{"id":20478,"date":"2016-02-22T13:13:26","date_gmt":"2016-02-22T18:13:26","guid":{"rendered":"http:\/\/angry.net\/blog2\/?p=20478"},"modified":"2020-10-12T16:39:13","modified_gmt":"2020-10-12T20:39:13","slug":"fbi-to-apple-decrypt-this-phone-or-else","status":"publish","type":"post","link":"https:\/\/angry.net\/blog2\/?p=20478","title":{"rendered":"FBI to Apple: Decrypt this phone or else!"},"content":{"rendered":"<p>Good day all. I\u2019ve been watching this story for the last week and I think I have enough information to make a few points. Long story short, The Federal Bureau of Investigation wants Apple to break their encryption protocols on the Iphone that one of the Islamic terrorists had from the San Bernardino attack.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/Department-of-Injustice.jpg\" rel=\"attachment wp-att-17181\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-thumbnail wp-image-17181\" src=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/Department-of-Injustice-150x150.jpg?resize=150%2C150\" alt=\"Department-of-Injustice\" width=\"150\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/Department-of-Injustice.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/Department-of-Injustice.jpg?zoom=2&amp;resize=150%2C150&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p>There has been lot of back and forth over this during the weekend. Also, a bit more information has come out that really makes the FBI look utterly incompetent. Here\u2019s what I know so far.<\/p>\n<p>The Iphone was actually the property of the agency that the male Islamic Terrorist worked for. It wasn\u2019t his personal phone. The personal phones and other electronic devices of the two terrorists were either erased or destroyed before they began their rampage. The FBI thinks that there is relevant data on that company phone.<\/p>\n<p>Apple has, in the past and with older phones, been able to unlock them. However, Apple, at this time, has no means to break the encryption on this or newer phones. Also, newer phones have been purposely designed by Apple so that there is no way for them to break the encryption, even if they wanted to. The FBI has gone to court to force Apple to create a tool to crack the encryption. Apple has refused and is fighting the order.<\/p>\n<p>Now for the incompetence part. As you may recall, the FBI let every Tom, Dick and Harry into the terrorists apartment. The claim they made was that they had recovered everything they considered important. Many law enforcement professionals, at all levels, questioned this decision by the FBI to release the apartment after two days.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2014\/09\/nothing-to-see-here.jpg\" rel=\"attachment wp-att-15908\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-15908\" src=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2014\/09\/nothing-to-see-here-300x191.jpg?resize=300%2C191\" alt=\"nothing to see here\" width=\"300\" height=\"191\" srcset=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2014\/09\/nothing-to-see-here.jpg?resize=300%2C191&amp;ssl=1 300w, https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2014\/09\/nothing-to-see-here.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>We have since learned that the agency that owned the phone had not installed any sort of management applications, and that, on the request of the FBI, changed the password to the Apple Icloud account so the FBI could get into it. When Apple was approached to get into the phone, Apple suggested going to a known WiFi point, such as the terrorists home and let the Iphone back up to the Icloud.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/03\/headdesk.jpg\" rel=\"attachment wp-att-17445\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-17445\" src=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/03\/headdesk-300x225.jpg?resize=300%2C225\" alt=\"headdesk\" width=\"300\" height=\"225\" srcset=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/03\/headdesk.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/03\/headdesk.jpg?w=449&amp;ssl=1 449w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Oops!<\/p>\n<p>Thanks to the FBI not securing the premises, and changing the password on the Icloud account, that phone could no longer back up to the network. This led the FBI to go to court and get a judge to force Apple to break the encryption on the phone. And this is where things get a little tricky.<\/p>\n<p>A number of people have equated the request as something similar to asking a safe company for help in cracking a safe they made. This is simply not the case. The actual tool needed to break into the phone doesn\u2019t exist and Apple would be forced to create it, probably at their own expense. (Violation of the 13<sup>th<\/sup> Amendment possibly?) Then there is the problem of what happens after the tool is created?