{"id":24052,"date":"2022-08-17T06:36:39","date_gmt":"2022-08-17T10:36:39","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=24052"},"modified":"2022-08-17T06:36:39","modified_gmt":"2022-08-17T10:36:39","slug":"wednesday-newsbytes-microsoft-admits-it-cant-stop-spammers-how-to-avoid-spam-surveillance-is-everywhere-you-are-being-watched-scammers-are-using-this-sneaky-tactic-amazons-secret-coupon-pag","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-microsoft-admits-it-cant-stop-spammers-how-to-avoid-spam-surveillance-is-everywhere-you-are-being-watched-scammers-are-using-this-sneaky-tactic-amazons-secret-coupon-pag\/","title":{"rendered":"Wednesday Newsbytes: Microsoft Admits It Can&#8217;t Stop Spammers, How to Avoid Spam, Surveillance is Everywhere &#8211; You Are Being Watched, Scammers are Using This Sneaky Tactic, Amazon&#8217;s Secret Coupon Page&#8230;and more!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Wednesday Newsbytes: Microsoft Admits It Can&#8217;t Stop Spammers, How to Avoid Spam, Surveillance is Everywhere &#8211; You Are Being Watched, Scammers are Using This Sneaky Tactic, Amazon&#8217;s Secret Coupon Page&#8230;and more!<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature some news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8216;Wednesday Newsbytes&#8217; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-admits-it-cant-stop-scammers-fooling-you-with-their-latest-tricks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\">Microsoft admits it can&#8217;t stop scammers fooling you with their latest tricks<\/span><\/strong><\/span><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">The scammers are, apparently, just too good.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">I&#8217;m a folder-emptier.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">I don&#8217;t like little red circles on my iPhone and I never leave an unread email in my Hotmail inbox.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Lately, though, more and more strange things have been appearing.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Junky, phishy, evil-minded emails trying to bait me into submission.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">This led me to pay extra attention to my junk mail &#8212; largely because, ironically, legitimate emails sometimes end up there.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">But let&#8217;s focus on the phishy and the evil-minded that appear in both my junk mail and my inbox. Sometimes, they&#8217;re the very same emails, one day after another.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Often misspelled and written in strange typefaces, they sometimes even claim they&#8217;re from, oh, Microsoft.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">But I&#8217;ve been noticing some disturbing and changing patterns.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">My Company Is Taking The Trouble To Help You.<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">One was the increasing plethora of junk that creeps into my inbox from apparently real companies. ADT Security, LeafFilter, HelloFresh, Sono Bello Body Contouring (&#8220;One Day Fat Removal&#8221;) and American Home Warranty are names that seem to waft in daily.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">And what messages. From the alleged American Home Warranty: &#8216;Will take the trouble of repairing your house &#8212; info here!&#8217;&#8230;<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">We Try, But We Can&#8217;t Stop It. <\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Email is, by its very nature, a medium that constantly assaults your attention, so it&#8217;s easy to open such emails automatically and even respond to them without sufficient thought.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">I did it once, many years ago &#8212; I clicked on the link even. I was very, very lucky that it seemed to cause no subsequent damage.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">I asked Microsoft why the company is still unable to make sure that all this sort of stuff goes straight to junk. Especially as more and more of it now appears in my regular inbox.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A company spokesman explained that you can customize your junk folder. You can more aggressively filter your junk mail &#8212; the default is set for &#8220;No Automatic Filtering.&#8221;<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Ultimately, though, defeat always lurks, even in your inbox&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-admits-it-cant-stop-scammers-fooling-you-with-their-latest-tricks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline; font-size: 18pt;\">Read more at ZDNet<\/span><\/strong><\/span><\/a><\/p>\n<blockquote>\n<hr \/>\n<p><a href=\"https:\/\/clark.com\/protect-your-identity\/temporary-email-address\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 24pt;\">How To Create a Throwaway Email To Avoid Spam<\/span><\/strong><\/span><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Have you ever been asked to share your email address to get a discount or other offer? People are becoming more aware of the dangers involved when giving out their real email addresses.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Tips To Help Avoid Spam in Your Inbox<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">By not providing your personal email address, you can avoid getting spam, junk mail, malicious email and other unwanted content delivered to your personal inbox.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Try a Disposable Email Service<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A disposable email address is an email address that you can use once or just temporarily when you need to provide an email address when ordering online, signing up for a service, filling out a form \u2014 or any other time you\u2019re asked to provide an email address but you don\u2019t want to use your personal email.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Most disposable email services are free to use or offer free and paid versions. Here are four that I recommend.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TrashMail<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">TrashMail is simple and straightforward. The email you receive will be forwarded to your personal email address or any address you choose. You can set a limit on the number of messages that are received and the number of days before the disposable address will stop forwarding messages.