{"id":5581,"date":"2020-07-26T13:00:24","date_gmt":"2020-07-26T13:00:24","guid":{"rendered":"https:\/\/aviancetechnologies.com\/blog\/blog\/the-constant-risk-of-a-consolidated-internet\/"},"modified":"2020-07-26T13:00:24","modified_gmt":"2020-07-26T13:00:24","slug":"the-constant-risk-of-a-consolidated-internet","status":"publish","type":"post","link":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/","title":{"rendered":"The Constant Risk of a Consolidated Internet"},"content":{"rendered":"<p>\u00a0\u00a0 <\/p>\n<p>[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;]<\/p>\n<h2>The Constant Risk of a Consolidated Internet<\/h2>\n<p><\/p>\n<div id=\"article-section-1\">\n<p dir=\"ltr\">Like many \u201cverified\u201d Twitter users who compose its obsessive elite, I was briefly unable to tweet as the hack played out, Twitter having taken extreme measures to try to quell the chaos. I updated my password, a seemingly reasonable thing to do amid a security breach. Panicked, Twitter <a target=\"_blank\" href=\"https:\/\/twitter.com\/TwitterSupport\/status\/1283843496168714240\" data-omni-click=\"r'article',r'',d,r'intext',r'9',r'None'\" rel=\"noopener noreferrer\">would end up locking accounts<\/a> that had attempted to change their password in the past 30 days. A handful of my <em>Atlantic<\/em> colleagues had done the same and were similarly frozen out. We didn\u2019t know that at the time, however, and the ambiguity brought delusions of grandeur (<em>Am I worthy of hacking?<\/em>) and persecution (<em>My Twitterrrrrr!<\/em>). After less than a day, most of us got our accounts back, albeit not without the help of one of our editors, who contacted Twitter on our behalf.<\/p>\n<p class=\"c-recirculation-link\" data-id=\"injected-recirculation-link\" dir=\"ltr\" id=\"injected-recirculation-link-0\">Read: Twitter\u2019s least-bad option for dealing with Donald Trump<\/p>\n<p>The whole situation underscores how centralized the internet has become: According to the <em>Times<\/em> report, one hacker secured entry into a Slack channel. There, they found credentials to access Twitter\u2019s internal tools, which they used to hijack and resell accounts with desirable usernames, before posting messages on high-follower accounts in an attempt to defraud bystanders. At <em>The Atlantic<\/em>, those of us caught in the crossfire were able to quickly regain access to the service only because we work for a big media company with a direct line to Twitter personnel. The internet was once an agora for the many, but those days are long gone, even if everyone can tweet whatever they want all the time.<\/p>\n<hr class=\"c-section-divider\"\/>\n<p dir=\"ltr\">It\u2019s ironic that centralization would overtake online services, because the internet was invented to <em>decentralize<\/em> communications networks\u2014specifically to allow such infrastructure to survive nuclear attack.<\/p>\n<p>In the early 1960s, the commercial telephone network and the military command-and-control network were at risk. Both used central switching facilities that routed communications to their destinations, kind of like airport hubs. If one or two of those facilities were to be lost to enemy attack, the whole system would collapse. In 1962, Paul Baran, a researcher at RAND, had imagined a possible solution: a network of many automated nodes that would replace the central switches, distributing their responsibility throughout the network.<\/p>\n<p dir=\"ltr\">The following year, J. C. R. Licklider, a computer scientist at the Pentagon\u2019s Advanced Research Projects Agency (ARPA), conceived of an Intergalactic Computer Network that might allow all computers, and thereby all the people using them, to connect as one. By 1969, Licklider\u2019s successors had built an operational network after Baran\u2019s conceptual design. Originally called the ARPANet, it would evolve into the internet, the now-humdrum infrastructure you are using to read this article.<\/p>\n<p dir=\"ltr\">Over the years, the internet\u2019s decentralized design became a metaphor for its social and political ethos: Anyone could publish information of any kind, to anyone in the world, without the assent of central gatekeepers such as publishers and media networks. Tim Berners-Lee\u2019s World Wide Web became the most successful interpretation of this ethos. Whether a goth-rock zine, a sex-toy business, a Rainbow Brite fan community, or anything else, you could publish it to the world on the web.<\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<div class=\"post-item-metadata entry-meta\">\n<p class=\"has-background has-very-light-gray-background-color\">Disclaimer: Content may be edited for style and length.\u00a0<a class=\"newsium-categories category-color-1\" href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2020\/07\/twitter-hack-decentralized-internet\/614593\/?utm_source=feed\" target=\"_blank\" rel=\"noopener noreferrer\">Story Source<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] The Constant Risk of a Consolidated Internet Like many \u201cverified\u201d Twitter users who compose its obsessive elite, I was briefly unable to tweet as the hack played out, Twitter having taken extreme measures to try to quell the chaos. I updated my password, a &#8230; <a title=\"The Constant Risk of a Consolidated Internet\" class=\"read-more\" href=\"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/\" aria-label=\"Read more about The Constant Risk of a Consolidated Internet\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":5582,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,30],"tags":[],"class_list":["post-5581","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Constant Risk of a Consolidated Internet - Aviance Technologies<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Constant Risk of a Consolidated Internet - Aviance Technologies\" \/>\n<meta