{"id":406,"date":"2020-11-16T22:31:18","date_gmt":"2020-11-16T22:31:18","guid":{"rendered":"https:\/\/bootstrap-it.com\/blog\/?p=406"},"modified":"2020-11-22T03:05:34","modified_gmt":"2020-11-22T03:05:34","slug":"how-companies-get-your-data-and-what-they-can-do-with-it","status":"publish","type":"post","link":"https:\/\/bootstrap-it.com\/blog\/?p=406","title":{"rendered":"How Companies Get Your Data \u2013 And What They Can Do With It"},"content":{"rendered":"<div id=\"s-share-buttons\" class=\"horizontal-w-c-circular s-share-w-c\"><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https:\/\/bootstrap-it.com\/blog\/?p=406\" target=\"_blank\" title=\"Share to Facebook\" class=\"s3-facebook hint--top\"><\/a><a href=\"http:\/\/twitter.com\/intent\/tweet?text=How Companies Get Your Data \u2013 And What They Can Do With It&url=https:\/\/bootstrap-it.com\/blog\/?p=406\" target=\"_blank\"  title=\"Share to Twitter\" class=\"s3-twitter hint--top\"><\/a><a href=\"http:\/\/reddit.com\/submit?url=https:\/\/bootstrap-it.com\/blog\/?p=406&title=How Companies Get Your Data \u2013 And What They Can Do With It\" target=\"_blank\" title=\"Share to Reddit\" class=\"s3-reddit hint--top\"><\/a><a href=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/bootstrap-it.com\/blog\/?p=406\" target=\"_blank\" title=\"Share to LinkedIn\" class=\"s3-linkedin hint--top\"><\/a><a href=\"mailto:?Subject=How%20Companies%20Get%20Your%20Data%20\u2013%20And%20What%20They%20Can%20Do%20With%20It&Body=Here%20is%20the%20link%20to%20the%20article:%20https:\/\/bootstrap-it.com\/blog\/?p=406\" title=\"Email this article\" class=\"s3-email hint--top\"><\/a><\/div>\n<p>Curious about what kinds of personal and even private data you may be exposing through the course of a normal day on the internet? How about using \u201call kinds\u201d as a starting point?<\/p>\n\n\n\n<p>Here, adapted from my new book,&nbsp;<em><a href=\"https:\/\/www.amazon.com\/Keeping-Up-backgrounders-technology-trends\/dp\/B08HGLPZMP\">Keeping Up: Backgrounders to all the big technology trends you can&#8217;t afford to ignore<\/a><\/em>, is a way to break down the scope and nature of the problem by platform.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"financial-transactions\">Financial transactions<\/h2>\n\n\n\n<p>Take a moment to visualize what\u2019s involved in a simple online credit card purchase. You probably signed into the merchant\u2019s website using your email address as an account identifier and a (hopefully) unique password. After browsing a few pages, you\u2019ll add one or more more items to the site\u2019s virtual shopping cart.<\/p>\n\n\n\n<p>When you\u2019ve got everything you need, you\u2019ll begin the checkout process, entering shipping information, including a street address and your phone number. You might also enter the account number of the loyalty card the merchant sent you and a coupon code you received in an email marketing message.<\/p>\n\n\n\n<p>Of course, the key step involves entering your payment information. For a credit card, this will probably include the card owner\u2019s name and address, and the card\u2019s number, expiration date, and a security code.<\/p>\n\n\n\n<p>Assuming the merchant&#8217;s infrastructure is compliant with Payment Card Industry Data Security Standard (PCI-DSS) protocols for handling financial information, then it\u2019s relatively unlikely that this information will be stolen and sold by criminals. But either way, it will still exist within the merchant\u2019s own database.<\/p>\n\n\n\n<p>To flesh all this out a bit, understand that using your loyalty card account and coupon code can communicate a lot of information about your shopping and lifestyle preferences. Not to mention records of some of your previous activities. And your site account comes with contact information and your home location.<\/p>\n\n\n\n<p>All of that information can, at least in theory, be stitched together to create a robust profile of you as a consumer and citizen.<\/p>\n\n\n\n<p>\u200c\u200cIt\u2019s for these reasons that I personally prefer using third-party e-commerce payment systems like PayPal because such transactions leave no record of my specific payment method on the merchant\u2019s own databases.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"devices\">Devices<\/h2>\n\n\n\n<p>Modern operating systems are built from the ground up to connect to the internet in multiple ways. They\u2019ll often automatically query online software repositories for patches and updates and \u201cask\u201d for remote help when something goes wrong.<\/p>\n\n\n\n<p>Some performance diagnostics data is sent and stored online, where it can contribute to statistical analysis or bug diagnosis and fixes. Individual software packages might connect to remote servers independently of the OS to get their own things done.<\/p>\n\n\n\n<p>All that\u2019s fine. Except that you might have a hard time being sure whether all the data coming and going between your device and the internet is stuff you\u2019re OK sharing.<\/p>\n\n\n\n<p>Can you know that private files and personal information aren\u2019t being swept in with all the other data? And are you confident that none of your data will ever accidentally find its way into some unexpected application lying beyond your control?