{"id":201,"date":"2018-02-09T11:53:51","date_gmt":"2018-02-09T11:53:51","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=201"},"modified":"2021-09-23T06:31:05","modified_gmt":"2021-09-23T06:31:05","slug":"everything-you-need-to-know-about-meltdown-spectre","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/","title":{"rendered":"Everything You Need to Know About Meltdown &#038; Spectre"},"content":{"rendered":"<p><b>Everything You Need to Know About Meltdown &amp; Spectre<\/b><\/p>\n<p><b>What are Meltdown and Spectre?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Meltdown and Spectre are software viruses that take advantage of recently discovered computer hardware security vulnerabilities. They are the result of a hardware design flaw that was originally found to be present in all Intel chips made in the last 20 years.<\/span><\/p>\n<p><!--more--><span style=\"font-weight: 400;\"><br \/>\n<\/span><a href=\"https:\/\/xen-orchestra.com\/blog\/meltdown-and-spectre-for-xenserver\/\"><span style=\"font-weight: 400;\">This flaw essentially allows rogue programs<\/span><\/a><span style=\"font-weight: 400;\"> to access the contents of protected kernel memory areas of the computer\u2019s processors. The Meltdown and Spectre exploits have the potential to allow attackers to gain access to critical data previously considered completely protected.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><b>Meltdown<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Meltdown is so-called because it figuratively &#8216;melts&#8217; the security boundaries normally enforced by chip hardware that protect sections of the memory. Essentially it&#8217;s able to spy on data it shouldn&#8217;t have access to.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Spectre, on the other hand, derives its name from speculative execution, which involves a chip attempting to get a headstart on what a user might want from it. For instance, if the program a user is running follows an &#8216;if X, then Y&#8217; rule, then if a user chooses to perform X, the chip must then work on carrying out Y. A chip performing speculative execution would start carrying out Y before the user chooses to perform X, to get a headstart on computation. Doing so leaks data that should stay confidential.<\/span><\/p>\n<p><b>Spectre<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">A Spectre attack requires more intimate knowledge of the victim program&#8217;s inner workings, and doesn&#8217;t allow access to other programs&#8217; data, but will also work on just about any computer chip out there.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Spectre&#8217;s name also derives from the fact that it will be much trickier to stop \u2014 while patches are starting to become available, other attacks in the same family will no doubt be discovered. That&#8217;s the other reason for the name: Spectre will be haunting us for some time.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The official Spectre website (<\/span><a href=\"https:\/\/meltdownattack.com\/\"><span style=\"font-weight: 400;\">yes, there is one<\/span><\/a><span style=\"font-weight: 400;\">) states that while Spectre is harder to exploit than Meltdown, it is also harder to mitigate. It breaks the isolation between different applications and allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. However, it is possible to prevent specific known exploits based on Spectre through software patches.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Who is affected?<\/b><b><br \/>\n<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Short answer: Pretty much everybody.<\/span><b><br \/>\n<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Meltdown only affects Intel processors and at the moment, it is unclear whether AMD processors are also affected. ARM says some of its processors are also affected.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Spectre is much more widespread, however. Almost every system is affected by Spectre, including desktops, laptops, cloud servers, and even smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable, that means all popular operating systems, including Windows, Linux, and macOS are affected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A huge variety of devices, from laptops to smartphones to servers, are therefore theoretically affected. <\/span><a href=\"https:\/\/techcrunch.com\/2018\/01\/03\/kernel-panic-what-are-meltdown-and-spectre-the-bugs-affecting-nearly-every-computer-and-device\/\"><span style=\"font-weight: 400;\">The assumption going forward should be that any untested device should be considered vulnerable<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>How are VMs affected?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">All those vulnerabilities affect infrastructure with untrusted VMs. If <\/span><a href=\"https:\/\/xen-orchestra.com\/blog\/meltdown-and-spectre-for-xenserver\/\"><span style=\"font-weight: 400;\">you run your on-premise\/isolated &#8220;cloud&#8221;<\/span><\/a><span style=\"font-weight: 400;\">, you are relatively safe (still losing one &#8220;defence&#8221; anyway). This must be a reminder that even on the cloud, your applications still run on some hardware.<\/span><\/p>\n<p><b>XenServer<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">Meltdown on XenServer<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Meltdown is using a design flaw into Intel CPUs only. This is called by Xen sec team &#8220;SP3&#8221; (aka rogue data cache load). You are impacted only if you are using:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">64-bits PV type VM (HVM\/PVHVM aren&#8217;t affected!)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Intel CPUs (AMD chip design is a bit different and not affected)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Untrusted VMs, ie untrusted users having VM access (even non-root!)