{"id":19220,"date":"2022-06-01T10:45:13","date_gmt":"2022-06-01T18:45:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/01\/news-12953\/"},"modified":"2022-06-01T10:45:13","modified_gmt":"2022-06-01T18:45:13","slug":"news-12953","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/01\/news-12953\/","title":{"rendered":"The Race to Hide Your Voice"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62969e5ac54d2f0c8603ffab\/master\/pass\/security-voice-ai.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Wed, 01 Jun 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Your voice reveals<\/span> more about you than you realize. To the human ear, your voice can instantly give away your mood, for example\u2014it\u2019s easy to tell if you\u2019re excited or upset. But machines can learn a lot more: inferring your age, gender, ethnicity, socio-economic status, health conditions, and beyond. Researchers have even been able to <a data-offer-url=\"https:\/\/speech2face.github.io\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/speech2face.github.io\/&quot;}\" href=\"https:\/\/speech2face.github.io\/\" rel=\"nofollow noopener\" target=\"_blank\">generate images of faces<\/a> based on the information contained in individuals\u2019 voice data.<\/p>\n<p class=\"paywall\">As machines become better at understanding you through your voice, companies are cashing in. Voice recognition systems\u2014from Siri and Alexa to those using your voice as your password\u2014have proliferated in recent years as artificial intelligence and machine learning have unlocked the ability to understand not just what you are saying but who you are. Big Voice may be a <a data-offer-url=\"https:\/\/www.globenewswire.com\/en\/news-release\/2022\/01\/17\/2367743\/0\/en\/Global-Voice-and-Speech-Recognition-Technology-Market-to-Reach-US-20-9-Billion-by-the-Year-2026.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.globenewswire.com\/en\/news-release\/2022\/01\/17\/2367743\/0\/en\/Global-Voice-and-Speech-Recognition-Technology-Market-to-Reach-US-20-9-Billion-by-the-Year-2026.html&quot;}\" href=\"https:\/\/www.globenewswire.com\/en\/news-release\/2022\/01\/17\/2367743\/0\/en\/Global-Voice-and-Speech-Recognition-Technology-Market-to-Reach-US-20-9-Billion-by-the-Year-2026.html\" rel=\"nofollow noopener\" target=\"_blank\">$20 billion<\/a> industry within a few years. And as the market grows, privacy-focused researchers are increasingly searching for ways to protect people from having their voice data used against them.<\/p>\n<p class=\"paywall\">Both the words you say and how you say them can be used to identify you, says Emmanuel Vincent, a senior research scientist specializing in voice technologies at France\u2019s National Institute for Research in Digital Science and Technology (Inria), but this is only the beginning. \u201cYou will also find other pieces of information about your emotions or your medical condition,\u201d Vincent says.<\/p>\n<p class=\"paywall\">\u201cThese additional pieces of information help build a more complete profile\u2014then this would be used for all sorts of targeted advertisements,\u201d Vincent says. As well as your voice data potentially feeding into the vast realm of data used to show you online ads, there\u2019s also the risk that hackers could access the location where your voice data is stored and use it to impersonate you. A small number of these cloning incidents have <a data-offer-url=\"https:\/\/www.vice.com\/en\/article\/pkyqvb\/deepfake-audio-impersonating-ceo-fraud-attempt\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.vice.com\/en\/article\/pkyqvb\/deepfake-audio-impersonating-ceo-fraud-attempt&quot;}\" href=\"https:\/\/www.vice.com\/en\/article\/pkyqvb\/deepfake-audio-impersonating-ceo-fraud-attempt\" rel=\"nofollow noopener\" target=\"_blank\">already happened<\/a>, proving the value your voice holds. Simple robocall scams have also recorded people saying \u201cyes\u201d to use the confirmation in <a data-offer-url=\"https:\/\/eu.usatoday.com\/story\/tech\/talkingtech\/2017\/03\/27\/dont-say-yes-when-robocall-scam-rings\/99709634\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/eu.usatoday.com\/story\/tech\/talkingtech\/2017\/03\/27\/dont-say-yes-when-robocall-scam-rings\/99709634\/&quot;}\" href=\"https:\/\/eu.usatoday.com\/story\/tech\/talkingtech\/2017\/03\/27\/dont-say-yes-when-robocall-scam-rings\/99709634\/\" rel=\"nofollow noopener\" target=\"_blank\">payment scams<\/a>.