<\/p>\n<p>The Federal Government has demonstrated that it can\u2019t be trusted not to abuse this tool to crack into anyone\u2019s Iphone at will. There is also the other issue that this will show that the Iphone encryption can be cracked, rendering one of their sales features moot. Now the FBI is trying to shame Apple into caving in and not only cracking the phone, if possible, but also destroying one of their biggest moneymakers. Here\u2019s what <a href=\"https:\/\/web.archive.org\/web\/20160516091806\/http:\/\/www.foxnews.com:80\/us\/2016\/02\/22\/victims-owed-thorough-investigation-san-bernardino-shooting-fbi-director-says.html?intcmp=hpbt1\" target=\"_blank\" rel=\"noopener noreferrer\">Fox News has to say<\/a>:<\/p>\n<p style=\"padding-left: 30px;\"><b>FBI Director James Comey said late Sunday that the agency owed the victims of last December&#8217;s San Bernardino terror attack a &#8220;thorough and professional investigation&#8221; in an effort to explain why law enforcement officials are trying to compel Apple to help them gain access to a cellphone owned by one of the gunmen. <\/b><\/p>\n<p>And if it hadn\u2019t been for the stupefying incompetence of your agency, you probably wouldn\u2019t be in this situation in the first place. Recall that the Department of Justice bent over backwards to deny that this was an Islamic Jihadi terrorist attack.<\/p>\n<p style=\"padding-left: 30px;\"><b>In a post on the Lawfare blog, Comey wrote that the FBI &#8220;can&#8217;t look the survivors in the eye, or ourselves in the mirror, if we don&#8217;t follow this lead.&#8221; <\/b><\/p>\n<p>The problem, and there are many with this demand, is that if allowed and Apple is forced to comply, (Provided they actually can comply), then this will be a backdoor used by the government to basically break encryption in the United States. If companies are forced to put some sort of a backdoor into their products, people will stop trusting them. Also, any site that uses encryption, especially financial systems, will see people stop using them.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/computer-security-criminal.jpg\" rel=\"attachment wp-att-17193\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-17193\" src=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/computer-security-criminal-300x199.jpg?resize=300%2C199\" alt=\"computer-security-criminal\" width=\"300\" height=\"199\" srcset=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/computer-security-criminal.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/02\/computer-security-criminal.jpg?w=425&amp;ssl=1 425w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Then there is the problem of hackers. Once it is known that a backdoor exists, they won\u2019t stop until they find it. Apple, seeing this as well as the known abuse by the Federal Government of the Constitutional rights of Americans, <a href=\"https:\/\/www.apple.com\/customer-letter\/\" target=\"_blank\" rel=\"noopener noreferrer\">posted an open letter on their company web site.<\/a> Some of the key parts of the letter refer to why Apple won\u2019t create a key to break into the phone.<\/p>\n<p style=\"padding-left: 30px;\"><strong>When the FBI has requested data that\u2019s in our possession, we have provided it.\u00a0Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case.\u00a0We have also made Apple engineers available to advise the FBI, and we\u2019ve\u00a0offered our best ideas on a number of investigative options at their disposal.<\/strong><\/p>\n<p style=\"padding-left: 30px;\"><strong>We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.<\/strong><\/p>\n<p style=\"padding-left: 30px;\"><b>Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software \u2014 which does not exist today \u2014 would have the potential to unlock any iPhone in someone\u2019s physical possession. <\/b><\/p>\n<p style=\"padding-left: 30px;\"><b>The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control. <\/b><\/p>\n<p>And there you have it. Among the reasons Apple doesn\u2019t want to try and break into the phone is that they are concerned that the tool will be abused by the government. The government denials regarding this possibility, thanks to Edward Snowden, aren\u2019t worth the paper they\u2019re written on. Read the <a href=\"https:\/\/www.apple.com\/customer-letter\/\" target=\"_blank\" rel=\"noopener noreferrer\">letter in it\u2019s entirety<\/a>, and then follow the <a href=\"https:\/\/www.apple.com\/customer-letter\/answers\/\" target=\"_blank\" rel=\"noopener noreferrer\">link to their Answers page<\/a> to see a more detailed explanation.<\/p>\n<p>This demand by the FBI has basically brought out into the open the fight the Tech sector has been having with the Federal Government. The various agencies, starting with the NSA, have hated any use of encryption by private citizens and corporations. It makes it hard for them to just steamroll their way into things and rummage through people\u2019s information. This battle has been going on for decades, going back to at least the <a href=\"http:\/\/www.spectacle.org\/795\/zimm.html\" target=\"_blank\" rel=\"noopener noreferrer\">Phil Zimmerman\/PGP battles<\/a> in the late 20<sup>th<\/sup> century. This case with Apple has brought the whole thing to a head.<\/p>\n<p>Now the question is, what happens if the courts order Apple to, basically, destroy their business? Have no doubt, if Apple is forced to build a backdoor into their systems, the Apple Iphone is dead. We\u2019re talking literally hundreds of billions of dollars on that part. Then we have the known antics of agencies like the NSA, which has been proven to slurp up everyone\u2019s data in a clear violation of the 4<sup>th<\/sup> Amendment.