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">All XenServer versions are affected<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 400;\">Spectre on XenServer <\/span><\/i><\/p>\n<p><a href=\"https:\/\/xen-orchestra.com\/blog\/meltdown-and-spectre-for-xenserver\/\"><span style=\"font-weight: 400;\">Spectre contains both &#8220;SP2&#8221;, aka &#8220;Branch Target Injection&#8221; and &#8220;SP1&#8221; aka &#8220;Bounds-check bypass&#8221;.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/a><span style=\"font-weight: 400;\">For now, there is no known exploit for &#8220;SP1&#8221;. The issue then is on &#8220;SP2&#8221;. If you have untrusted VMs, you are vulnerable, whatever XenServer version you are using, or the virtualization mode.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn how to help mitigate the risks to your Xenserver, <\/span><a href=\"https:\/\/xen-orchestra.com\/blog\/meltdown-and-spectre-for-xenserver\/\"><span style=\"font-weight: 400;\">click here<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><b>VMware<\/b><\/p>\n<p><span style=\"font-weight: 400;\">VMware states that Meltdown and Spectre can create problems for its virtual appliances and explains that the mitigation tactics will stop attacks but must be considered &#8220;a temporary solution only and permanent fixes will be released as soon as they are available.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The workarounds are important because VMware ships some of its products as appliances. vCenter, for example, now ships as a software appliance, because VMware would rather you did not install it as a guest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn how to mitigate risks to your VMware VMs, <\/span><a href=\"https:\/\/www.theregister.co.uk\/2018\/02\/09\/vmware_temp_fixes_for_meltdown_spectre_for_virtual_appliances\/\"><span style=\"font-weight: 400;\">click here<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><b>How RecordTS can save you<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In the spirit of preserving data, session recording offers a way to protect critical actions that can assist in forensic analysis and offer a layer of protection against ransomware viruses.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Would you like to know more? Visit <a href=\"http:\/\/www.tsfactory.com\">www.tsfactory.com<\/a><\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everything You Need to Know About Meltdown &amp; Spectre What are Meltdown and Spectre? Meltdown and Spectre are software viruses that take advantage of recently discovered computer hardware security vulnerabilities. They are the result of a hardware design flaw that was originally found to be present in all Intel chips made in the last 20 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[14,30],"class_list":["post-201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-cybersecurity","tag-meltdown-sprectre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Everything You Need to Know About Meltdown &amp; Spectre - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything You Need to Know About Meltdown &amp; Spectre - Blogs\" \/>\n<meta property=\"og:description\" content=\"Everything You Need to Know About Meltdown &amp; Spectre What are Meltdown and Spectre? Meltdown and Spectre are software viruses that take advantage of recently discovered computer hardware security vulnerabilities. They are the result of a hardware design flaw that was originally found to be present in all Intel chips made in the last 20 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-09T11:53:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-23T06:31:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png\" \/>\n\t<meta property=\"og:image:width\" content=\"799\" \/>\n\t<meta property=\"og:image:height\" content=\"464\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/\",\"name\":\"Everything You Need to Know About Meltdown & Spectre - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png\",\"datePublished\":\"2018-02-09T11:53:51+00:00\",\"dateModified\":\"2021-09-23T06:31:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png\",\"width\":799,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everything You Need to Know About Meltdown &#038; Spectre\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everything You Need to Know About Meltdown & Spectre - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/","og_locale":"en_US","og_type":"article","og_title":"Everything You Need to Know About Meltdown & Spectre - Blogs","og_description":"Everything You Need to Know About Meltdown &amp; Spectre What are Meltdown and Spectre? Meltdown and Spectre are software viruses that take advantage of recently discovered computer hardware security vulnerabilities. They are the result of a hardware design flaw that was originally found to be present in all Intel chips made in the last 20 [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2018-02-09T11:53:51+00:00","article_modified_time":"2021-09-23T06:31:05+00:00","og_image":[{"width":799,"height":464,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png","type":"image\/png"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/","name":"Everything You Need to Know About Meltdown & Spectre - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png","datePublished":"2018-02-09T11:53:51+00:00","dateModified":"2021-09-23T06:31:05+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/banner-e1632378660728.png","width":799,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/everything-you-need-to-know-about-meltdown-spectre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Everything You Need to Know About Meltdown &#038; Spectre"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=201"}],"version-history":[{"count":4,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/201\/revisions"}],"predecessor-version":[{"id":515,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/201\/revisions\/515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/202"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}