{"id":19354,"date":"2013-07-08T15:02:07","date_gmt":"2013-07-08T20:02:07","guid":{"rendered":"https:\/\/eshop.macsales.com\/blog\/?p=19354"},"modified":"2014-05-22T13:24:31","modified_gmt":"2014-05-22T18:24:31","slug":"welcome-to-the-digi-zompocalypse","status":"publish","type":"post","link":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/","title":{"rendered":"Welcome to the Digi-Zompocalypse"},"content":{"rendered":"<p><a href=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-19376\" alt=\"ZombiePhone\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone.png\" width=\"137\" height=\"272\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone.png 280w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone-61x120.png 61w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone-163x323.png 163w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone-96x190.png 96w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone-61x120@2x.png 122w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone-96x190@2x.png 192w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/><\/a>No, this isn\u2019t another Zombie film starring Brad Pitt killing digital zombies (though I would totally watch that); this Zompocalypse deals with <a href=\"http:\/\/appleinsider.com\/articles\/13\/07\/03\/security-flaw-opens-all-modern-android-devices-to-zombie-botnet-takeover\">a new security flaw discovered in the Android operating system just a few days ago<\/a>. This flaw is particularly bad in that in affects all version of Android going all the way back to first smartphone release.<\/p>\n<h2><b>Security Flaw<\/b><\/h2>\n<p>The way it works is by allowing a hacker to modify an application\u2019s code without touching its signature, making it seem to the device and the app store to be perfectly legitimate. Once installed, the app can essentially rove around doing whatever it wants pulling data, harvesting passwords, tracking user locations, or even using the phone as a zombie to attack others on the net. Read more about the specifics from our friends at <a href=\"http:\/\/appleinsider.com\/articles\/13\/07\/03\/security-flaw-opens-all-modern-android-devices-to-zombie-botnet-takeover\">Appleinsider.com <!--more--><\/a><\/p>\n<h2><b>No Global Updates<\/b><\/h2>\n<p>As long as there have been OS\u2019s like Mac OS or Windows, there have been security updates, software enhancements, and other periodic improvements. The good thing is that those updates come directly from Apple and Microsoft.<\/p>\n<p>Unfortunately for Google, there\u2019s no centralized upgrade process of which they can issue an update for Android. This impossibility exists because of how Google created the operating system and the desire to be open to customization for manufacturers. All the major players in the Android world create their own experience known as interface layers. HTC has Sense, Samsung has TouchWiz, Motorola has MOTOBLUR, and there are many more that are always changing.<\/p>\n<h2><b>The Role of the Manufacturer<\/b><\/h2>\n<p>The people that are actually responsible to issue the software update are either the carrier or manufacturer, and not Google. The only caveat to this being if you have a Google branded phone or tablet. This creates a difficult problem in casting out updates through the user base of Android devices. It is not up to Google when an update is pushed to the users, it is up to the manufacturer to take the new update, change it to their liking and push it to their devices.<\/p>\n<p>Compare this to iOS. As of June, currently 93% of iPhone users are updated to the latest software: iOS 6. Only 33% of Android users are on Jelly Bean (the last major revision) and only 4% are on the latest version of that. Keep in mind that any stat that states a certain percentage of Android users run \u201cJelly Bean\u201d (or whatever version) is inaccurate as that percentage is made up from multiple customized versions simply based on \u201cJelly Bean\u201d.<\/p>\n<p>There is no incentive for the manufacturer to update their smartphones; they have already sold their product and are working on better, more lucrative devices to sell once again to make money.<\/p>\n<p>Even if Google created a global security fix for all past versions of Android, they would have to convince the manufacturers and carriers to spend the time programming, testing, and creating an update for all phones and all iterations ever made.<\/p>\n<p>This would inevitably undercut the bottom line, and thus many devices become unsupported and obsolete within roughly eight months of release. Updates stop coming and the user is left with an older Android version, and will not likely receive an updated version of Android until their next phone purchase or unless they take it upon themselves to root their phone.<\/p>\n<h2><b>A Hacker\u2019s Paradise<\/b><\/h2>\n<p>This lack of updates and an infrastructure that doesn\u2019t allow for a global update to be pushed to devices creates gaping security holes that cannot be patched. On iOS, once an exploit is identified and posted on the Internet, it is a race against the clock for hackers to use it to their advantage before Apple releases a patch, narrowing the amount of people the infection can reach, like a rapid first responder team. On Android it is not a lack of concern, but literally a lack of capability to contain the infection. Google immediately patches their software, but it can be years before a user buys a new phone and would receive it, leaving the user vulnerable for any malicious app to exploit that flaw.