{"id":81318,"date":"2016-09-17T16:17:14","date_gmt":"2016-09-17T20:17:14","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2024-07-05T12:08:15","modified_gmt":"2024-07-05T16:08:15","slug":"mind-readers-can-steal-your-info","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/mind-readers-can-steal-your-info\/","title":{"rendered":"Mind Readers Can Steal Your Biometric Info"},"content":{"rendered":"<p><a href=\"http:\/\/findbiometrics.com\/news-roundup-brainwave-biometrics-304250\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-100418\" title=\"Mind Readers Can Steal Your Biometric Info\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?resize=154%2C90&#038;ssl=1\" alt=\"Mind Readers Can Steal Your Biometric Info\" width=\"154\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?resize=150%2C88&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?resize=75%2C44&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?resize=768%2C453&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?resize=1024%2C604&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IoT_logo.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 154px) 100vw, 154px\" \/><\/a>By now, most people have come to the position that<strong> <a href=\"https:\/\/www.fastcompany.com\/3055656\/the-recommender\/the-25-most-popular-passwords-of-2015-or-humans-suck\" target=\"_blank\" rel=\"noopener noreferrer\">passwords<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-kq6\" target=\"_blank\" rel=\"noopener noreferrer\">suck<\/a><\/strong>. The momentum for alternate means of authentication is <a href=\"http:\/\/betanews.com\/2016\/06\/28\/passwords-suck-consumers-biometrics\/\" target=\"_blank\" rel=\"noopener noreferrer\">growing<\/a>. Researchers are working on how to use <strong>biometric technology<\/strong> for mainstream login activities. As I have pointed out there is a number of <a href=\"https:\/\/rbach.net\/index.php\/password-free-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">emerging<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-jFa\" target=\"_blank\" rel=\"noopener noreferrer\">biometric<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-kOm\" target=\"_blank\" rel=\"noopener noreferrer\">techniques<\/a> like; <a href=\"https:\/\/wp.me\/p2wgaW-5I2\" target=\"_blank\" rel=\"noopener noreferrer\">iris scans<\/a>, <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/06\/11\/facial-recognition-technology-is-everywhere-it-may-not-be-legal\/\" target=\"_blank\" rel=\"noopener noreferrer\">facial recognition<\/a>, or <a href=\"http:\/\/whatis.techtarget.com\/definition\/behavioral-biometrics\" target=\"_blank\" rel=\"noopener noreferrer\">behavioral characteristics<\/a>. All of these methods have<strong> flaws<\/strong>, which pose a problem for authentication <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/nonrepudiation\" target=\"_blank\" rel=\"noopener noreferrer\">non-repudiation.<\/a><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100415 \" title=\"passwords suck\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_Sux_t-shirt-e1565745272927-75x71.png?resize=91%2C86&#038;ssl=1\" alt=\"passwords suck\" width=\"91\" height=\"86\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_Sux_t-shirt-e1565745272927.png?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_Sux_t-shirt-e1565745272927.png?resize=150%2C142&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pwd_Sux_t-shirt-e1565745272927.png?w=572&amp;ssl=1 572w\" sizes=\"auto, (max-width: 91px) 100vw, 91px\" \/>In a <a href=\"http:\/\/spectrum.ieee.org\/the-human-os\/biomedical\/devices\/logging-into-your-devices-with-your-mind\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a> at <em><a href=\"http:\/\/www.ieee.org\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE<\/a> <a href=\"http:\/\/spectrum.ieee.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Spectrum<\/a><\/em>, <a href=\"http:\/\/megan.scudellari.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Megan Scudellari<\/a> writes that <a href=\"https:\/\/wp.me\/p2wgaW-kLj\" target=\"_blank\" rel=\"noopener noreferrer\">fingerprints can be stolen<\/a>, <a href=\"https:\/\/www.eff.org\/deeplinks\/2012\/07\/red-flag-biometrics-iris-scanner-vulnerability-revealed\" target=\"_blank\" rel=\"noopener noreferrer\">iris scans spoofed<\/a>, and <a title=\"Facial recognition system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Facial_recognition_system\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">facial recognition software<\/a> fooled. In the wake of these flaws, researchers have turned to <strong>brain waves as the next step in biometric identification<\/strong>. <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometric-verification\" target=\"_blank\" rel=\"noopener noreferrer\">Biometric identification<\/a> is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures.<\/p>\n<p>The researchers are racing to prove how accurately and accessibly they can verify a person\u2019s identity using <strong>electroencephalograph<\/strong> (<a title=\"Electroencephalography\" href=\"http:\/\/en.wikipedia.org\/wiki\/Electroencephalography\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">EEG<\/a>) data. An <a href=\"http:\/\/www.mayoclinic.org\/tests-procedures\/eeg\/basics\/definition\/prc-20014093\" target=\"_blank\" rel=\"noopener noreferrer\">EEG<\/a> is a test that detects electrical activity in the brain using electrodes attached to the scalp. The IEEE article explains that as your eyes skim over these pixels you are reading and turn them into meaningful words, your <strong>brain cells are flickering with a pattern of electrical activity that is unique to you<\/strong>. These unique\u00a0patterns can be used like a password or biometric identification. In fact, researchers have taken to calling them \u201c<strong>passthoughts<\/strong>\u201d.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20220201040649\/http:\/\/brainvision.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100421 \" title=\"brain cells are flickering with a pattern of electrical activity that is unique to you\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_scan-e1565745354611-117x150.png?resize=75%2C97&#038;ssl=1\" alt=\"brain cells are flickering with a pattern of electrical activity that is unique to you\" width=\"75\" height=\"97\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_scan-e1565745354611.png?resize=117%2C150&amp;ssl=1 117w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_scan-e1565745354611.png?resize=58%2C75&amp;ssl=1 58w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_scan-e1565745354611.png?w=268&amp;ssl=1 268w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Using brainwaves to authenticate people goes back a while. Back in 2012, I <a href=\"https:\/\/wp.me\/p2wgaW-5Ez\" target=\"_blank\" rel=\"noopener\">wrote about<\/a> the Muse headband sensor which promised to \u201ccreate a specific brainwave signature or a password they would never have to say out loud or type into a computer.\u201d More recently, psychologists and engineers at <a title=\"Binghamton University\" href=\"http:\/\/maps.google.com\/maps?ll=42.0888,-75.967&amp;spn=0.01,0.01&amp;q=42.0888,-75.967 (Binghamton%20University)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Binghamton University<\/a> in New York achieved<a href=\"http:\/\/spectrum.ieee.org\/biomedical\/devices\/brainprint-biometric-id-hits-100-accuracy\" target=\"_blank\" rel=\"noopener noreferrer\"> 100 percent accuracy<\/a> at <strong>identifying individuals using brain waves<\/strong> captured with a skullcap with 30 electrodes. Scientists at the University of California at Berkeley have adopted a set of earbud sensors that worked with <a href=\"http:\/\/spectrum.ieee.org\/the-human-os\/biomedical\/devices\/logging-into-your-devices-with-your-mind\" target=\"_blank\" rel=\"noopener noreferrer\">80 percent accuracy<\/a>.<\/p>\n<p>The problem is our brains don\u2019t produce a single, clear signal that can be checked like a fingerprint. The article says <strong>our brains emit a messy, vibrant symphony of personal information<\/strong>, including one\u2019s emotional state, learning ability, and personality traits. The author contends that as EEG technology becomes cheaper, portable, and more ubiquitous\u2014not only for identity authentication, but in apps, games, and more\u2014 there\u2019s a high <strong>likelihood that someone will tap into that concerto of information for malicious purposes<\/strong>. <a href=\"http:\/\/www.depts.ttu.edu\/CS\/faculty\/faculty.php?name=Abdul%20Serwadda\" target=\"_blank\" rel=\"noopener noreferrer\">Abdul Serwadda<\/a>, a cybersecurity researcher at <a title=\"Texas Tech University\" href=\"http:\/\/www.ttu.edu\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Texas Tech University<\/a> told <em>Spectrum;<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>If you have these apps, you don\u2019t know what the app is reading from your brain or what [the app\u2019s creators are] going to use that information for, but you do know they\u2019re going to have a