{"id":13575,"date":"2018-10-12T19:17:01","date_gmt":"2018-10-13T03:17:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/12\/news-7342\/"},"modified":"2018-10-12T19:17:01","modified_gmt":"2018-10-13T03:17:01","slug":"news-7342","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/12\/news-7342\/","title":{"rendered":"Supply Chain Security 101: An Expert&#8217;s View"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Sat, 13 Oct 2018 01:03:12 +0000<\/strong><\/p>\n<p>Earlier this month I spoke at a <a href=\"https:\/\/symposium.greycastlesecurity.com\/2018\/\" target=\"_blank\" rel=\"noopener\">cybersecurity conference in Albany, N.Y.<\/a> alongside <strong>Tony Sager<\/strong>, senior vice president and chief evangelist at the <a href=\"https:\/\/www.cisecurity.org\/\" target=\"_blank\" rel=\"noopener\">Center for Internet Security<\/a> and a former bug hunter at the <strong>U.S. National Security Agency<\/strong>. We talked at length about many issues, including supply chain security, and I asked Sager whether he&#8217;d heard anything about rumors that <strong>Supermicro<\/strong> &#8212; a high tech firm in San Jose, Calif. &#8212; had allegedly inserted hardware backdoors in technology sold to a number of American companies.<\/p>\n<div id=\"attachment_45392\" style=\"width: 271px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-45392\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/10\/tonysager.png\" alt=\"\" width=\"261\" height=\"281\" \/><\/p>\n<p class=\"wp-caption-text\">Tony Sager,\u00a0senior vice president and chief evangelist at the <strong>Center for Internet Security.<\/strong><\/p>\n<\/div>\n<p>The event Sager and I spoke at was prior to the publication of <em>Bloomberg Businessweek<\/em>&#8216;s <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2018-10-04\/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies?srnd=businessweek-v2\" target=\"_blank\" rel=\"noopener\">controversial story<\/a> alleging that Supermicro had duped almost 30 companies into buying backdoored hardware. Sager said he hadn&#8217;t heard anything about Supermicro specifically, but we chatted at length about the <a href=\"https:\/\/krebsonsecurity.com\/2018\/10\/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it\/\" target=\"_blank\" rel=\"noopener\">challenges of policing the technology supply chain<\/a>.<\/p>\n<p>Below are some excerpts from our conversation. I learned quite bit, and I hope you will, too.<\/p>\n<p><strong>Brian Krebs (BK):<\/strong> Do you think Uncle Sam spends enough time focusing on the supply chain security problem? It seems like a pretty big threat, but also one that is really hard to counter.<\/p>\n<p class=\"p1\"><span class=\"s1\"><b>Tony Sager (TS):<\/b> The federal government has been worrying about this kind of problem for decades. In the 70s and 80s, the government was more dominant in the technology industry and didn&#8217;t have this massive internationalization of the technology supply chain.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">But even then there were people who saw where this was all going, and there were some pretty big government programs to look into it.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> Right, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Trusted_Foundry_Program\"><span class=\"s2\">Trusted Foundry<\/span><\/a> program I guess is a good example.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> Exactly. That was an attempt to help support a U.S.-based technology industry so that we had an indigenous place to work with, and where we have only cleared people and total control over the processes and parts.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b>\u00a0Why do you think more companies aren&#8217;t insisting on producing stuff through code and hardware foundries here in the U.S.?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> Like a lot of things in security, the economics always win. And eventually the cost differential for offshoring parts and labor overwhelmed attempts at managing that challenge.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> Right, and this is how they approach things at <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sandia_National_Laboratories\"><span class=\"s2\">Sandia National Laboratories<\/span><\/a> [one of three national nuclear security research and development laboratories]. One of the things they&#8217;ve looked at is this whole business of whether someone might sneak something into the design of a nuclear weapon.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The basic design principle has been to assume that one person in the process may have been subverted somehow, and the whole design philosophy is built around making sure that no one person gets to sign off on what goes into a particular process, and that there is never unobserved control over any one aspect of the system. So, there are a lot of technical and procedural controls there.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">But the bottom line is that doing this is really much harder [for non-nuclear electronic components] because of all the offshoring now of electronic parts, as well as the software that runs on top of that hardware.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> So is the government basically only interested in supply chain security so long as it affects stuff they want to buy and use?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> The government still has regular meetings on supply chain risk management, but there are no easy answers to this problem. The technical ability to detect something wrong has been outpaced by the ability to do something about it.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> Wait&#8230;what?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b>\u00a0Suppose a nation state dominates a piece of technology and in theory could plant something inside of it. The attacker in this case has a risk model, too. Yes, he could put something in the circuitry or design, but his risk of exposure also goes up.