<\/p>\n\n\n\n<p>To illustrate the problem, I\u2019d refer you to devices powered by digital assistants like Amazon\u2019s Alexa and the Google Assistant (\u201cOK Google\u201d). Since, by definition, the microphones used by digital assistants are constantly listening for their key word (\u201cAlexa\u2026\u201d), everything anyone says within range of the device is registered.<\/p>\n\n\n\n<p>At least some of those conversations are also recorded and stored online and, as it turns out, some of those have eventually been heard by human beings working for the vendor. In at least one case, an inadvertently-recorded conversation was used to convict a murder suspect (not that we\u2019re opposed to convicting murderers).<\/p>\n\n\n\n<p>Amazon, Google, and other players in this space are aware of the issue and are trying to address it. But it\u2019s unlikely they\u2019ll ever fully solve it. Remember, convenience, security, and privacy don\u2019t work well together.<\/p>\n\n\n\n<p>Now if you think the information from computers and tablets that can be tracked and recorded is creepy, wait \u2019till you hear about thermostats and light bulbs.<\/p>\n\n\n\n<p>As more and more household appliances and tools are adopted as part of \u201csmart home\u201d systems, more and more streams of performance data will be generated alongside them.<\/p>\n\n\n\n<p>And, as has already been demonstrated in multiple real-world applications, all that data can be programmatically interpreted to reveal significant information about what\u2019s going on in a home and who\u2019s doing it.\u200c\u200c<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mobile-devices\">Mobile devices<\/h2>\n\n\n\n<p>Have you ever stopped in the middle of a journey, pulled out your smartphone, and checked a digital map for directions? Of course you have.<\/p>\n\n\n\n<p>Well, the map application is using your current location information and sending you valuable information but, at the same time, you\u2019re sending some equally valuable information back. What kind of information might that be?<\/p>\n\n\n\n<p>I once read about a mischievous fellow in Germany who borrowed a few dozen smartphones, loaded them up on a kids\u2019 wagon, and slowly pulled the wagon down the middle of an empty city street. It wasn\u2019t long before Google Maps was reporting a serious traffic jam where there wasn\u2019t one.<\/p>\n\n\n\n<p>How does the Google Maps app know more about your local traffic conditions than you do? One important class of data that feeds their system is obtained through constant monitoring of the location, velocity, and direction of movement of every active Android phone they can reach &#8211; including your Android phone.<\/p>\n\n\n\n<p>I, for one, appreciate this service and I don\u2019t much mind the way my data is used. But I\u2019m also aware that, one day, that data might be used in ways that sharply conflict with my interests. Call it a calculated risk.<\/p>\n\n\n\n<p>Of course, it\u2019s not just GPS-based movement information that Google and Apple &#8211; the creators of the two most popular mobile operating systems &#8211; are getting. They, along with a few other industry players, are also handling the records of all of our search engine activity and the data returned by exercise and health monitoring applications.<\/p>\n\n\n\n<p>In other words, should they decide to, many tech companies could effortlessly compile profiles describing our precise movements, plans, and health status. And from there, it\u2019s not a huge leap to imagine the owners of such data predicting what we\u2019re likely to do in the coming weeks and months.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"web-browsers\">Web browsers<\/h2>\n\n\n\n<p>Most of us use web browsers for our daily interactions with the internet. And, all things considered, web browsers are pretty miraculous creations. They often act as an impossibly powerful concierge, bringing us all the riches of humanity without even breaking into a sweat.<\/p>\n\n\n\n<p>But, as I\u2019m sure you can already anticipate, all that power comes with a trade-off.<\/p>\n\n\n\n<p>For just a taste of the information your browser freely shares about you, take a look at the Google Analytics page shown in the figure below.<\/p>\n\n\n\n<p>\u200c\u200cThis dashboard displays a visual summary describing all the visits to my own\u00a0<a href=\"https:\/\/bootstrap-it.com\/\">bootstrap-it.com site<\/a>\u00a0over the previous seven days. From the data that was collected, I can see:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.freecodecamp.org\/news\/content\/images\/2020\/09\/image-116.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Where in the world my visitors are from<\/li><li>When during the day they tend to visit<\/li><li>How long they spent on my site<\/li><li>Which pages they visit<\/li><li>Which site they left before coming to my site<\/li><li>How many visitors make repeat visits<\/li><li>What operating systems they\u2019re running<\/li><li>What device form factor they\u2019re using (i.e., desktop, smartphone, or tablet)<\/li><li>The demographic cohorts they belong to (genders, age groups, income groups)<\/li><\/ul>\n\n\n\n<p>Besides all that, a web server\u2019s own logs can report detailed information, in particular the specific IP address and precise time associated with each visitor.