<\/p>\n<p class=\"paywall\">Last year, TikTok changed its privacy policies and started <a data-offer-url=\"https:\/\/techcrunch.com\/2021\/06\/03\/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/techcrunch.com\/2021\/06\/03\/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints\/&quot;}\" href=\"https:\/\/techcrunch.com\/2021\/06\/03\/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints\/\" rel=\"nofollow noopener\" target=\"_blank\">collecting the voiceprints<\/a>\u2014a loose term for the data your voice contains\u2014of people in the US alongside other biometric data, such as your faceprint. More broadly, call centers are using AI to analyze people\u2019s <a data-offer-url=\"https:\/\/www2.deloitte.com\/nl\/nl\/pages\/risk\/articles\/true-voice-call-center-ai-voice-analytics.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www2.deloitte.com\/nl\/nl\/pages\/risk\/articles\/true-voice-call-center-ai-voice-analytics.html&quot;}\" href=\"https:\/\/www2.deloitte.com\/nl\/nl\/pages\/risk\/articles\/true-voice-call-center-ai-voice-analytics.html\" rel=\"nofollow noopener\" target=\"_blank\">\u201cbehavior and emotion\u201d<\/a> during phone calls and evaluate the <a data-offer-url=\"https:\/\/www.contactspace.com\/speech-analytics\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.contactspace.com\/speech-analytics&quot;}\" href=\"https:\/\/www.contactspace.com\/speech-analytics\" rel=\"nofollow noopener\" target=\"_blank\">\u201ctone, pace, and pitch of every single word\u201d to develop<\/a> profiles of people and <a href=\"https:\/\/www.wired.com\/story\/this-call-may-be-monitored-for-tone-and-emotion\/\">increase sales<\/a>. \u201cWe\u2019re almost in a situation where the systems to recognize who you are and link everything together exist, but the protection is not there\u2014and it\u2019s still quite far away from being readily usable,\u201d says Henry Turner, who researched the security of voice systems at the University of Oxford.<\/p>\n<p class=\"paywall\">Your voice is produced through a <a data-offer-url=\"https:\/\/www.stonybrookmedicine.edu\/sites\/default\/files\/how_the_voice_works.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.stonybrookmedicine.edu\/sites\/default\/files\/how_the_voice_works.pdf&quot;}\" href=\"https:\/\/www.stonybrookmedicine.edu\/sites\/default\/files\/how_the_voice_works.pdf\" rel=\"nofollow noopener\" target=\"_blank\">complex process<\/a> involving the lungs and your voice box, throat, nose, mouth, and sinuses. More than a hundred muscles are activated when you speak, says R\u00e9becca Kleinberger, a voice researcher at the MIT Media Lab. \u201cIt&#x27;s also very much the brain,\u201d Kleinberger says.\u00a0<\/p>\n<p class=\"paywall\">Researchers are experimenting with four ways to enhance privacy for your voice, says Natalia Tomashenko, a researcher at Avignon University, France, who has been studying voice and is the <a data-offer-url=\"https:\/\/arxiv.org\/pdf\/2109.00648.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arxiv.org\/pdf\/2109.00648.pdf&quot;}\" href=\"https:\/\/arxiv.org\/pdf\/2109.00648.pdf\" rel=\"nofollow noopener\" target=\"_blank\">first author<\/a> of a research paper on the results of a <a data-offer-url=\"https:\/\/www.voiceprivacychallenge.org\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.voiceprivacychallenge.org\/&quot;}\" href=\"https:\/\/www.voiceprivacychallenge.org\/\" rel=\"nofollow noopener\" target=\"_blank\">voice privacy engineering challenge<\/a>. None of the methods are perfect, but they are being explored as possible ways to boost privacy in the infrastructure processing your voice data.<\/p>\n<p class=\"paywall\">First is obfuscation, which tries to completely hide who the speaker is. Think of a Hollywood depiction of a hacker totally distorting their voice over a phone call as they explain a devilish plot or ransom (or hacktivist collective <a data-offer-url=\"https:\/\/youtu.be\/gkrDIjGP4_w?t=46\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/youtu.be\/gkrDIjGP4_w?t=46&quot;}\" href=\"https:\/\/youtu.be\/gkrDIjGP4_w?t=46\" rel=\"nofollow noopener\" target=\"_blank\">Anonymous\u2019s promotional videos<\/a>). Simple <a data-offer-url=\"https:\/\/create.arduino.cc\/projecthub\/nootropicdesign\/arduino-audio-hacker-realtime-voice-changer-611b79\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/create.arduino.cc\/projecthub\/nootropicdesign\/arduino-audio-hacker-realtime-voice-changer-611b79&quot;}\" href=\"https:\/\/create.arduino.cc\/projecthub\/nootropicdesign\/arduino-audio-hacker-realtime-voice-changer-611b79\" rel=\"nofollow noopener\" target=\"_blank\">voice-changing hardware<\/a> allows anyone to quickly change the sound of their voice. More advanced speech-to-text-to-speech systems can transcribe what you\u2019re saying and then <a data-offer-url=\"https:\/\/apps.microsoft.com\/store\/detail\/speech-to-text-to-speech\/9PDPV1XL9LM3?hl=en-gb&amp;gl=GB\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/apps.microsoft.com\/store\/detail\/speech-to-text-to-speech\/9PDPV1XL9LM3?hl=en-gb&amp;gl=GB&quot;}\" href=\"https:\/\/apps.microsoft.com\/store\/detail\/speech-to-text-to-speech\/9PDPV1XL9LM3?hl=en-gb&amp;gl=GB\" rel=\"nofollow noopener\" target=\"_blank\">reverse the process<\/a> and <a data-offer-url=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8923157\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/ieeexplore.ieee.org\/abstract\/document\/8923157&quot;}\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8923157\" rel=\"nofollow noopener\" target=\"_blank\">say it in a new voice<\/a>.