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Could I as an attacker control components that go into certain designs or products? Sure, but it&#8217;s often not very clear what the target is for that product, or how you will guarantee it gets used by your target. And there are still a limited set of bad guys who can pull that stuff off. In the past, it&#8217;s been much more lucrative for the attacker to attack the supply chain on the distribution side, to go after targeted machines in targeted markets to lessen the exposure of this activity.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> So targeting your attack becomes problematic if you&#8217;re not really limiting the scope of targets that get hit with compromised hardware.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> Yes, you can put something into everything, but all of a sudden you have this massive big data collection problem on the back end where you as the attacker have created a different kind of analysis problem. Of course, some nations have more capability than others to sift through huge amounts of data they&#8217;re collecting.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b>\u00a0Can you talk about some of the things the government has typically done to figure out whether a given technology supplier might be trying to slip in a few compromised devices among an order of many?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> There&#8217;s this concept of the &#8220;blind buy,&#8221; where if you think the threat vector is someone gets into my supply chain and subverts the security of individual machines or groups of machines, the government figures out a way to purchase specific systems so that no one can target them. In other words, the seller doesn&#8217;t know it&#8217;s the government who&#8217;s buying it. This is a pretty standard technique to get past this, but it&#8217;s an ongoing cat and mouse game to be sure.<\/span><span id=\"more-45356\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> I know you said before this interview that you weren&#8217;t prepared to comment on the specific claims in the recent Bloomberg article, but it does seem that supply chain attacks targeting cloud providers could be very attractive for an attacker. Can you talk about how the big cloud providers could mitigate the threat of incorporating factory-compromised hardware into their operations?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> It&#8217;s certainly a natural place to attack, but it&#8217;s also a complicated place to attack &#8212; particularly the very nature of the cloud, which is many tenants on one machine. If you&#8217;re attacking a target with on-premise technology, that&#8217;s pretty simple. But the purpose of the cloud is to abstract machines and make more efficient use of the same resources, so that there could be many users on a given machine. So how do you target that in a supply chain attack?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> Is there anything about the way these cloud-based companies operate&#8230;.maybe just sheer scale&#8230;that makes them perhaps uniquely more resilient to supply chain attacks vis-a-vis companies in other industries?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> That&#8217;s a great question. The counter positive trend is that in order to get the kind of speed and scale that the Googles and Amazons and Microsofts of the world want and need, these companies are far less inclined now to just take off-the-shelf hardware and they&#8217;re actually now more inclined to build their own.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> Can you give some examples?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> There&#8217;s a fair amount of discussion among these cloud providers about commonalities &#8212; what parts of design could they cooperate on so there&#8217;s a marketplace for all of them to draw upon. And so we&#8217;re starting to see a real shift from off-the-shelf components to things that the service provider is either designing or pretty closely involved in the design, and so they can also build in security controls for that hardware. Now, if you&#8217;re counting on people to exactly implement designs, you have a different problem. But these are really complex technologies, so it&#8217;s non-trivial to insert backdoors. It gets harder and harder to hide those kinds of things.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>BK:<\/b> That&#8217;s interesting, given how much each of us have tied up in various cloud platforms. Are there other examples of how the cloud providers can make it harder for attackers who might seek to subvert their services through supply chain shenanigans?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>TS:<\/b> One factor is they&#8217;re rolling this technology out fairly regularly, and on top of that the shelf life of technology for these cloud providers is now a very small number of years. They all want faster, more efficient, powerful hardware, and a dynamic environment is much harder to attack. This actually turns out to be a very expensive problem for the attacker because it might have taken them a year to get that foothold, but in a lot of cases the short shelf life of this technology [with the cloud providers] is really raising the costs for the attackers.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">When I looked at what Amazon and Google and Microsoft are pushing for it&#8217;s really a lot of horsepower going into the architecture and designs that support that service model, including the building in of more and more security right up front. Yes, they&#8217;re still making lots of use of non-U.S. made parts, but they&#8217;re really aware of that when they do. That doesn&#8217;t mean these kinds of supply chain attacks are impossible to pull off, but by the same token they don&#8217;t get easier with time.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> It seems to me that the majority of the government\u2019s efforts to help secure the tech supply chain come in the form of looking for counterfeit products that might somehow wind up in tanks and ships and planes and cause problems there \u2014 as opposed to using that microscope to look at commercial technology. Do you think that\u2019s accurate?