{"id":2815,"date":"2012-06-07T10:32:08","date_gmt":"2012-06-07T09:32:08","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2012\/06\/07\/linkedin-password-hashes-breach\/"},"modified":"2025-07-24T12:44:32","modified_gmt":"2025-07-24T11:44:32","slug":"linkedin-password-hashes-breach","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/","title":{"rendered":"LinkedIn Password Hashes Breach"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2815\" class=\"elementor elementor-2815\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5dc53971 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5dc53971\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5345321b\" data-id=\"5345321b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e91db0e elementor-widget elementor-widget-text-editor\" data-id=\"3e91db0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>\n<div>\n<div property=\"content:encoded\">\n<p>6.5 million LinkedIn password hashes breached which raises the fear that many more passwords are likely breached. Many passwords were related to LinkedIn.<\/p>\n<p>It\u2019s still early days on the leaking of the<strong> 6.5 million LinkedIn password hashes<\/strong>. I\u2019ve looked at the text file, and half of them are indeed SHA-1 hashes \u2013 the other half have a prefix \u201c00000\u201d so don\u2019t seem to be valid hashes. It has been verified that many of them are for LinkedIn, either through people independently checking that the SHA-1 hash of their password is in the list, or that many of the passwords are related to LinkedIn, for example, \u201cPasswordlinkedin\u201d, \u201csupermanlinkedin\u201d, \u201cLINKEDIN.COM\u201d, and \u201cWwwlinkedin07\u201d.<\/p>\n<p>The person who originally posted the password hashes was asking for help to crack the password hashes. The hashes in the list are all unique, and there no hashes for easy passwords such as dictionary words or simple variants such as \u201cPassword1\u201d. This implies that the list of password hashes that were posted contained only the ones that hadn\u2019t been cracked so far. Previous password dumps have shown that most people seem to use fairly weak passwords. We can therefore assume that 6.5 million is the tip of the iceberg; it may be more than 50 million, or may be the whole LinkedIn user database.<\/p>\n<p>These hashes must have been copied from a database. This same database would also contain the LinkedIn user\u2019s email address and other details. Why wouldn\u2019t the attacker copy those too?<\/p>\n<p>LinkedIn did \u201cconfirm that some of the passwords that were compromised correspond to LinkedIn accounts. [\u2026] These members will also receive an email from LinkedIn with instructions on how to reset their passwords.\u201d<\/p>\n<p>The blog entry is here:<br><a href=\"https:\/\/blog.linkedin.com\/2012\/06\/06\/linkedin-member-passwords-compromised\/\">https:\/\/blog.linkedin.com\/2012\/06\/06\/linkedin-member-passwords-compromised\/<\/a><\/p>\n<p>It looks like they\u2019ve cross-checked the password hashes with their own user database, and verified that these are for actual LinkedIn accounts. Given that someone breached LinkedIn and copied account details from a database, LinkedIn must be investigating how this happened. LinkedIn should be advising that all users should reset their passwords, given that it is likely that far more than 6.5 million accounts were compromised.<\/p>\n<p>Linkedin also stated that \u201cmembers whose passwords have not been compromised benefit from the enhanced security we just recently put in place, which includes hashing and salting of our current password databases.\u201d<\/p>\n<p>Either LinkedIn introduced salting before the breach, in which case the attackers will likely have email addresses, salts and hashes that can still be cracked, or they introduced it afterwards, which means that the attackers still have valid passwords. In either case, this only means the user will have a salted hashed password if they changed their password recently. Unless LinkedIn cracked the easy ones themselves to do the salting!<\/p>\n<p>Hopefully over the next few days LinkedIn will provide further information on the breach and also require all LinkedIn account holders to change their password who have not done so since the breach.<\/p>\n<p>UPDATE (11:29): After a bit more research, the half of the list with prefix \u201c00000\u201d seem to be the hashes that have been cracked so far. For example, the SHA-1 hash for \u201c123456\u201d is \u201c7c4a8d09ca3762af61e59520943dc26494f8941b\u201d, and replacing the start with 5 zeros gives \u201c00000d097c5c715d253c9e9fea40abcff7bd0e03\u201d, which is in the password hash list. Other examples which have been cracked are \u201cPassword1\u201d, \u201cqwerty\u201d, \u201csunshine\u201d and \u201clinkedin\u201d.<\/p>\n<p>This means that this may be the whole list of unique hashes. Given that many users will use the same weak passwords, the total number of compromised accounts may still be much higher than 6.5 million. LinkedIn seem to have checked the valid hashes so far. LinkedIn should also check their password hashes against the zero prefix hashes.<\/p><p><br><\/p>\n<\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>6.5 million LinkedIn password hashes breached which raises the fear that many more passwords are likely breached. Many passwords were related to LinkedIn. It\u2019s still early days on the leaking of the 6.5 million LinkedIn password hashes. I\u2019ve looked at the text file, and half of them are indeed SHA-1 hashes \u2013 the other half [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8691,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[220],"class_list":["post-2815","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-passwords","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LinkedIn Password Hashes Breach<\/title>\n<meta name=\"description\" content=\"Explore the LinkedIn password breach and learn why password hashing methods matter, plus what organisations can do to reduce credential-related risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LinkedIn Password Hashes Breach\" \/>\n<meta property=\"og:description\" content=\"Explore the LinkedIn password breach and learn why password hashing methods matter, plus what organisations can do to reduce credential-related risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-07T09:32:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T11:44:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"LinkedIn Password Hashes Breach\",\"datePublished\":\"2012-06-07T09:32:08+00:00\",\"dateModified\":\"2025-07-24T11:44:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\"},\"wordCount\":626,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1\",\"keywords\":[\"passwords\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\",\"url\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\",\"name\":\"LinkedIn Password Hashes Breach\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1\",\"datePublished\":\"2012-06-07T09:32:08+00:00\",\"dateModified\":\"2025-07-24T11:44:32+00:00\",\"description\":\"Explore the LinkedIn password breach and learn why password hashing methods matter, plus what organisations can do to reduce credential-related risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1\",\"width\":1000,\"height\":667,\"caption\":\"Active Directory Password Auditing Part 3 \u2013 Analysing the Hashes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LinkedIn Password Hashes Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/en-us\/#website\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LinkedIn Password Hashes Breach","description":"Explore the LinkedIn password breach and learn why password hashing methods matter, plus what organisations can do to reduce credential-related risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/","og_locale":"en_US","og_type":"article","og_title":"LinkedIn Password Hashes Breach","og_description":"Explore the LinkedIn password breach and learn why password hashing methods matter, plus what organisations can do to reduce credential-related risks.","og_url":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2012-06-07T09:32:08+00:00","article_modified_time":"2025-07-24T11:44:32+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"LinkedIn Password Hashes Breach","datePublished":"2012-06-07T09:32:08+00:00","dateModified":"2025-07-24T11:44:32+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/"},"wordCount":626,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"image":{"@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1","keywords":["passwords"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/","url":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/","name":"LinkedIn Password Hashes Breach","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1","datePublished":"2012-06-07T09:32:08+00:00","dateModified":"2025-07-24T11:44:32+00:00","description":"Explore the LinkedIn password breach and learn why password hashing methods matter, plus what organisations can do to reduce credential-related risks.","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1","width":1000,"height":667,"caption":"Active Directory Password Auditing Part 3 \u2013 Analysing the Hashes"},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/linkedin-password-hashes-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"LinkedIn Password Hashes Breach"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2019\/09\/ad-password-audit.jpg?fit=1000%2C667&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Jp","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=2815"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2815\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/8691"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=2815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=2815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=2815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}