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2013\/01\/constitution-Void-where-prohibited-by-Obama.jpg\" rel=\"attachment wp-att-10616\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10616\" src=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2013\/01\/constitution-Void-where-prohibited-by-Obama.jpg?resize=300%2C235\" alt=\"constitution, Void where prohibited by Obama\" width=\"300\" height=\"235\" srcset=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2013\/01\/constitution-Void-where-prohibited-by-Obama.jpg?w=300&amp;ssl=1 300w, https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2013\/01\/constitution-Void-where-prohibited-by-Obama.jpg?resize=150%2C117&amp;ssl=1 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>We\u2019re seeing prosecutors dropping cases because the technical tools they used, such as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stingray_phone_tracker\" target=\"_blank\" rel=\"noopener noreferrer\">Stingray<\/a> system, and before that the <a href=\"https:\/\/en.wikipedia.org\/wiki\/ECHELON\" target=\"_blank\" rel=\"noopener noreferrer\">Echelon system<\/a>, to gather evidence to arrest people clearly violated their constitutional rights. The Supreme Court has ruled that your you can\u2019t be forced to give up the password to your phone, but that hasn\u2019t stopped law Enforcement agencies from braking into them anyway. (If you have a fingerprint reader and use that, you can be forced to provide the print to unlock it. Word to the wise, don\u2019t use the reader)<\/p>\n<p>It is very unlikely that the terrorists left anything on that phone. The very fact that the destroyed all their personal electronics makes me think that the only thing that terrorist used his phone for, was work related. I suspect the FBI knows this and is simply using this situation to force Apple, and later on other companies to build in the backdoors they\u2019ve always wanted. Their claim that they just want to \u201cProtect people\u201d is laughable on its face.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2016\/01\/steaming_pile_of_horseshit.jpg\" rel=\"attachment wp-att-20194\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-20194\" src=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2016\/01\/steaming_pile_of_horseshit-300x223.jpg?resize=300%2C223\" alt=\"steaming_pile_of_horseshit\" width=\"300\" height=\"223\" srcset=\"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2016\/01\/steaming_pile_of_horseshit.jpg?resize=300%2C223&amp;ssl=1 300w, https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2016\/01\/steaming_pile_of_horseshit.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>You do not protect the American People by Spying on the American People. You protect the American People by spying on our enemies in other countries, like Iran. I suspect that no matter which way this goes, if Apple is ordered to build the tools, they might flat out refuse and tell the judges they will not comply.<\/p>\n<p>This will start a major confrontation. You will have the Statists in Washington preparing legislation outlawing encryption. And you may end up with thousands of programers deciding that the time had come to completely crush the Government\u2019s IT infrastructure.<\/p>\n<p>You won\u2019t have Russian script kiddies doing Denial of Service attacks. You won\u2019t have foreign governments trying to break in to steal information. What you will have are some of the best programers in the world, who are really pissed off, going into the government systems and destroying them.<\/p>\n<p>Consider this. The Social Security and Welfare checks don\u2019t go out because all the records are gone. Payroll for all the non defense agencies, (Because you always want to make sure the soldiers are paid), deleted. In the case of the Department of Justice, you could even see the bank accounts of their employees raided and zeroed out. Credit histories ruined. Think <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet<\/a> on steroids multiplied by 10,000.<\/p>\n<p>I\u2019ve always thought that the next American Civil War would start when some agency attacked a group and ended up getting shot to pieces. I never considered that the first \u201cShots\u201d as it were might be nonlethal yet far more devastating. As you have probably gathered, I\u2019m backing Apple, a company that I despise, on this issue.<\/p>\n<p>Thatisall<\/p>\n<p><i><b>~The Angry Webmaster~<\/b><\/i><\/p>\n<p>[yasr_visitor_votes size=&#8221;medium&#8221;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Good day all. I\u2019ve been watching this story for the last week and I think I have enough information to make a few points. Long story short, The Federal Bureau of Investigation wants Apple to break their encryption protocols on &hellip; <a href=\"https:\/\/angry.net\/blog2\/?p=20478\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[3,5,37,71,8,115,57,9,219,35],"tags":[11,52,3,127,12,222,15,17,101,57,9,26],"class_list":["post-20478","post","type-post","status-publish","format-standard","hentry","category-crime","category-history","category-liberty-politics","category-news-of-the-day","category-politics","category-stupidity-crime","category-technology","category-terrorism-crime","category-the-good-idea-fairy","category-tyranny","tag-america","tag-constitution","tag-crime","tag-fascism","tag-freedom","tag-good-idea-fairy","tag-incompetence","tag-liberty","tag-news","tag-technology","tag-terrorism-crime","tag-terrorists"],"views":760,"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":44285,"url":"https:\/\/angry.net\/blog2\/?p=44285","url_meta":{"origin":20478,"position":0},"title":"FBI