{"id":21342,"date":"2021-07-06T10:45:43","date_gmt":"2021-07-06T05:15:43","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=21342"},"modified":"2021-07-06T10:47:14","modified_gmt":"2021-07-06T05:17:14","slug":"why-whatsapp-is-dangerous","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/","title":{"rendered":"Why WhatsApp is dangerous. It was hacked completely"},"content":{"rendered":"\n<p>Pavel Durov said that everyone urgently needs to remove WhatsApp from smartphones and other devices.<\/p>\n\n\n\n<p>Indeed, there have been many questions about the security and confidentiality of this messenger.&nbsp;We will collect all the important information on this topic so that you know what dangers can await in the most popular messenger.<\/p>\n\n\n\n<p>Finding out what&#8217;s wrong with WhatsApp.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pavel Durov said: WhatsApp is a Trojan<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Not only\u00a0does\u00a0WhatsApp fail to\u00a0protect\u00a0your WhatsApp messages, but it is also constantly used as a Trojan to spy on non-WhatsApp photos and messages.\u00a0Why would they [developers] do this?\u00a0Facebook was part of surveillance programs long before it bought WhatsApp.\u00a0<\/p><\/blockquote>\n\n\n\n<p>The Telegram developer emphasized that all bugs found in WhatsApp are ideal for spying on users.&nbsp;And if you remember the duck test (&nbsp;<em>if it looks like a duck, swims like a duck and quacks like a duck, then this is probably a duck<\/em>&nbsp;), then you really want to get rid of the application.<\/p>\n\n\n\n<p>According to Durov, &#8220;Facebook and WhatsApp shared almost everything with those who claimed to be working for the government.&#8221;&nbsp;Oh.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Israelis Achieve Impressive Success in Hacking WhatsApp<\/h2>\n\n\n\n<p>In May 2019, cybersecurity experts&nbsp;found a&nbsp;hole in WhatsApp&#8217;s voice calling system that was being used to spy on activists.&nbsp;This worked on both Android and iOS.&nbsp;<\/p>\n\n\n\n<p>The malware was&nbsp;developed by the&nbsp;Israeli company NSO Group.&nbsp;It allowed installing spy applications on a smartphone with WhatsApp.&nbsp;<\/p>\n\n\n\n<p>To hack the smartphone, the hackers&nbsp;<strong>simply called the victim via WhatsApp<\/strong>.&nbsp;The application automatically answered the call &#8211; without the owner&#8217;s knowledge!&nbsp;Then the smartphone was loaded with spyware to steal data.&nbsp;Call records were deleted so that no one would suspect anything.&nbsp;<\/p>\n\n\n\n<p>WhatsApp&nbsp;acknowledged the&nbsp;problem.&nbsp;The developers compared the malware code with other NSO Group developments and came to the conclusion that the&nbsp;<strong>handwriting is indeed the same<\/strong>.&nbsp;Then they developed a security patch in four days and asked all users (1.5 billion people, just a minute!) To install it.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does the Israeli NSO Group make money?<\/h2>\n\n\n\n<p>The main product of the company is&nbsp;<strong>Pegasus<\/strong>.&nbsp;This is software that is able to turn on the camera and microphone of a smartphone, view e-mail and messages, and collect geolocation data.&nbsp;<\/p>\n\n\n\n<p>The main customers of Pegasus are intelligence agencies of the Middle East, USA, Western Europe and other regions.&nbsp;<em>Formally,<\/em>&nbsp;software is used at the behest of the government to counter terrorism and prevent crime.&nbsp;<\/p>\n\n\n\n<p>When everyone knew about the problem with WhatsApp, the NSO Group threw up their hands.&nbsp;Say, we check all customers and investigate cases of abuse.&nbsp;We are not hunting for human rights defenders, which means that&nbsp;<em>we are not guilty of anything and have not violated anything.&nbsp;<\/em><\/p>\n\n\n\n<p>How much the Pegasus costs is unknown.&nbsp;The NSO Group itself is estimated at&nbsp;<strong>$ 1 billion.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Another thing is funny: after the patch was released, a lawyer from London announced an attack similar to the use of NSO Group software.&nbsp;He defended a Saudi dissident and Mexican journalists who had previously also been attacked using the same software.