<\/p>\n\n\n\n<p>What this means is that, whenever your browser connects to my website (or any other website), it\u2019s giving my web server an awful lot of information. Google just collects it and presents it to me in a fancy, easy-to-digest format.<\/p>\n\n\n\n<p>By the way, I\u2019m fully aware that, by having Google collect all this information about my website\u2019s users I\u2019m part of the problem. And, for the record, I do feel a bit guilty about it.<\/p>\n\n\n\n<p>In addition, web servers are able to \u201cwatch\u201d what you\u2019re doing in real time and \u201cremember\u201d what you did on your last visit.<\/p>\n\n\n\n<p>To explain, have you ever noticed how on some sites, right before you click to leave the page a \u201cWait! Before you go!\u201d message pops up? Servers can track your mouse movements and, when they get \u201ctoo close\u201d to closing the tab or moving to a different tab, they\u2019ll display that popup.<\/p>\n\n\n\n<p>Similarly, many sites save small packets of data on your computer called \u201ccookies.\u201d Such a cookie could contain session information that might include the previous contents of a shopping cart or even your authentication status. The goal is to provide a convenient and consistent experience across multiple visits. But such tools can be misused.<\/p>\n\n\n\n<p>Finally, like operating systems, browsers will also silently communicate with the vendor that provides them. Getting usage feedback can help providers stay up to date on security and performance problems. But independent tests have shown that, in many cases, far more data is heading back \u201chome\u201d than would seem appropriate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"website-interaction\">Website interaction<\/h2>\n\n\n\n<p>Although I deal with this in greater depth in&nbsp;<a href=\"https:\/\/www.amazon.com\/Keeping-Up-backgrounders-technology-trends\/dp\/B08HGLPZMP\">my &#8220;Keeping Up&#8221; book<\/a>, I should highlight at least a couple of particularly relevant issues here. Like, for instance, the fact that websites love getting you to sign up for extra value services.<\/p>\n\n\n\n<p>The newsletters and product updates that they\u2019ll send you might we be perfectly legitimate and, indeed, provide great value. But they\u2019re still coming in exchange for some of your private contact information. As long as you\u2019re aware of that, I\u2019ve done my job.<\/p>\n\n\n\n<p>A perfect example is the data you contribute to social media platforms like Twitter, Facebook, and LinkedIn. You may think you\u2019re just communicating with your connections and followers, but it actually goes much further than that.<\/p>\n\n\n\n<p>Take a marvelous &#8211; and scary &#8211; piece of software called Recon-ng that\u2019s used by network security professionals to test for an organization\u2019s digital vulnerability. Once you\u2019ve configured it with some basics about your organization, Recon-ng will head out to the internet and search for any publicly available information that could be used to penetrate your defenses or cause you harm.<\/p>\n\n\n\n<p>For instance, are you sure outsiders can\u2019t possibly know enough about the software environment your developers work with to do you any damage? Well perhaps you should take a look at the \u201cdesired qualifications\u201d section from some of those job ads you posted on LinkedIn. Or how about questions (or answers) your developers might have posted to the Stack Overflow site?<\/p>\n\n\n\n<p>Every post tells a story, and there\u2019s no shortage of clever people out there who love reading stories.<\/p>\n\n\n\n<p>Software like Recon-ng can help you identify potential threats. But that only underlines your responsibility to avoid leaving your data out there in public in the first place.<\/p>\n\n\n\n<p>The bottom line? Smile. You\u2019re being watched.<\/p>\n\n\n\n<p><em>There&#8217;s lots more quick, fun, and accessible technology background goodness available in my&nbsp;<a href=\"https:\/\/www.amazon.com\/Keeping-Up-backgrounders-technology-trends\/dp\/B08HGLPZMP\">Keeping Up<\/a>&nbsp;book. Take a look.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Curious about what kinds of personal and even private data you may be exposing through the course of a normal day on the internet? How about using \u201call kinds\u201d as a starting point? Here, adapted from my new book,&nbsp;Keeping Up:&hellip; <a href=\"https:\/\/bootstrap-it.com\/blog\/?p=406\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":407,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.2.