{"id":740,"date":"2013-07-17T15:38:32","date_gmt":"2013-07-17T19:38:32","guid":{"rendered":"http:\/\/209.208.108.186\/?p=740"},"modified":"2013-07-17T15:38:32","modified_gmt":"2013-07-17T19:38:32","slug":"analyze-your-encrypted-traffic-with-cyblock-ssl-inspection","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/","title":{"rendered":"Analyze Your Encrypted Traffic With CyBlock SSL Inspection"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-742 aligncenter\" title=\"CyBlock HTTPs Inspection\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg\" alt=\"\" width=\"549\" height=\"98\" \/><\/p>\n<p>In huge numbers, more and more organizations, particularly e-businesses, are using Web-enabled applications that involve the use of personal, private, and sensitive data. Banking, online shopping, and credit card transactions are good examples, but by no means the only ones. SSL encryption is being increasingly used to protect the confidentiality of this business and personal data on the Web. Surveys show 25%-35% of enterprise traffic is SSL-encrypted, and the number can be as high as 70% in specific industries. SSL encryption is the most cost-effective way of protecting the privacy of this traffic.<\/p>\n<p>While SSL encryption solves many privacy-protection problems, it can allow traffic that poses security threats\u2013both inbound and outbound\u2013to pass through security protection measures uninspected and unchecked.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Inbound Problem.<\/strong>\u00a0 SSL encryption creates security blind spots in incoming traffic. The traditional security infrastructure that protects an organization is blind to the threats in inbound SSL traffic and provides an easy vehicle for criminals and hackers to hide their cyber attacks.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Outbound Problem.<\/strong>\u00a0 In addition to the risks of incoming threats hiding over SSL channels bypassing security protections, outbound enterprise traffic is now a growing problem. This is becoming quite a \u201chot button\u201d for security applications (e.g., content filtering applications) that tackle data loss prevention (DLP), compliance reporting, and lawful intercept. In the past these solutions could see what was outgoing, but now they are suddenly \u201cin the dark\u201d when it comes to the data transferred over SSL.<\/p>\n<p>From a security standpoint, most organizations already deploy an array of network and security appliances and programs to protect their enterprise, enforce internal corporate acceptable use policies, and satisfy external government regulation. Unfortunately, in many instances, they can only inspect plaintext traffic and are unable to inspect HTTPS communications for attack signatures. This makes it difficult or impossible for network administrators to enforce corporate acceptable use policies or ensure threats, such as viruses, spam, and malware, are stopped before they reach individual users.<\/p>\n<p>In addition, without the ability to examine the contents of HTTPS communications, network administrators leave open the possibility for information to be accidentally leaked out of the enterprise or worse, stolen. Regulatory compliance requirements, including identifying accidental or intentional leakage of confidential information, are also virtually impossible to meet because of HTTPS encryption.<\/p>\n<p><a title=\"CyBlock\" href=\"https:\/\/www.wavecrest.net\/products\/cyblock\/sa\/index.html\" target=\"_blank\">CyBlock<\/a> SSL Inspection gives network administrators the ability to monitor this SSL-encrypted traffic and to identify and respond to any undesirable content. The total HTTPS inspection process decrypts, analyzes, categorizes, and then re-encrypts the traffic. If necessary, specific standard and\/or custom URL categories can be <em>exempted<\/em> from the inspection process; this is known as \u201ctunneling.\u201d In addition, full URL information in a number of Wavecrest audit reports is available to network administrators.<\/p>\n<p>To learn more about how <a href=\"https:\/\/www.wavecrest.net\/products\/cyblock\/sa\/index.html\" target=\"_blank\">CyBlock<\/a> SSL Inspection can protect your sensitive data, please see our <a href=\"https:\/\/www.wavecrest.net\/products\/include\/CyBlockSSLInspection.pdf\" target=\"_blank\">SSL Inspection Tech Brief<\/a> or contact Technical Support at (321) 953-5351, Ext. 4 or <a href=\"mailto:support@wavecrest.net\">support@wavecrest.net<\/a>.