<\/p>\n\n\n\n<p>But it was not possible to obtain data from the lawyer&#8217;s smartphone.&nbsp;So the&nbsp;<strong>patch still works<\/strong>&nbsp;.&nbsp;<\/p>\n\n\n\n<p>The lawyer also helped the victims of the attack sue the NSO Group.&nbsp;He stated that the&nbsp;<strong>developers should share the responsibility for the hacking<\/strong>&nbsp;with their clients.&nbsp;<\/p>\n\n\n\n<p>Since the NSO Group exported software abroad, the Israeli Ministry of Defense also made a complaint.&nbsp;But the lawyers are convinced: the ministry&nbsp;<strong>knew<\/strong>&nbsp;about Pegasus&#8217; capabilities&nbsp;before&nbsp;, so this is&nbsp;<em>a showcase.&nbsp;<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How WhatsApp works is generally unknown<\/h2>\n\n\n\n<p>WhatsApp is a&nbsp;<strong>closed<\/strong>&nbsp;source&nbsp;messenger.&nbsp;In general, this is normal for commercial applications.&nbsp;But open-source products inspire more trust.&nbsp;<\/p>\n\n\n\n<p>In WhatsApp, you cannot see how the new version differs from its predecessor.&nbsp;Can&#8217;t analyze the code and find backdoors.&nbsp;<\/p>\n\n\n\n<p>Experts look for vulnerabilities in WhatsApp based on the behavior of the finished product.&nbsp;This does not give the full picture.<\/p>\n\n\n\n<p>What&#8217;s more: the WhatsApp developers are&nbsp;<strong>obfuscating the code<\/strong>&nbsp;.&nbsp;It is deliberately confused to complicate analysis.&nbsp;<\/p>\n\n\n\n<p>Most likely, this was done at the request of the special services.&nbsp;WhatsApp and parent company Facebook could be required&nbsp;<strong>to leave backdoors in the software<\/strong>&nbsp;.&nbsp;And if the companies sent a nondisclosure order to the FBI (the so-called&nbsp;<em>Gag order<\/em>&nbsp;), Zuckerberg cannot even complain to the public.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">WhatsApp was originally full of security holes<\/h2>\n\n\n\n<p>The creators of WhatsApp have&nbsp;stated&nbsp;that &#8221;&nbsp;<em>security is in its DNA<\/em>&nbsp;.&#8221;&nbsp;But everything turned out to be exactly the&nbsp;<strong>opposite<\/strong>.&nbsp;<\/p>\n\n\n\n<p>For example, in 2011-2012, even&nbsp;mobile providers&nbsp;and&nbsp;Wi-Fi hotspot administrators&nbsp;could access your WhatsApp correspondence.&nbsp;<strong>At<\/strong>&nbsp;one time, encryption keys could be&nbsp;<strong>changed&nbsp;right in the chat<\/strong>.&nbsp;It is unlikely that the company&#8217;s testers did not notice this.&nbsp;<\/p>\n\n\n\n<p>When&nbsp;<strong><em>standard<\/em><\/strong>&nbsp;encryption was&nbsp;introduced, the keys were&nbsp;made available to&nbsp;some governments.&nbsp;But&nbsp;no one encrypted the&nbsp;backups of the data that had been persistently suggested to be stored in the cloud.<\/p>\n\n\n\n<p><strong><em>End-to-end<\/em><\/strong>&nbsp;encryption, which was integrated in April 2016 and is used today, also<strong>&nbsp;does not protect<\/strong>&nbsp;against data theft.&nbsp;For example, the developers admitted that backups to Google Drive were uploaded&nbsp;without encryption.<\/p>\n\n\n\n<p>Yes, the&nbsp;messenger also&nbsp;passed the&nbsp;<strong>metadata of the<\/strong>&nbsp;conversations&nbsp;to the&nbsp;authorities.&nbsp;From them, you can understand when and with whom you communicated.&nbsp;<\/p>\n\n\n\n<p>And back in 2013, researchers&nbsp;found&nbsp;that WhatsApp copied all mobile phone numbers from the address book to its servers.&nbsp;<em>Formally,<\/em>&nbsp;to show which of them has already installed WhatsApp.&nbsp;<em>Really &#8230;<\/em>&nbsp;anything could be done with this data.&nbsp;<\/p>\n\n\n\n<p>The WhatsApp servers also got the numbers of users who did not install the application.&nbsp;In addition, an unreliable scheme was used when sending.&nbsp;You can decrypt data even on a home laptop in three minutes.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hacking WhatsApp Proven Top Level<\/h2>\n\n\n\n<p>An investigation into Paul Manafort, campaign manager for Donald Trump and adviser to fugitive Ukrainian President Yanukovych,&nbsp;confirms&nbsp;that the messenger is full of&nbsp;<em>surprises<\/em>.&nbsp;Manafort&#8217;s WhatsApp messages were pulled from&nbsp;<strong>iCloud<\/strong>.