<\/p>\n<p class=\"paywall\">Second, Tomashenko says, researchers are looking at <a data-offer-url=\"https:\/\/odsc.medium.com\/what-is-federated-learning-99c7fc9bc4f5\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/odsc.medium.com\/what-is-federated-learning-99c7fc9bc4f5&quot;}\" href=\"https:\/\/odsc.medium.com\/what-is-federated-learning-99c7fc9bc4f5\" rel=\"nofollow noopener\" target=\"_blank\">distributed and federated learning<\/a>\u2014where your data doesn\u2019t leave your device but machine learning models still learn to recognize speech by <a data-offer-url=\"https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html&quot;}\" href=\"https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html\" rel=\"nofollow noopener\" target=\"_blank\">sharing their training with a bigger system<\/a>. Another approach involves building encrypted infrastructure to protect people\u2019s voices from snooping. However, most efforts are focused on voice anonymization.<\/p>\n<p class=\"paywall\">Anonymization attempts to keep your voice sounding human while stripping out as much of the information that could be used to identify you as possible. Speech anonymization efforts currently involve two separate strands: anonymizing the content of what someone is saying by deleting or replacing any sensitive words in files before they are saved and anonymizing the voice itself. Most voice anonymization efforts at the moment involve passing someone\u2019s voice through experimental software that will change some of the parameters in the voice signal to make it sound different. This can involve altering the pitch, replacing segments of speech with information from other voices, and synthesizing the final output.<\/p>\n<p class=\"paywall\">Does anonymization technology work? <a data-offer-url=\"https:\/\/www.voiceprivacychallenge.org\/resources\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.voiceprivacychallenge.org\/resources\/&quot;}\" href=\"https:\/\/www.voiceprivacychallenge.org\/resources\/\" rel=\"nofollow noopener\" target=\"_blank\">Male and female voice clips<\/a> that were anonymized as part of the Voice Privacy Challenge in 2020 definitely do sound different. They\u2019re more robotic, sound slightly pained and could\u2014to some listeners at least\u2014be from a different person than the original voice clips. \u201cI think it can already guarantee a much higher level of protection than doing nothing, which is the current status,\u201d says Vincent, who has been able to reduce how easy it is to identify people in anonymization <a data-offer-url=\"https:\/\/hal.inria.fr\/hal-03197376v2\/document\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/hal.inria.fr\/hal-03197376v2\/document&quot;}\" href=\"https:\/\/hal.inria.fr\/hal-03197376v2\/document\" rel=\"nofollow noopener\" target=\"_blank\">research<\/a>. However, humans aren\u2019t the only listeners. Rita Singh, an associate professor in Carnegie Mellon University\u2019s Language Technologies Institute, says that total de-identification of the voice signal is not possible, as machines will always have the potential to make links between attributes and individuals, even connections that aren\u2019t clear to humans. \u201cIs the anonymization with respect to a human listener or is it with respect to a machine listener?\u201d says Shri Narayanan, a professor of electrical and computer engineering at the University of Southern California.<\/p>\n<p class=\"paywall\">\u201cTrue anonymization is not possible without completely changing the voice,\u201d Singh says. \u201cWhen you completely change the voice, then it&#x27;s not the same voice.\u201d Despite this, it is still worth developing voice-privacy technology, Singh adds, as no privacy or security system is totally secure. Fingerprints and face identification systems on iPhones have been <a href=\"https:\/\/www.wired.com\/story\/hackers-say-broke-face-id-security\/\">spoofed<\/a> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2013\/09\/defeating-apples-touch-id-its-easier-than-you-may-think\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2013\/09\/defeating-apples-touch-id-its-easier-than-you-may-think\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2013\/09\/defeating-apples-touch-id-its-easier-than-you-may-think\/\" rel=\"nofollow noopener\" target=\"_blank\">in the past<\/a>, but overall, they\u2019re still an effective method of protecting people\u2019s privacy.