<\/p>\n<p><strong>Source:<\/strong>\u00a0 Examining SSL-Encrypted Communications &#8211; Netronome<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In huge numbers, more and more organizations, particularly e-businesses, are using Web-enabled applications that involve the use of personal, private, and sensitive data. Banking, online shopping, and credit card transactions are good examples, but by no means the only ones. SSL encryption is being increasingly used to protect the confidentiality of this business and personal [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,106,89,9,60],"tags":[111,352,311,312,326,134,497,353,354,331,355,356,357],"class_list":["post-740","post","type-post","status-publish","format-standard","hentry","category-cyblock","category-cyblock-appliance","category-cyblock-proxy","category-security-threats","category-wave-news","tag-acceptable-use-policies","tag-audit-reports","tag-categories","tag-cyblock-2","tag-https","tag-malware","tag-security-threats","tag-spam","tag-ssl-encryption","tag-ssl-inspection","tag-ssl-traffic","tag-tunneling","tag-viruses"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analyze Your Encrypted Traffic With CyBlock SSL Inspection - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyze Your Encrypted Traffic With CyBlock SSL Inspection - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"In huge numbers, more and more organizations, particularly e-businesses, are using Web-enabled applications that involve the use of personal, private, and sensitive data. Banking, online shopping, and credit card transactions are good examples, but by no means the only ones. SSL encryption is being increasingly used to protect the confidentiality of this business and personal [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-17T19:38:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Analyze Your Encrypted Traffic With CyBlock SSL Inspection\",\"datePublished\":\"2013-07-17T19:38:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\"},\"wordCount\":494,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg\",\"keywords\":[\"acceptable use policies\",\"audit reports\",\"categories\",\"cyblock\",\"HTTPS\",\"malware\",\"Security Threats\",\"spam\",\"ssl encryption\",\"SSL inspection\",\"ssl traffic\",\"tunneling\",\"viruses\"],\"articleSection\":[\"CyBlock\",\"CyBlock Appliance\",\"CyBlock Software\",\"Security Threats\",\"Wave News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\",\"name\":\"Analyze Your Encrypted Traffic With CyBlock SSL Inspection - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg\",\"datePublished\":\"2013-07-17T19:38:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg\",\"width\":\"1047\",\"height\":\"574\",\"caption\":\"CyBlock HTTPs Inspection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analyze Your Encrypted Traffic With CyBlock SSL Inspection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyze Your Encrypted Traffic With CyBlock SSL Inspection - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/","og_locale":"en_US","og_type":"article","og_title":"Analyze Your Encrypted Traffic With CyBlock SSL Inspection - Wavecrest Blog","og_description":"In huge numbers, more and more organizations, particularly e-businesses, are using Web-enabled applications that involve the use of personal, private, and sensitive data. Banking, online shopping, and credit card transactions are good examples, but by no means the only ones. SSL encryption is being increasingly used to protect the confidentiality of this business and personal [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2013-07-17T19:38:32+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Analyze Your Encrypted Traffic With CyBlock SSL Inspection","datePublished":"2013-07-17T19:38:32+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/"},"wordCount":494,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg","keywords":["acceptable use policies","audit reports","categories","cyblock","HTTPS","malware","Security Threats","spam","ssl encryption","SSL inspection","ssl traffic","tunneling","viruses"],"articleSection":["CyBlock","CyBlock Appliance","CyBlock Software","Security Threats","Wave News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/","url":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/","name":"Analyze Your Encrypted Traffic With CyBlock SSL Inspection - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg","datePublished":"2013-07-17T19:38:32+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2013\/07\/https-ubuntu-12.10.jpg","width":"1047","height":"574","caption":"CyBlock HTTPs Inspection"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/analyze-your-encrypted-traffic-with-cyblock-ssl-inspection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Analyze Your Encrypted Traffic With CyBlock SSL Inspection"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=740"}],"version-history":[{"count":15,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/740\/revisions"}],"predecessor-version":[{"id":756,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/740\/revisions\/756"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}