lot of information<\/em><\/p>\n<p>The Texas Tech team performed experiments to see if they could glean <a title=\"Personally identifiable information\" href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">sensitive personal information<\/a> from brain data captured by two popular EEG-based authentication systems. <strong>Surprise, surprise: they were able to capture sensitive personal information from brain data<\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20161017071046\/http:\/\/sparkexperience.com:80\/sparks-crystal-ball-using-biometrics-to-measure-attention-and-emotion\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-100424 \" title=\"capture sensitive personal information from brain data.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/reading_minds-e1565745492683-150x97.jpg?resize=319%2C206&#038;ssl=1\" alt=\"capture sensitive personal information from brain data.\" width=\"319\" height=\"206\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/reading_minds-e1565745492683.jpg?resize=150%2C97&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/reading_minds-e1565745492683.jpg?resize=75%2C49&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/reading_minds-e1565745492683.jpg?resize=768%2C499&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/reading_minds-e1565745492683.jpg?w=911&amp;ssl=1 911w\" sizes=\"auto, (max-width: 319px) 100vw, 319px\" \/><\/a><\/p>\n<p>Mr. Serwadda presented his <a href=\"http:\/\/ieee-biometrics.org\/btas2016\/cprogram.html\" target=\"_blank\" rel=\"noopener noreferrer\">results<\/a> at the <a href=\"http:\/\/ieee-biometrics.org\/btas2016\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE International Conference on Biometrics<\/a>. The Texas Tech researchers examined EEG-based authentication systems that claimed high levels of authentication accuracy. One system examined was the Berkley model, and the second was based on the Binghamton model. The article explains that these <strong>EEG-based authentication systems utilize specific features, or markers, of brain activity to identify a person<\/strong>, like isolating the melody of a specific orchestra instrument to identify a song.<\/p>\n<p><a href=\"https:\/\/racheltaylorgeier.org\/2015\/03\/21\/listen-up\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100426 size-medium\" title=\"Listening\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/listening-1-e1565745596742-150x91.jpg?resize=150%2C91&#038;ssl=1\" alt=\"Listening\" width=\"150\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/listening-1-e1565745596742.jpg?resize=150%2C91&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/listening-1-e1565745596742.jpg?resize=75%2C46&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/listening-1-e1565745596742.jpg?w=269&amp;ssl=1 269w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The researchers wanted to see if those markers also contained sensitive personal information\u2014in this case, a tendency for alcoholism. They ran old EEG scans which included alcoholics and non-alcoholics through the systems. Using the brain wave data, they were able to accurately identify 25% of the alcoholics in the sample. That\u2019s 25% of people who just lost their privacy. Mr. Serwadda said;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>We weren\u2019t surprised, because we know the brain signal is so rich in information \u2026 But it is scary. [Wearable brain measurement] is an application that\u2019s just about to go mainstream, and you can infer a lot of information about users.<\/em><\/p>\n<p>The researcher said that <strong>malicious third parties could mine brain data<\/strong> to make inferences about learning disabilities, mental illnesses, and more. He told <em>Spectrum<\/em>, \u201cImagine if you made these things public, and insurance companies became aware of them \u2026 It would be terrible.\u201d<\/p>\n<p><a href=\"http:\/\/www.ioactive.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">IOActive<\/a> senior consultant Alejandro Hern\u00e1ndez <a href=\"http:\/\/www.theregister.co.uk\/2015\/10\/13\/brain_waves_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em><a href=\"http:\/\/www.theregister.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Register<\/a> <\/em>that dangerous vulnerabilities exist in EEG kits. EEG&#8217;s security problems are depressingly familiar results of bad software design, Hern\u00e1ndez said. EEG devices are vulnerable to man-in-the-middle attacks, as well as less-severe application vulnerabilities and ordinary crashes. Mr. Hern\u00e1ndez says.