<\/p>\n<p>The bottom line is, without a major overhaul in the Android update ecosystem, these issues are never going to be alleviated, and will constantly plague its users. Manufacturer customizations need to be applied on top of the base code, allowing for updates to be sent by Google that don\u2019t disrupt the custom interfaces. How can you protect users with code that was developed over a year ago? The simple answer is, you can\u2019t.<\/p>\n<h2><b>Apple and Microsoft are Doing it Right<\/b><\/h2>\n<p>The two most dominant companies in building OS\u2019s knew how to build a structure that allows for centralized updating. As Android\u2019s history is written, it will likely be noted that allowing for multiple variants of Android to go in the wild, and rely on what is essentially a customized version of Android per vendor and per carrier, was a monumentally bad decision.<\/p>\n<p>Google must be lamenting their initial \u201copen software\u201d call, which caused this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do? Well, they could try to do some form of centralized updating structure in the future, but that would take years to get out as everyone needs to live the possible zombie in the pocket.<\/p>\n<h2><b>It\u2019s Not All Google\u2019s Fault<\/b><\/h2>\n<p>Before anyone gets to Google-bashing, let\u2019s keep in mind it\u2019s not entirely their fault. They built it, but it\u2019s also the carriers and manufacturers that build custom versions of Android and refuse or cannot properly support the software they made for the smartphones they\u2019ve sold. There\u2019s definitely some blame to share.<\/p>\n<p>With so much of our digital lives and info existing on smartphones, we as consumers need to demand better from those who provide these devices and the software that runs them. Voting with your pocketbook is usually the most effective means of protest.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>No, this isn\u2019t another Zombie film starring Brad Pitt killing digital zombies (though I would totally watch that); this Zompocalypse deals with a new security flaw discovered in the Android operating system just a few days ago. This flaw is particularly bad in that in affects all version of Android going all the way back [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":19376,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"spay_email":"","footnotes":""},"categories":[2646],"class_list":["post-19354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.2 (Yoast SEO v20.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Welcome to the Digi-Zompocalypse<\/title>\n<meta name=\"description\" content=\"Google has to be lamenting their initial \u201copen software\u201d call which lead to this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Welcome to the Digi-Zompocalypse\" \/>\n<meta property=\"og:description\" content=\"Google has to be lamenting their initial \u201copen software\u201d call which lead to this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\" \/>\n<meta property=\"og:site_name\" content=\"Rocket Yard\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-08T20:02:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-22T18:24:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone.png\" \/>\n\t<meta property=\"og:image:width\" content=\"280\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rocket Yard Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rocket Yard Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\"},\"author\":{\"name\":\"Rocket Yard Contributor\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/41210f6ded9a93e7b106ed9d227b8cdf\"},\"headline\":\"Welcome to the Digi-Zompocalypse\",\"datePublished\":\"2013-07-08T20:02:07+00:00\",\"dateModified\":\"2014-05-22T18:24:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\"},\"wordCount\":1002,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"keywords\":[\"Android\",\"apocalypse\",\"attack\",\"Cyber\",\"Droid\",\"flaw\",\"Google\",\"hack\",\"hacker\",\"Security\",\"updates\",\"zombie\"],\"articleSection\":[\"Industry News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\",\"name\":\"Welcome to the Digi-Zompocalypse\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\"},\"datePublished\":\"2013-07-08T20:02:07+00:00\",\"dateModified\":\"2014-05-22T18:24:31+00:00\",\"description\":\"Google has to be lamenting their initial \u201copen software\u201d call which lead to this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do?\",\"breadcrumb\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eshop.macsales.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Welcome to the Digi-Zompocalypse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"name\":\"Rocket Yard\",\"description\":\"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.