&nbsp;<\/p>\n\n\n\n<p>Apparently Apple gave the FBI access to the iCloud policy by court order.&nbsp;<\/p>\n\n\n\n<p>And WhatsApp had&nbsp;<strong>to hand over encryption keys<\/strong>, which allowed agents to read Manafort&#8217;s correspondence.&nbsp;As a result, he was found guilty on several charges and&nbsp;imprisoned&nbsp;for&nbsp;seven and a half years.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The founders of the messenger stopped believing in WhatsApp&nbsp;<\/h2>\n\n\n\n<p>Facebook bought WhatsApp in February 2014 for&nbsp;<strong>$ 22 billion<\/strong>&nbsp;.&nbsp;In September 2017, WhatsApp co-founder Brian Acton left the company.In April 2018, Yan Borisovich Kum did the same &#8211; due to&nbsp;doubts about&nbsp;the privacy of user data.&nbsp;<\/p>\n\n\n\n<p>In March, following the Cambridge Analytica scandal, Acton&nbsp;<strong>called for the removal of Facebook<\/strong>&nbsp;and the company&#8217;s other products.&nbsp;He also stated that Facebook&nbsp;<em>reluctantly<\/em>&nbsp;agreed to end-to-end encryption on WhatsApp.&nbsp;<\/p>\n\n\n\n<p>Indeed: if a company has&nbsp;admitted&nbsp;that for years it has stored&nbsp;<strong>hundreds of millions<\/strong>&nbsp;of Instagram&nbsp;<strong>passwords<\/strong>&nbsp;in plain text (!!!), then everything can be expected from it.&nbsp;The data was available to&nbsp;<strong>2 thousand developers<\/strong>&nbsp;.&nbsp;Could someone have leaked this data?&nbsp;A rhetorical question.&nbsp;<\/p>\n\n\n\n<p>Acton also&nbsp;expressed regret&nbsp;at agreeing to the Facebook deal:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>I have sold my users&#8217; privacy for great value.&nbsp;I made a choice and made concessions.&nbsp;And I have to live with it every day.<\/p><\/blockquote>\n\n\n\n<p>Acton added that what happens to encryption in WhatsApp after the sale is unknown.&nbsp;Somehow I can&#8217;t believe that it&nbsp;<em>has been dramatically improved<\/em>&nbsp;.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">WhatsApp can steal your data right now<\/h2>\n\n\n\n<p>A new high-profile scandal with WhatsApp began on October 3.&nbsp;The vulnerability&nbsp;threatens&nbsp;WhatsApp (versions up to 2.19.244) on Android, starting from version 8.&nbsp;<\/p>\n\n\n\n<p>It works like this:<\/p>\n\n\n\n<ol><li>The hacker sends a&nbsp;<strong>GIF file<\/strong>&nbsp;to the victim&nbsp;: as a document or simply in a chat, if the attacker is in the victim&#8217;s contact list.&nbsp;In the second case, the GIF will even automatically download.<\/li><li>When the victim wants to send a media file to someone, they will click on the paperclip icon and open the gallery to select the file.&nbsp;<\/li><li>WhatsApp shows previews of media files in the gallery.&nbsp;This&nbsp;<strong>will serve as a trigger<\/strong>&nbsp;and launch the malware.<\/li><li>Profit!&nbsp;Now the hacker can run arbitrary code on the victim&#8217;s smartphone.&nbsp;<\/li><\/ol>\n\n\n\n<p>WhatsApp 2.19.244 solved the problem.&nbsp;<\/p>\n\n\n\n<p>But on November 14, experts&nbsp;found&nbsp;<strong>another hole<\/strong>&nbsp;(and Facebook&nbsp;recognized it&nbsp;).&nbsp;The bug exists in WhatsApp up to 2.19.274 for Android and in iOS version up to 2.19.100.&nbsp;<\/p>\n\n\n\n<p>The developers did not reveal too many details.&nbsp;<strong>They<\/strong>&nbsp;only noted that the vulnerability is related to the way WhatsApp parses the&nbsp;<strong>metadata of mp4 video files<\/strong>&nbsp;.&nbsp;<\/p>\n\n\n\n<p>If the bug is exploited, it is possible to achieve execution of arbitrary code on the smartphone or denial of service (when the gadget cannot be used).&nbsp;<\/p>\n\n\n\n<p>If you haven&#8217;t updated yet, it&#8217;s about time.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">And what about Telegram itself<\/h2>\n\n\n\n<p>With Durov&#8217;s messenger, security is also not very smooth.&nbsp;Here&nbsp;we figured out what was the matter.&nbsp;<\/p>\n\n\n\n<p>In short, Telegram also uses&nbsp;<strong>end-to-end encryption<\/strong>&nbsp;.&nbsp;In private Telegram chats, only participants really have keys; in ordinary (cloud) chats,&nbsp;<em>theoretically<\/em>&nbsp;anyone can get the&nbsp;key&nbsp;.&nbsp;<\/p>\n\n\n\n<p>Telegram end-to-end encryption&nbsp;<strong>has been circumvented more than once<\/strong>&nbsp;.