{"id":2580,"date":"2023-10-30T08:32:41","date_gmt":"2023-10-30T08:32:41","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=2580"},"modified":"2023-10-30T08:32:41","modified_gmt":"2023-10-30T08:32:41","slug":"ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/","title":{"rendered":"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs"},"content":{"rendered":"<p>A team of academic researchers has recently disclosed browser-based and timerless speculative execution attacks on Apple devices. This side channel attack exploits a weakness in the A and M series CPUs running on Apple iOS, iPadOS and macOS devices. The attack vector named iLeakage is able to extract sensitive personal information of Apple users by exploiting the Safari web browser.<\/p>\n<p>&#8220;<em>An attacker can induce Safari to render an arbitrary webpage, subsequently recovering sensitive information present within it using speculative execution<\/em>,&#8221; researchers Jason Kim, Stephan van Schaik, Daniel Genkin, and Yuval Yarom\u00a0<a href=\"https:\/\/ileakage.com\/\">said<\/a>\u00a0in a new study.<\/p>\n<p>In a practical attack scenario, the attacker baits the targeted Safari user to a malicious website. The malicious website then automatically opens the site that the user intended to visit. iLeakage can do this because its rendering process handles both the attack website and the targeted site simultaneously.<\/p>\n<p>Experts have already demonstrated how iLeakage could be used to obtain passwords as well as other sensitive information. Here are the video demos that show exactly how the attack vector works<\/p>\n<ul>\n<li>Stealing <a href=\"https:\/\/www.youtube.com\/watch?v=Z2RtpN77H8o\">Instagram credentials<\/a> that are auto-filled by a password manager<\/li>\n<li>Extracting <a href=\"https:\/\/www.youtube.com\/watch?v=2uH9slLKTjw\">email subject lines<\/a> from a Gmail inbox<\/li>\n<li>Recognizing users&#8217; <a href=\"https:\/\/www.youtube.com\/watch?v=sNdyrCtajP4\">YouTube watch history<\/a><\/li>\n<\/ul>\n<p>As per Apple store\u2019s policy, all third-party browsers must use Safari\u2019s <a href=\"https:\/\/webkit.org\/\">WebKit engine<\/a>. This implies that browsers like Chrome or Firefox are essentially Safari with proprietary user interface and wrapping. Therefore, all browsers in your Apple device (except macOS) are equally susceptible to this attack vector.<\/p>\n<p>Report findings were sent to Apple back in September 2022 pinpointing the shortcomings in all Apple devices powered by Apple\u2019s A-series and M-series ARM processors released in 2020 and onward. However, the tech giant seemingly addressed a mitigation tool for Safari on macOS only. They have a plan to further address the issue in their next scheduled software release.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2582 alignleft\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-300x225.png\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-300x225.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-1024x768.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-768x576.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-16x12.png 16w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-500x375.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1-800x600.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-1.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<h2>Shedding light on the iLeakage work mechanism<\/h2>\n<p>iLeakage works similarly to the two most famous side-channel attacks (SCAs) Meltdown and Spectre. Apple\u2019s chip works in a speculative execution model and that\u2019s the glitch iLeakage exploits. In fact, most modern CPUs follow the same model to give users a faster and seamless experience.<\/p>\n<p>In the speculative model, CPUs predict a task will be ordered before the user puts an actual command. In a bid to create a faster experience, the CPU completes the first part of the task that it predicted. If the task is not eventually asked by the user, the CPU reverts to the original state by erasing the pre-executions.<\/p>\n<p>This is where the attack vector outsmarts a CPU. It manipulates CPUs into pre-executing incorrect instructions that depend on sensitive data. This data is then gathered through a side channel even after the CPU realizes its mistake.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2583 alignright\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-300x225.png\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-300x225.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-1024x768.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-768x576.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-16x12.png 16w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-500x375.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3-800x600.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-3.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2>To wrap things up<\/h2>\n<p>Researchers are yet to gather evidence of iLeakage causing havoc as the attack is not easy to conduct. <em>\u201cIt requires advanced knowledge of browser-based side-channel attacks and Safari\u2019s implementation,\u201d<\/em> the researchers said.<\/p>\n<p>On the flip side, the attack would be very difficult to detect if it is launched on a massive scale since it runs in Safari and never leaves a trail in system log files. <em>\u201ciLeakage shows that the\u00a0Spectre attack\u00a0is still relevant and exploitable, even after nearly 6 years of effort to mitigate it since its discovery,\u201d<\/em> the researchers noted.<\/p>","protected":false},"excerpt":{"rendered":"<p>A team of academic researchers has recently disclosed browser-based and timerless speculative execution attacks on Apple devices. This side channel&#8230;<\/p>","protected":false},"author":26,"featured_media":2581,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35,36],"tags":[],"class_list":["post-2580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-news","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"A team of academic researchers has recently disclosed browser-based and timerless speculative execution attacks on Apple devices. This side channel...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-30T08:32:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/\",\"name\":\"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\",\"datePublished\":\"2023-10-30T08:32:41+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/","og_locale":"de_DE","og_type":"article","og_title":"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs - Techknowledge","og_description":"A team of academic researchers has recently disclosed browser-based and timerless speculative execution attacks on Apple devices. This side channel...","og_url":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/","og_site_name":"Techknowledge","article_published_time":"2023-10-30T08:32:41+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"John Gallacher","Gesch\u00e4tzte Lesezeit":"3 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/","name":"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","datePublished":"2023-10-30T08:32:41+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px.png","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ileakage-exploits-safari-to-take-bite-out-of-apples-iphones-and-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"iLeakage Exploits Safari to Take Bite Out of Apple\u2019s iPhones and Macs"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/2580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=2580"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/2580\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/2581"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=2580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=2580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=2580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}