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> I think that&#8217;s a fair characterization. It\u2019s a logistical issue. This problem of counterfeits is a related problem. Transparency is one general design philosophy. Another is accountability and traceability back to a source. There\u2019s this buzzphrase that if you can&#8217;t build in security then build in accountability. Basically the notion there was you often can&#8217;t build in the best or perfect security, but if you can build in accountability and traceability, that&#8217;s a pretty powerful deterrent as well as a necessary aid.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> For example\u2026.?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> Well, there\u2019s this emphasis on high quality and unchangeable logging. If you can build strong accountability that if something goes wrong I can trace it back to who caused that, I can trace it back far enough to make the problem more technically difficult for the attacker. Once I know I can trace back the construction of a computer board to a certain place, you\u2019ve built a different kind of security challenge for the attacker. So the notion there is while you may not be able to prevent every attack, this causes the attacker different kinds of difficulties, which is good news for the defense. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> So is supply chain security more of a physical security or cybersecurity problem?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> We like to think of this as we\u2019re fighting in cyber all the time, but often that\u2019s not true. If you can force attackers to subvert your supply chain, they you first off take away the mid-level criminal elements and you force the attackers to do things that are outside the cyber domain, such as set up front companies, bribe humans, etc. And in those domains \u2014 particularly the human dimension \u2014 we have other mechanisms that are detectors of activity there. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> What role does network monitoring play here? I&#8217;m hearing a lot right now from tech experts who say organizations should be able to detect supply chain compromises because at some point they should be able to see truckloads of data leaving their networks if they&#8217;re doing network monitoring right. What do you think about the role of effective network monitoring in fighting potential supply chain attacks.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:\u00a0<\/strong> I&#8217;m not so optimistic about that. It&#8217;s too easy to hide. Monitoring is about finding anomalies, either in the volume or type of traffic you&#8217;d expect to see. It&#8217;s a hard problem category. For the US government, with perimeter monitoring there&#8217;s always a trade off in the ability to monitor traffic and the natural movement of the entire Internet towards encryption by default. So a lot of things we don&#8217;t get to touch because of tunneling and encryption, and the Department of Defense in particular has really struggled with this. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Now obviously what you can do is man-in-the-middle traffic with proxies and inspect everything there, and the perimeter of the network is ideally where you\u2019d like to do that, but the speed and volume of the traffic is often just too great. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> Isn\u2019t the government already doing this with the \u201ctrusted internet connections\u201d or <a href=\"https:\/\/www.dhs.gov\/einstein\" target=\"_blank\" rel=\"noopener\">Einstein program<\/a>, where they consolidate all this traffic at the gateways and try to inspect what\u2019s going in and out? <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> Yes, so they\u2019re creating a highest volume, highest speed problem. To monitor that and to not interrupt traffic you have to have bleeding edge technology to do that, and then handle a ton of it which is already encrypted. If you\u2019re going to try to proxy that, break it out, do the inspection and then re-encrypt the data, a lot of times that\u2019s hard to keep up with technically and speed-wise. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> Does that mean it\u2019s a waste of time to do this monitoring at the perimeter? <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> No. The initial foothold by the attacker could have easily been via a legitimate tunnel and someone took over an account inside the enterprise. The real meaning of a particular stream of packets coming through the perimeter you may not know until that thing gets through and executes. So you can\u2019t solve every problem at the perimeter. Some things only because obvious and make sense to catch them when they open up at the desktop. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> Do you see any parallels between the challenges of securing the supply chain and the challenges of getting companies to secure <strong>Internet of Things<\/strong> (IoT) devices so that they don\u2019t continue to become a national security threat for just about any critical infrastructure, such as with DDoS attacks like we\u2019ve seen over the past few years? <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> Absolutely, and again the economics of security are so compelling. With IoT we have the cheapest possible parts, devices with a relatively short life span and it\u2019s interesting to hear people talking about regulation around IoT. But a lot of the discussion I\u2019ve heard recently does not revolve around top-down solutions but more like how do we learn from places like the <strong>Food and Drug Administration<\/strong> about certification of medical devices. In other words, are there known characteristics that we would like to see these devices put through before they become in some generic sense safe. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> How much of addressing the IoT and supply chain problems is about being able to look at the code that powers the hardware and finding the vulnerabilities there? Where does accountability come in?