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>&#8230; some applications send the raw brain waves to another remote endpoint using the TCP\/IP protocol, that by design doesn\u2019t include security, and therefore this kind of traffic is prone to common network attacks such as man-in-the-middle where an attacker would be able to intercept and modify the EEG data sent.<\/em><\/p>\n<p><a href=\"http:\/\/consciouslifenews.com\/benefits-4-brain-wave-frequencies-need-tune-one\/1177238\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100428 \" title=\"steal raw EEG data\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_waves-e1565745671718-150x94.jpg?resize=141%2C88&#038;ssl=1\" alt=\"steal raw EEG data\" width=\"141\" height=\"88\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_waves-e1565745671718.jpg?resize=150%2C94&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_waves-e1565745671718.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/brain_waves-e1565745671718.jpg?w=607&amp;ssl=1 607w\" sizes=\"auto, (max-width: 141px) 100vw, 141px\" \/><\/a>The IOActive consultant found that components like the acquisition device, middleware, and endpoints lack authentication meaning an attacker can connect to a remote TCP port and steal raw EEG data. That same flaw lets attacks pull off the more dangerous reply attacks.<\/p>\n<p>Unfortunately, the <strong>researchers do not have a solution for how to secure such information<\/strong>\u2014though in the study, compromising a little on authentication accuracy did reduce the ability to detect who was an alcoholic. Mr. Serwadda hopes other research teams will now take privacy, and not just accuracy, into account when optimizing such systems. Professor Serwadda concludes, \u201cWe have to prepare for the movement of brain wave [assessment] into our daily lives.\u201d<\/p>\n<p><em><strong>Rb-<\/strong><\/em><\/p>\n<p><em>Given the willingness of apps developers to sell share any info to any third party and the unwillingness of the public to take even basic steps to secure their info online, everyone&#8217;s deepest personal information can be hacked in the future.<\/em><\/p>\n<p><em>Another problem with passthoughts UC Berkeley&#8217;s <a href=\"http:\/\/www.ischool.berkeley.edu\/people\/faculty\/johnchuang\">John Chuang<\/a> identifies that stress, mood, alcohol, caffeine, medicine, and\u00a0mental\u00a0fatigue could change the electrical signals that are generated.<\/em><\/p>\n<p><em>Despite advances in logging in with your mind, there might always be a need for an old-fashioned eight-plus character phrase with no spaces. \u201c<strong>Passwords will never go away<\/strong>,\u201d says Berkeley&#8217;s Chuang. He reasons that\u00a0for a computer, a typed password may be the easiest way to verify identity, while a finger swipe may be best for\u00a0a touch screen.<\/em><\/p>\n<p><em>But we need to think beyond those to future devices\u2014<strong>wearables<\/strong>, for instance\u2014for which there will be neither a keyboard nor a touch screen.\u00a0\u201cFor each device, we must figure out what are the most natural, intuitive ways to tell the device that we are who we are,\u201d Professor Chuang says.\u00a0Going directly to the brain seems like an obvious choice.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.thestar.com\/news\/canada\/2016\/09\/15\/cyberattack-on-biometric-data-poses-security-risks-at-border-documents-warn.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cyberattack on biometric data poses security risks at border, documents warn<\/a> (thestar.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers may steal your personal info by hijacking your thoughts thru brainwave biometric technology.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,1452,1420,2765,2764,608,76,2763,2541,951,4,2649],"class_list":["post-81318","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-biometrics","tag-brain","tag-eeg","tag-electroencephalograph","tag-identity-theft","tag-ieee","tag-passthoughts","tag-passwords","tag-pii","tag-security","tag-wearable"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=81318"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81318\/revisions"}],"predecessor-version":[{"id":131678,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81318\/revisions\/131678"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=81318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=81318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=81318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}