now states that Islamic Terrorist worked alone","author":"Angry Webmaster","date":"January 2, 2025","format":false,"excerpt":"Good day all. It\u2019s been about 30 hours since the terrorist attack in New Orleans with a second attack in Las Vegas. Initially, the FBI in New Orleans, right after the NOPD said this was a terrorist attack, claimed that it wasn\u2019t. Now they are saying that the terrorist was\u2026","rel":"","context":"In &quot;Just Desserts&quot;","block_context":{"text":"Just Desserts","link":"https:\/\/angry.net\/blog2\/?cat=135"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/i.pinimg.com\/originals\/5b\/ff\/99\/5bff997110e9330b2c9d29dd45e8d5f1.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":20728,"url":"https:\/\/angry.net\/blog2\/?p=20728","url_meta":{"origin":20478,"position":1},"title":"Apple vs FBI","author":"Angry Systems Administrator","date":"March 20, 2016","format":false,"excerpt":"Good day all, this is the Angry Systems Administrator. We haven\u2019t talked much about the FBI\u2019s trying to force Apple to break the encryption protocols on the San Bernardino terrorists company issued Iphone. The last posting was done by the Angry Webmaster back in February. He wrote about Apple\u2019s response\u2026","rel":"","context":"In &quot;Crime&quot;","block_context":{"text":"Crime","link":"https:\/\/angry.net\/blog2\/?cat=3"},"img":{"alt_text":"The Angry Systems Administrator","src":"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2013\/12\/dr_strangelove_1ed07-300x225.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":21066,"url":"https:\/\/angry.net\/blog2\/?p=21066","url_meta":{"origin":20478,"position":2},"title":"ISIS targets New Yorkers","author":"Angry Webmaster","date":"May 3, 2016","format":false,"excerpt":"Good day all. This story came out last week and was completely ignored by the American Mostly Stupid Media. It seems that Obama\u2019s favorite JV team, ISIS, has put out a hit on some 3600 random New Yorkers.","rel":"","context":"In &quot;Crime&quot;","block_context":{"text":"Crime","link":"https:\/\/angry.net\/blog2\/?cat=3"},"img":{"alt_text":"Islamic-terrorism","src":"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2016\/01\/Islamic-terrorism-300x182.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":36382,"url":"https:\/\/angry.net\/blog2\/?p=36382","url_meta":{"origin":20478,"position":3},"title":"Follow up on the Texas Hostage situation","author":"Angry Webmaster","date":"January 22, 2022","format":false,"excerpt":"Good day all. Now that the Islamic Terrorist, allowed into the United States by the Bumbles Dementia Maladministration, has been successfully concluded, with the terrorist in question now shagging his 72 virgin goats, there are a few interesting details coming out. It was announced that the FBI had stormed the\u2026","rel":"","context":"In &quot;Crime&quot;","block_context":{"text":"Crime","link":"https:\/\/angry.net\/blog2\/?cat=3"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/angry.net\/blog2\/wp-content\/uploads\/2015\/05\/jahidi-in-texas-300x225.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":44282,"url":"https:\/\/angry.net\/blog2\/?p=44282","url_meta":{"origin":20478,"position":4},"title":"Angry Webmaster BANNED by Linktree","author":"Angry Webmaster","date":"January 2, 2025","format":false,"excerpt":"Good day all. Well, not that good of a day. When I woke up and logged into my system, I found an email from Linktree telling me my account had been terminated for hate speech. The offending URL? It was my post on New Years Day regarding the Islamic terrorist\u2026","rel":"","context":"In &quot;liberty&quot;","block_context":{"text":"liberty","link":"https:\/\/angry.net\/blog2\/?cat=37"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/i.pinimg.com\/736x\/79\/cf\/97\/79cf97a8a1dda3462047cc50a33ffbe8.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":36397,"url":"https:\/\/angry.net\/blog2\/?p=36397","url_meta":{"origin":20478,"position":5},"title":"DoJ now forming special unit to deal with \u201cDomestic Terrorists","author":"Angry Webmaster","date":"January 26, 2022","format":false,"excerpt":"Good day all. Once upon a time, the Department of Justice was dedicated to fighting crime and corruption and protecting the rights of American citizens. Those days are long gone. Now the DoJ is nothing more than a tool of repression used to go after the enemies of the Deep\u2026","rel":"","context":"In &quot;liberty&quot;","block_context":{"text":"liberty","link":"https:\/\/angry.net\/blog2\/?cat=37"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/i.pinimg.com\/originals\/e7\/d4\/69\/e7d469e0f03bee18dbb7f53a1f6d893f.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=\/wp\/v2\/posts\/20478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20478"}],"version-history":[{"count":6,"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=\/wp\/v2\/posts\/20478\/revisions"}],"predecessor-version":[{"id":31975,"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=\/wp\/v2\/posts\/20478\/revisions\/31975"}],"wp:attachment":[{"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/angry.net\/blog2\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}