/td><td class=\"column-3\">30,981<\/td><td class=\"column-4\">#21 in 2013<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">abc123<\/td><td class=\"column-3\">30,398<\/td><td class=\"column-4\">#5 in 2011<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">charlie<\/td><td class=\"column-3\">28,049<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">linked<\/td><td class=\"column-3\">25,334<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">maggie<\/td><td class=\"column-3\">23,892<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">michael<\/td><td class=\"column-3\">23,075<\/td><td class=\"column-4\">#16 in 2012<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">18<\/td><td class=\"column-2\">666666<\/td><td class=\"column-3\">22,888<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">19<\/td><td class=\"column-2\">princess<\/td><td class=\"column-3\">22,122<\/td><td class=\"column-4\">#22 in 2013<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">20<\/td><td class=\"column-2\">123123<\/td><td class=\"column-3\">21,826<\/td><td class=\"column-4\">#11 in 2013<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">21<\/td><td class=\"column-2\">iloveyou<\/td><td class=\"column-3\">20,251<\/td><td class=\"column-4\">#9 in 2013<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">22<\/td><td class=\"column-2\">1234567890<\/td><td class=\"column-3\">19,575<\/td><td class=\"column-4\">#13 in 2013<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">23<\/td><td class=\"column-2\">Linkedin1<\/td><td class=\"column-3\">19,441<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">24<\/td><td class=\"column-2\">daniel<\/td><td class=\"column-3\">19,184<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">25<\/td><td class=\"column-2\">bailey<\/td><td class=\"column-3\">18,805<\/td><td class=\"column-4\">#17 in 2011<\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">26<\/td><td class=\"column-2\">welcome<\/td><td class=\"column-3\">18,504<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">27<\/td><td class=\"column-2\">buster<\/td><td class=\"column-3\">18,395<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">28<\/td><td class=\"column-2\">Passw0rd<\/td><td class=\"column-3\">18,208<\/td><td class=\"column-4\">#18 in 2011<\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">29<\/td><td class=\"column-2\">baseball<\/td><td class=\"column-3\">17,858<\/td><td class=\"column-4\">#9 in 2012<\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">30<\/td><td class=\"column-2\">shadow<\/td><td class=\"column-3\">17,781<\/td><td class=\"column-4\">#17 in 2011<\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">31<\/td><td class=\"column-2\">121212<\/td><td class=\"column-3\">17,134<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">32<\/td><td class=\"column-2\">hannah<\/td><td class=\"column-3\">17,040<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">33<\/td><td class=\"column-2\">monkey<\/td><td class=\"column-3\">16,958<\/td><td class=\"column-4\">#6 in 2011<\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">34<\/td><td class=\"column-2\">thomas<\/td><td class=\"column-3\">16,789<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">35<\/td><td class=\"column-2\">summer<\/td><td class=\"column-3\">16,652<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">36<\/td><td class=\"column-2\">george<\/td><td class=\"column-3\">16,620<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">37<\/td><td class=\"column-2\">harley<\/td><td class=\"column-3\">16,275<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-39\">\n\t<td class=\"column-1\">38<\/td><td class=\"column-2\">222222<\/td><td class=\"column-3\">16,165<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-40\">\n\t<td class=\"column-1\">39<\/td><td class=\"column-2\">jessica<\/td><td class=\"column-3\">16,088<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-41\">\n\t<td class=\"column-1\">40<\/td><td class=\"column-2\">GINGER<\/td><td class=\"column-3\">16,040<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-42\">\n\t<td class=\"column-1\">41<\/td><td class=\"column-2\">michelle<\/td><td class=\"column-3\">16,024<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-43\">\n\t<td class=\"column-1\">42<\/td><td class=\"column-2\">abcdef<\/td><td class=\"column-3\">15,938<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-44\">\n\t<td class=\"column-1\">43<\/td><td class=\"column-2\">sophie<\/td><td class=\"column-3\">15,884<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-45\">\n\t<td class=\"column-1\">44<\/td><td class=\"column-2\">jordan<\/td><td class=\"column-3\">15,839<\/td><td class=\"column-4\">#22 in 2012<\/td>\n<\/tr>\n<tr class=\"row-46\">\n\t<td class=\"column-1\">45<\/td><td class=\"column-2\">freedom<\/td><td class=\"column-3\">15,793<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-47\">\n\t<td class=\"column-1\">46<\/td><td class=\"column-2\">555555<\/td><td class=\"column-3\">15,664<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-48\">\n\t<td class=\"column-1\">47<\/td><td class=\"column-2\">tigger<\/td><td class=\"column-3\">15,658<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-49\">\n\t<td class=\"column-1\">48<\/td><td class=\"column-2\">joshua<\/td><td class=\"column-3\">15,628<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-50\">\n\t<td class=\"column-1\">49<\/td><td class=\"column-2\">pepper<\/td><td class=\"column-3\">15,610<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>The advice remains the same as I <a href=\"https:\/\/wp.me\/p2wgaW-uw\" target=\"_blank\" rel=\"noopener\">wrote about in 2010<\/a>. <\/em><\/p>\n<p><em><strong>Strong passwords characteristics:<\/strong><\/em><br \/>\n<em> \u2022 At least eight (8) alpha-numeric characters<\/em><br \/>\n<em> \u2022 At least one numeric character (0-9)<\/em><br \/>\n<em> \u2022 At least one lower case character (a-z)<\/em><br \/>\n<em> \u2022 At least one upper case character (A-Z)<\/em><br \/>\n<em> \u2022 At least one non-alphanumeric character* (~, !, @, #, $, %, ^, &amp;, *, (, ), -, =, +, ?, [, ], {, })<\/em><br \/>\n<em> \u2022 Are not a word in any language, slang, dialect, jargon, etc.<\/em><br \/>\n<em> \u2022 Are not based on personal information, names of family, etc.<\/em><br \/>\n<em> \u2022 Are never written down or stored online.<\/em><\/p>\n<h6><em>Related articles<\/em><\/h6>\n<ul>\n<li><a href=\"http:\/\/www.eweek.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LinkedIn&#8217;s 2012 Breach Still Puts Users at Risk<\/a> (eweek.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Only five bad passwords were used to \u201csecure\u201d over 1.2 million LinkedIn accounts exposed during the 2012 data breach.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,2684,824,317,696,82,421,209,4,2685],"class_list":["post-80328","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-advanced-encryption-standard","tag-encryption","tag-linkedin","tag-lnkd","tag-microsoft","tag-msft","tag-password","tag-security","tag-sha-1"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=80328"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80328\/revisions"}],"predecessor-version":[{"id":129056,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80328\/revisions\/129056"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=80328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=80328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=80328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}