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">10 Minute Mail<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">As the name implies, 10 Minute Mail lets you obtain a temporary email address for 10 minutes. You can send, read and reply to emails during that time, and the site allows you to receive emails with attachments. The address will expire after 10 minutes. However, there is an option of extending the timer for an additional 10 minutes if you need more time.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Maildrop<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Maildrop lets you select your own temporary email address, or you can use one the site provides.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">According to Maildrop, it permits plain text or HTML messages. It doesn\u2019t allow for attachments, so any email attachment will be removed. All messages must be less than 500k in size.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">To quote Maildrop: \u201cAn inbox can hold at most 10 messages, and any inbox which does not receive a message within 24 hours will be automatically cleared.\u201d<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Maildrop also uses a spam filter, so most junk mail will not come through. Maildrop has no sign up, there is no password associated with the account, no security and no privacy. It is strictly a temporary email to use quickly and be done with&#8230;<\/span><\/p><\/blockquote>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/clark.com\/protect-your-identity\/temporary-email-address\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 18pt;\">Read more at Clark.com.<\/span><\/strong><\/span><\/a><\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/bigthink.com\/the-present\/surveillance\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Surveillance is pervasive: Yes, you are being watched, even if no one is looking for you<\/span><\/strong><\/a><\/p>\n<p><span style=\"color: #999999; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 18pt;\">Video cameras on city streets are only the most visible way your movements can be tracked.<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The U.S. has the largest number of surveillance cameras per person in the world. Cameras are omnipresent on city streets and in hotels, restaurants, malls and offices. They\u2019re also used to screen passengers for the Transportation Security Administration. And then there are smart doorbells and other home security cameras.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Most Americans are aware of video surveillance of public spaces. Likewise, most people know about online tracking \u2013 and want Congress to do something about it. But as a researcher who studies digital culture and secret communications, I believe that to understand how pervasive surveillance is, it\u2019s important to recognize how physical and digital tracking work together.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Databases can correlate location data from smartphones, the growing number of private cameras, license plate readers on police cruisers and toll roads, and facial recognition technology, so if law enforcement wants to track where you are and where you\u2019ve been, they can. They need a warrant to use cellphone search equipment: Connecting your device to a mobile device forensic tool lets them extract and analyze all your data if they have a warrant.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">However, private data brokers also track this kind of data and help surveil citizens \u2013 without a warrant. There is a large market for personal data, compiled from information people volunteer, information people unwittingly yield \u2013 for example, via mobile apps \u2013 and information that is stolen in data breaches. Among the customers for this largely unregulated data are federal, state and local law enforcement agencies.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">How you are tracked<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Whether or not you pass under the gaze of a surveillance camera or license plate reader, you are tracked by your mobile phone. GPS tells weather apps or maps your location, Wi-Fi uses your location, and cell-tower triangulation tracks your phone. Bluetooth can identify and track your smartphone&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/bigthink.com\/the-present\/surveillance\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Read more at<\/span><span style=\"text-decoration-line: underline; font-family: helvetica, arial, sans-serif; font-size: 18pt;\"> Big Think<\/span><\/strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><strong>.<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/lifehacker.com\/dont-use-in-app-browsers-for-anything-important-1849401900\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Don&#8217;t Use In-App Browsers for Anything Important<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif; color: #999999;\">The best way to prevent JavaScript injection attacks is to use a trusted browser.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Both Apple and Google are doing great work to prevent multi-site tracking. Google Chrome is slowly phasing out cookies, and Apple goes the furthest by asking users to block multi-app\/multi-site tracking using their app transparency popups.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Custom in-app browsers are out of their reach, though. Such browsers are annoying by default, as they won\u2019t have the history, usernames, passwords, or sharing options from your default browsers. But while they are most commonly found in apps like Facebook and Instagram, they aren\u2019t limited to the big two Meta apps.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Because the app developers themselves code in-app browsers, they have a lot more freedom as to what goes on in there. A recent study by Fastlane developer Felix Krause showed that Facebook and Instagram can basically track anything they want when you\u2019re using their in-app browser, which they use to open all ads and links by default.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">How does in-app browser tracking work?<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">JavaScript injection. The study uses Instagram as an example. Instagram injects Meta\u2019s Meta Pixel JavaScript tracking code into every website that you open. It\u2019s a library designed for website developers to track visitors on their site. Meta is injecting it on every site, without asking the website, and collecting the data for themselves.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">When you open a link in Instagram, the app injects JavaScript code&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/lifehacker.com\/dont-use-in-app-browsers-for-anything-important-1849401900\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline; font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>Read more at Lifehacker.