&nbsp;Yes, and other vulnerabilities were discovered.&nbsp;For example, in both WhatsApp and Telegram, it was possible to hide the malicious code in the image and send it to the victim, and then gain full access to her account.&nbsp;<\/p>\n\n\n\n<p>And in general: in September, expert Diray Mishra&nbsp;discovered&nbsp;that files deleted in Telegram&nbsp;<strong>remain on the device<\/strong>&nbsp;after you click the &#8220;Delete for all&#8221; button in the chat.&nbsp;So if you mistakenly forward your nudes to the boss, and then immediately delete them, the boss can still review them as much as he wants.&nbsp;The photo will be saved in a folder on his smartphone when received.&nbsp;And hackers will be able to access files on the device.<\/p>\n\n\n\n<p>Telegram acknowledged the problem.&nbsp;For the found bug, Mishra was paid&nbsp;<strong>2500 euros<\/strong>&nbsp;as part of the bug bounty program.&nbsp;<\/p>\n\n\n\n<p>WhatsApp has the same feature.&nbsp;And it works&nbsp;<strong><em>as it should.&nbsp;<\/em><\/strong><\/p>\n\n\n\n<p>Well, people write programs.&nbsp;And people are wrong.&nbsp;More often than we would like.<\/p>\n\n\n\n<p>The only difference is that WhatsApp cooperates with the authorities, while Telegram&nbsp;<em>claims that it does not cooperate<\/em>&nbsp;.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So what&#8217;s now?<\/h2>\n\n\n\n<p>If you only have WhatsApp for grocery lists and school chats, generally you don&#8217;t have to worry.&nbsp;But you shouldn&#8217;t transfer confidential information and nudes through it.&nbsp;<\/p>\n\n\n\n<p>Telegram is still safer than WhatsApp.&nbsp;And Signal is perhaps safer than Telegram.<\/p>\n\n\n\n<p>There are also Wire, Threema and other products.&nbsp;But there are no absolutely secure messengers&nbsp;<strong>.<\/strong>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pavel Durov said that everyone urgently needs to remove WhatsApp from smartphones and other devices. Indeed, there have been many questions about the security and confidentiality of this messenger.&nbsp;We will collect all the important information on this topic so that you know what dangers can await in the most popular messenger. Finding out what&#8217;s wrong&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why WhatsApp is dangerous. It was hacked completely | ValeurBit Infosec<\/title>\n<meta name=\"description\" content=\"Pavel Durov said that everyone urgently needs to remove WhatsApp from smartphones and other devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why WhatsApp is dangerous. It was hacked completely | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"Pavel Durov said that everyone urgently needs to remove WhatsApp from smartphones and other devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-06T05:15:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-06T05:17:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/\",\"name\":\"Why WhatsApp is dangerous. It was hacked completely | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-07-06T05:15:43+00:00\",\"dateModified\":\"2021-07-06T05:17:14+00:00\",\"description\":\"Pavel Durov said that everyone urgently needs to remove WhatsApp from smartphones and other devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why WhatsApp is dangerous. It was hacked completely\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"Why WhatsApp is dangerous. It was hacked completely\",\"datePublished\":\"2021-07-06T05:15:43+00:00\",\"dateModified\":\"2021-07-06T05:17:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/why-whatsapp-is-dangerous\/#webpage\"},\"wordCount\":1960,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21342"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=21342"}],"version-history":[{"count":3,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21342\/revisions"}],"predecessor-version":[{"id":21345,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/21342\/revisions\/21345"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=21342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=21342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=21342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}