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Companies Get Your Data \u2013 And What They Can Do With It - Bootstrap IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bootstrap-it.com\/blog\/?p=406\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Companies Get Your Data \u2013 And What They Can Do With It - Bootstrap IT\" \/>\n<meta property=\"og:description\" content=\"Curious about what kinds of personal and even private data you may be exposing through the course of a normal day on the internet? How about using \u201call kinds\u201d as a starting point? Here, adapted from my new book,&nbsp;Keeping Up:&hellip; Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bootstrap-it.com\/blog\/?p=406\" \/>\n<meta property=\"og:site_name\" content=\"Bootstrap IT\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-16T22:31:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-22T03:05:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bootstrap-it.com\/blog\/wp-content\/uploads\/company-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dbclin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@davidbclinton\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dbclin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/?p=406\",\"url\":\"https:\/\/bootstrap-it.com\/blog\/?p=406\",\"name\":\"How Companies Get Your Data \u2013 And What They Can Do With It - Bootstrap IT\",\"isPartOf\":{\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#website\"},\"datePublished\":\"2020-11-16T22:31:18+00:00\",\"dateModified\":\"2020-11-22T03:05:34+00:00\",\"author\":{\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec\"},\"breadcrumb\":{\"@id\":\"https:\/\/bootstrap-it.com\/blog\/?p=406#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bootstrap-it.com\/blog\/?p=406\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/?p=406#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bootstrap-it.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Companies Get Your Data \u2013 And What They Can Do With It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#website\",\"url\":\"https:\/\/bootstrap-it.com\/blog\/\",\"name\":\"Bootstrap IT\",\"description\":\"Learn technology using technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bootstrap-it.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec\",\"name\":\"dbclin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g\",\"caption\":\"dbclin\"},\"sameAs\":[\"http:\/\/bootstrap-it.com\/\",\"dbclinton\",\"https:\/\/twitter.com\/davidbclinton\"],\"url\":\"https:\/\/bootstrap-it.com\/blog\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Companies Get Your Data \u2013 And What They Can Do With It - Bootstrap IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bootstrap-it.com\/blog\/?p=406","og_locale":"en_US","og_type":"article","og_title":"How Companies Get Your Data \u2013 And What They Can Do With It - Bootstrap IT","og_description":"Curious about what kinds of personal and even private data you may be exposing through the course of a normal day on the internet? How about using \u201call kinds\u201d as a starting point? Here, adapted from my new book,&nbsp;Keeping Up:&hellip; Continue Reading &rarr;","og_url":"https:\/\/bootstrap-it.com\/blog\/?p=406","og_site_name":"Bootstrap IT","article_published_time":"2020-11-16T22:31:18+00:00","article_modified_time":"2020-11-22T03:05:34+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/bootstrap-it.com\/blog\/wp-content\/uploads\/company-data.jpg","type":"image\/jpeg"}],"author":"dbclin","twitter_card":"summary_large_image","twitter_creator":"@davidbclinton","twitter_misc":{"Written by":"dbclin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bootstrap-it.com\/blog\/?p=406","url":"https:\/\/bootstrap-it.com\/blog\/?p=406","name":"How Companies Get Your Data \u2013 And What They Can Do With It - Bootstrap IT","isPartOf":{"@id":"https:\/\/bootstrap-it.com\/blog\/#website"},"datePublished":"2020-11-16T22:31:18+00:00","dateModified":"2020-11-22T03:05:34+00:00","author":{"@id":"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec"},"breadcrumb":{"@id":"https:\/\/bootstrap-it.com\/blog\/?p=406#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bootstrap-it.com\/blog\/?p=406"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bootstrap-it.com\/blog\/?p=406#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bootstrap-it.com\/blog"},{"@type":"ListItem","position":2,"name":"How Companies Get Your Data \u2013 And What They Can Do With It"}]},{"@type":"WebSite","@id":"https:\/\/bootstrap-it.com\/blog\/#website","url":"https:\/\/bootstrap-it.com\/blog\/","name":"Bootstrap IT","description":"Learn technology using technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bootstrap-it.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec","name":"dbclin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g","caption":"dbclin"},"sameAs":["http:\/\/bootstrap-it.com\/","dbclinton","https:\/\/twitter.com\/davidbclinton"],"url":"https:\/\/bootstrap-it.com\/blog\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=406"}],"version-history":[{"count":2,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/406\/revisions"}],"predecessor-version":[{"id":409,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/406\/revisions\/409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/media\/407"}],"wp:attachment":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}