<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> I used to look at other peoples\u2019 software for a living and find zero-day bugs. What I realized was that our ability to find things as human beings with limited technology was never going to solve the problem. The deterrent effect that people believed someone was inspecting their software usually got more positive results than the actual looking. If they were going to make a mistake &#8211; deliberately or otherwise \u2014 they would have to work hard at it and if there was some method of transparency, us finding the one or two and making a big deal of it when we did was often enough of a deterrent. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> Sounds like an approach that would work well to help us feel better about the security and code inside of these election machines that have become the subject of so much intense scrutiny of late.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> We\u2019re definitely going through this now in thinking about the election devices. We\u2019re kind of going through this classic argument where hackers are carrying the noble flag of truth and vendors are hunkering down on liability. So some of the vendors seem willing to do something different, but at the same time they&#8217;re kind of trapped now by the good intentions of open vulnerability community. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The question is, how do we bring some level of transparency to the process, but probably short of vendors exposing their trade secrets and the code to the world? What is it that they can demonstrate in terms of cost effectiveness of development practices to scrub out some of the problems before they get out there. This is important, because elections need one outcome: Public confidence in the outcome. And of course, one way to do that is through greater transparency.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>BK:<\/strong> What, if anything, are the takeaways for the average user here? With the proliferation of IoT devices in consumer homes, is there any hope that we&#8217;ll see more tools that help people gain more control over how these systems are behaving on the local network? <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>TS:<\/strong> Most of [the supply chain problem] is outside the individual&#8217;s ability to do anything about, and beyond ability of small businesses to grapple with this. It&#8217;s in fact outside of the autonomy of the average company to figure it out. We do need more national focus on the problem. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">It&#8217;s n<\/span><span class=\"s1\">ow almost impossible to for consumers to buy electronics stuff that isn&#8217;t Internet-connected. The chipsets are so cheap and the ability for every device to have its own Wi-Fi chip built in means that [manufacturers] are adding them whether it makes sense to or not.\u00a0I think we&#8217;ll see more security coming into the marketplace to manage devices. So for example you might define rules that say appliances can talk to the manufacturer only.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We&#8217;re going to see more easy-to-use tools available to consumers to help manage all these devices. We&#8217;re starting to see the fight for dominance in this space already at the home gateway and network management level. As these devices get more numerous and complicated, there will be more consumer oriented ways to manage them. Some of the broadband providers already offer services that will tell what devices are operating in your home and let users control when those various devices are allowed to talk to the Internet.<\/span><\/p>\n<hr \/>\n<p>Since Bloomberg&#8217;s story broke, The <strong>U.S. Department of Homeland Security<\/strong> and the <strong>National Cyber Security Centre<\/strong>, a unit of Britain\u2019s eavesdropping agency, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Government_Communications_Headquarters\" target=\"_blank\" rel=\"noopener\">GCHQ<\/a>, <a href=\"https:\/\/www.reuters.com\/article\/us-china-cyber-britain\/uk-cyber-security-agency-backs-apple-amazon-china-hack-denials-idUSKCN1MF1DN\" target=\"_blank\" rel=\"noopener\">both came out with statements<\/a> saying they had no reason to doubt <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-10-04\/the-big-hack-amazon-apple-supermicro-and-beijing-respond\" target=\"_blank\" rel=\"noopener\">vehement denials by <strong>Amazon<\/strong> and <strong>Apple<\/strong><\/a> that they were affected by any incidents involving Supermicro&#8217;s supply chain security. Apple also penned a <a href=\"https:\/\/twitter.com\/reneritchie\/status\/1049329985968922625\" target=\"_blank\" rel=\"noopener\">strongly-worded letter<\/a> to lawmakers denying claims in the story.<\/p>\n<p>Meanwhile, Bloomberg reporters <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-10-09\/new-evidence-of-hacked-supermicro-hardware-found-in-u-s-telecom\" target=\"_blank\" rel=\"noopener\">published a follow-up story<\/a> citing new, on-the-record evidence to back up claims made in their original story.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/10\/supply-chain-security-101-an-experts-view\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/10\/tonysager.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Sat, 13 Oct 2018 01:03:12 +0000<\/strong><\/p>\n<p>Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager, senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We\u00a0 talked at length about many issues, including supply chain security, and I asked Sager whether he&#8217;d heard anything about rumors that Supermicro &#8212; a high tech firm in San Jose, Calif. &#8212; had allegedly inserted hardware backdoors in technology sold to a number of American companies.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16740,19862,19863,19864,19865,6269,18417,17061,19866,19867],"class_list":["post-13575","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-a-little-sunshine","tag-blind-buy","tag-bloomberg-businessweek","tag-center-for-internet-security","tag-einstein-program","tag-internet-of-things","tag-supply-chain-security","tag-the-coming-storm","tag-tony-sager","tag-trusted-internet-connections"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13575"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13575\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}