<\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.zdnet.com\/article\/scammers-are-using-this-sneaky-trick-to-bypass-spam-filters-and-trick-you-into-handing-over-your-sensitive-information\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Scammers are using this sneaky tactic to trick you into handing over bank details and passwords<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; color: #999999; font-family: helvetica, arial, sans-serif;\">Cybersecurity researchers warn there&#8217;s been a big rise in cyber criminals using &#8216;vishing&#8217; attacks to manipulate victims into disclosing sensitive information.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">There&#8217;s been a big rise in cyber criminals combining fraudulent emails and telephone calls to trick victims into disclosing sensitive information like passwords and bank details.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Known as vishing attacks, criminals and scammers telephone victims and attempt to use social engineering to trick them into giving up personal data.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Common scams involve attackers claiming to be from the victim&#8217;s bank, the police, or even cybersecurity or software companies. Often, they use scare tactics to encourage victims to give up information like bank information or passwords as a matter of urgency.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The attackers can even engineer the telephone number and caller ID to look legitimate, making their claims more convincing.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Now, in an effort to make vishing attacks look even more legitimate, cyber criminals are using what cybersecurity researchers at Agari describe as &#8216;hybrid&#8217; vishing attacks. These are different to regular vishing attacks because they use multiple different stages, first contacting the victim with a phishing email lure containing a phone number that they&#8217;re asked to call.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The emails will often claim a state of urgency in order to panic the target into calling the number \u2013 for example, it could claim that you&#8217;re about to be locked out of your bank account, or a transaction has been made without your permission and you should call the number to talk to the bank.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">When the victim calls, they&#8217;re connected to a scammer claiming who attempts to extract sensitive information from them under the false pretences of helping the victim rectify the false problem they&#8217;ve been told they have. Unlike many phishing emails, the messages don&#8217;t contain attachments or malicious links&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/scammers-are-using-this-sneaky-trick-to-bypass-spam-filters-and-trick-you-into-handing-over-your-sensitive-information\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at ZDNet.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Psst&#8230;Amazon has a secret coupon page \u2014 save nearly 50%!<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Super-savvy old-school coupon clippers can make an art form out of saving money. And though you may think online shopping doesn&#8217;t quite allow for the same form of self-expression, you&#8217;d be wrong. At least when it comes to Amazon.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">There&#8217;s one place at Amazon you can go to access a bounty of coupons. It&#8217;s just like thumbing through the newspaper in olden times. You can see what coupons are available, search for coupons from your favorite brands and generally revel in the thrill of saving.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Amazon&#8217;s secret page of coupons is available to you anytime. (Get a load of the categories list on the left column!)<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">How it works<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">On this special secret page, Amazon offers up various discounts on things like tools, pet supplies, electronics and fashion. You can &#8220;clip&#8221; (aka &#8220;click&#8221;) the coupons of your choice, and the items are added to your cart for purchase \u2014 the discount is applied when you check out, now or later. Don&#8217;t worry if you don&#8217;t see the discount in your cart right away \u2014 it shows up at checkout.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">You can also use the search bar on the coupons page to hunt down coupons for brands you like. Above the list of categories on the left side, click &#8220;your coupons&#8221; to view all of coupons you&#8217;ve clipped; this is a great tool for comparing discounts&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.aol.com\/lifestyle\/psst-amazon-secret-coupon-page-101607914.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at AOL.com.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<p><span style=\"color: #339966; font-family: helvetica, arial, sans-serif;\"><strong><em><span style=\"font-size: 18pt;\">Thanks for reading this week&#8217;s Wednesday Newbytes. We hope you found these articles informative, interesting, fun, and\/or helpful. Darcy &amp; TC<\/span><\/em><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Wednesday Newsbytes: Microsoft Admits It Can&#8217;t Stop Spammers, How to Avoid Spam, Surveillance is Everywhere &#8211; You Are Being Watched, Scammers are Using This Sneaky Tactic, Amazon&#8217;s Secret Coupon Page&#8230;and more! Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday,\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-microsoft-admits-it-cant-stop-spammers-how-to-avoid-spam-surveillance-is-everywhere-you-are-being-watched-scammers-are-using-this-sneaky-tactic-amazons-secret-coupon-pag\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":23363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1462,1461,1751,1669,1426,1764,1670,1680,1656,1674,4372],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24052"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=24052"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24052\/revisions"}],"predecessor-version":[{"id":24054,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24052\/revisions\/24054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/23363"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=24052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=24052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=24052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}