property=\"og:description\" content=\"\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] The Constant Risk of a Consolidated Internet Like many \u201cverified\u201d Twitter users who compose its obsessive elite, I was briefly unable to tweet as the hack played out, Twitter having taken extreme measures to try to quell the chaos. I updated my password, a ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"Aviance Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-26T13:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/The-Constant-Risk-of-a-Consolidated-Internet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ATN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/\"},\"author\":{\"name\":\"ATN\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\"},\"headline\":\"The Constant Risk of a Consolidated Internet\",\"datePublished\":\"2020-07-26T13:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/The-Constant-Risk-of-a-Consolidated-Internet.png\",\"articleSection\":[\"NEWS\",\"TECHNOLOGY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/\",\"name\":\"The Constant Risk of a Consolidated Internet - Aviance Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/The-Constant-Risk-of-a-Consolidated-Internet.png\",\"datePublished\":\"2020-07-26T13:00:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/The-Constant-Risk-of-a-Consolidated-Internet.png\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/The-Constant-Risk-of-a-Consolidated-Internet.png\",\"width\":960,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/the-constant-risk-of-a-consolidated-internet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Constant Risk of a Consolidated Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"name\":\"Aviance Technologies\",\"description\":\"Latest Technology Trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\",\"name\":\"Aviance Technologies\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"width\":217,\"height\":77,\"caption\":\"Aviance Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\",\"name\":\"ATN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"caption\":\"ATN\"},\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Constant Risk of a Consolidated Internet - Aviance Technologies","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Constant Risk of a Consolidated Internet - Aviance Technologies","og_description":"\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] The Constant Risk of a Consolidated Internet Like many \u201cverified\u201d Twitter users who compose its obsessive elite, I was briefly unable to tweet as the hack played out, Twitter having taken extreme measures to try to quell the chaos. I updated my password, a ... Read more","og_url":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/","og_site_name":"Aviance Technologies","article_published_time":"2020-07-26T13:00:24+00:00","og_image":[{"width":960,"height":500,"url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/The-Constant-Risk-of-a-Consolidated-Internet.png","type":"image\/png"}],"author":"ATN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ATN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#article","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/"},"author":{"name":"ATN","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc"},"headline":"The Constant Risk of a Consolidated Internet","datePublished":"2020-07-26T13:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/"},"wordCount":560,"publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/The-Constant-Risk-of-a-Consolidated-Internet.png","articleSection":["NEWS","TECHNOLOGY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/","url":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/","name":"The Constant Risk of a Consolidated Internet - Aviance Technologies","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#primaryimage"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/The-Constant-Risk-of-a-Consolidated-Internet.png","datePublished":"2020-07-26T13:00:24+00:00","breadcrumb":{"@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#primaryimage","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/The-Constant-Risk-of-a-Consolidated-Internet.png","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/The-Constant-Risk-of-a-Consolidated-Internet.png","width":960,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/aviancetechnologies.com\/blog\/the-constant-risk-of-a-consolidated-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aviancetechnologies.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Constant Risk of a Consolidated Internet"}]},{"@type":"WebSite","@id":"https:\/\/aviancetechnologies.com\/blog\/#website","url":"https:\/\/aviancetechnologies.com\/blog\/","name":"Aviance Technologies","description":"Latest Technology Trends","publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aviancetechnologies.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aviancetechnologies.com\/blog\/#organization","name":"Aviance Technologies","url":"https:\/\/aviancetechnologies.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","width":217,"height":77,"caption":"Aviance Technologies"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc","name":"ATN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","caption":"ATN"},"url":"https:\/\/aviancetechnologies.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/5581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=5581"}],"version-history":[{"count":0,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/5581\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media\/5582"}],"wp:attachment":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=5581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=5581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=5581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}