\",\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\",\"name\":\"OWC\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"contentUrl\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"width\":1024,\"height\":1024,\"caption\":\"OWC\"},\"image\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/41210f6ded9a93e7b106ed9d227b8cdf\",\"name\":\"Rocket Yard Contributor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0664ff56a28a8e8c137acf09662e68dee85a4ce8b0ea7e463cf4593880838f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0664ff56a28a8e8c137acf09662e68dee85a4ce8b0ea7e463cf4593880838f1?s=96&d=mm&r=g\",\"caption\":\"Rocket Yard Contributor\"},\"description\":\"Would you like to contribute? If you have a tip, trick, or piece of knowledge that you would like to share with other readers, send your submissions to rocketyard@macsales.com!\",\"sameAs\":[\"http:\/\/blog.macsales.com\"],\"url\":\"https:\/\/eshop.macsales.com\/blog\/author\/guest-blogger\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Welcome to the Digi-Zompocalypse","description":"Google has to be lamenting their initial \u201copen software\u201d call which lead to this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/","og_locale":"en_US","og_type":"article","og_title":"Welcome to the Digi-Zompocalypse","og_description":"Google has to be lamenting their initial \u201copen software\u201d call which lead to this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do?","og_url":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/","og_site_name":"Rocket Yard","article_published_time":"2013-07-08T20:02:07+00:00","article_modified_time":"2014-05-22T18:24:31+00:00","og_image":[{"width":280,"height":554,"url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone.png","type":"image\/png"}],"author":"Rocket Yard Contributor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rocket Yard Contributor","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#article","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/"},"author":{"name":"Rocket Yard Contributor","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/41210f6ded9a93e7b106ed9d227b8cdf"},"headline":"Welcome to the Digi-Zompocalypse","datePublished":"2013-07-08T20:02:07+00:00","dateModified":"2014-05-22T18:24:31+00:00","mainEntityOfPage":{"@id":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/"},"wordCount":1002,"commentCount":2,"publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"keywords":["Android","apocalypse","attack","Cyber","Droid","flaw","Google","hack","hacker","Security","updates","zombie"],"articleSection":["Industry News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/","url":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/","name":"Welcome to the Digi-Zompocalypse","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/#website"},"datePublished":"2013-07-08T20:02:07+00:00","dateModified":"2014-05-22T18:24:31+00:00","description":"Google has to be lamenting their initial \u201copen software\u201d call which lead to this massive fragmentation, which lead to the massively insecure mobile operating environment. What are they to do?","breadcrumb":{"@id":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eshop.macsales.com\/blog\/19354-welcome-to-the-digi-zompocalypse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eshop.macsales.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Welcome to the Digi-Zompocalypse"}]},{"@type":"WebSite","@id":"https:\/\/eshop.macsales.com\/blog\/#website","url":"https:\/\/eshop.macsales.com\/blog\/","name":"Rocket Yard","description":"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.","publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eshop.macsales.com\/blog\/#organization","name":"OWC","url":"https:\/\/eshop.macsales.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","contentUrl":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","width":1024,"height":1024,"caption":"OWC"},"image":{"@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/41210f6ded9a93e7b106ed9d227b8cdf","name":"Rocket Yard Contributor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0664ff56a28a8e8c137acf09662e68dee85a4ce8b0ea7e463cf4593880838f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0664ff56a28a8e8c137acf09662e68dee85a4ce8b0ea7e463cf4593880838f1?s=96&d=mm&r=g","caption":"Rocket Yard Contributor"},"description":"Would you like to contribute? If you have a tip, trick, or piece of knowledge that you would like to share with other readers, send your submissions to rocketyard@macsales.com!","sameAs":["http:\/\/blog.macsales.com"],"url":"https:\/\/eshop.macsales.com\/blog\/author\/guest-blogger\/"}]}},"jetpack_featured_media_url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2013\/07\/ZombiePhone.png","jetpack_shortlink":"https:\/\/wp.me\/pmPaT-52a","_links":{"self":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/19354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/comments?post=19354"}],"version-history":[{"count":14,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/19354\/revisions"}],"predecessor-version":[{"id":19384,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/19354\/revisions\/19384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media\/19376"}],"wp:attachment":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media?parent=19354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/categories?post=19354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}