<\/p>\n<p class=\"paywall\">Your voice is increasingly being used as a way to verify your identity. For example, a growing number of banks and other companies are analyzing your voiceprints, with your permission, to replace your password. There\u2019s also the potential for voice analysis to detect illness before other signs are obvious. But the technology to clone or fake someone\u2019s voice is advancing quickly.<\/p>\n<p class=\"paywall\">If you have a few minutes of someone\u2019s voice recorded, or in some instances a few seconds, it\u2019s possible to recreate that voice using machine learning\u2014<a href=\"https:\/\/www.wired.co.uk\/article\/simpsons-deepfake-voice-actors-ai\"><em>The Simpsons\u2019<\/em> voice actors could be replaced by deep fake voice clones<\/a>, for instance. And commercial tools for recreating voices are <a data-offer-url=\"https:\/\/fakeyou.com\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/fakeyou.com\/&quot;}\" href=\"https:\/\/fakeyou.com\/\" rel=\"nofollow noopener\" target=\"_blank\">readily available online<\/a>. \u201cThere\u2019s definitely more work in speaker identification and producing speech to text and text to speech than there is in protecting people from any of those technologies,\u201d Turner says.<\/p>\n<p class=\"paywall\">Many of the voice anonymization techniques being developed at the moment are still a long way from being used in the real world. When they are ready to be used it\u2019s likely that companies will have to implement tools themselves, to protect their customers&#x27; privacy\u2014there\u2019s currently little individuals can do to protect their own voice. Avoiding calls with call centers or companies that use voice analysis, and not using voice assistants, could limit how much your voice is recorded and reduce possible attack opportunities.<\/p>\n<p class=\"paywall\">But the biggest protections may come from legal cases and protections. Europe\u2019s <a href=\"https:\/\/www.wired.com\/story\/gdpr-2022\/\">GDPR<\/a> covers biometric data, including people\u2019s voices, in its privacy protections. Guidelines <a data-offer-url=\"https:\/\/edpb.europa.eu\/system\/files\/2021-07\/edpb_guidelines_202102_on_vva_v2.0_adopted_en.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/edpb.europa.eu\/system\/files\/2021-07\/edpb_guidelines_202102_on_vva_v2.0_adopted_en.pdf&quot;}\" href=\"https:\/\/edpb.europa.eu\/system\/files\/2021-07\/edpb_guidelines_202102_on_vva_v2.0_adopted_en.pdf\" rel=\"nofollow noopener\" target=\"_blank\">say<\/a> people should be told how their data is being used and provide consent if they\u2019re being identified, and that some restrictions should be placed on personalization. Meanwhile, in the US, courts in Illinois\u2014 home to some of the strongest biometric laws in the country\u2014are increasingly inspecting cases involving people\u2019s voice data. McDonald\u2019s, Amazon, and Google are all <a data-offer-url=\"https:\/\/news.bloomberglaw.com\/business-and-practice\/voiceprints-roil-companies-as-biometrics-litigation-skyrockets\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.bloomberglaw.com\/business-and-practice\/voiceprints-roil-companies-as-biometrics-litigation-skyrockets&quot;}\" href=\"https:\/\/news.bloomberglaw.com\/business-and-practice\/voiceprints-roil-companies-as-biometrics-litigation-skyrockets\" rel=\"nofollow noopener\" target=\"_blank\">facing judicial scrutiny<\/a> over how they use people\u2019s voice data. The decisions in these cases could lay down new rules for the protection of people\u2019s voices.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/voice-recognition-privacy-speech-changer\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62969e5ac54d2f0c8603ffab\/master\/pass\/security-voice-ai.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Wed, 01 Jun 2022 11:00:00 +0000<\/strong><\/p>\n<p>Voice recognition\u2014and data collection\u2014have boomed in recent years. Researchers are figuring out how to protect your privacy.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21382],"class_list":["post-19220","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-privacy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19220"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19220\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19220"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}