{"id":290,"date":"2016-11-13T05:57:29","date_gmt":"2016-11-12T22:57:29","guid":{"rendered":"http:\/\/www.seven-stones.biz\/blog\/?p=290"},"modified":"2016-12-05T04:56:09","modified_gmt":"2016-12-04T21:56:09","slug":"information-security-and-a-pale-blue-dot","status":"publish","type":"post","link":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/","title":{"rendered":"Information Security And A Pale Blue Dot"},"content":{"rendered":"<p>This article is about the place of ego and pride in information security.<\/p>\n<div id=\"attachment_292\" style=\"width: 275px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-292\" class=\"size-medium wp-image-292\" src=\"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-265x300.jpg\" alt=\"Earth From 6 Billion Miles - Thanks To Voyager 1 - Courtesy Of NASA\" width=\"265\" height=\"300\" srcset=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-265x300.jpg 265w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-768x868.jpg 768w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot.jpg 792w\" sizes=\"auto, (max-width: 265px) 100vw, 265px\" \/><\/a><p id=\"caption-attachment-292\" class=\"wp-caption-text\">Earth From 6 Billion Miles &#8211; Thanks To Voyager 1 &#8211; Courtesy Of NASA<\/p><\/div>\n<p>At the request of the late <a href=\"http:\/\/www.biography.com\/people\/carl-sagan-9469191\">Carl Sagan<\/a>, as the <a href=\"http:\/\/voyager.jpl.nasa.gov\/where\/\">Voyager 1 space probe<\/a> was leaving the solar system, at a record distance of approx 6 billion miles from Earth, <a href=\"https:\/\/www.nasa.gov\/\">NASA<\/a> instructed Voyager 1 to turn its camera back toward Earth.<\/p>\n<p>Yes &#8211; the circled pixel sized dot in the image on the right &#8211; this is Earth.<\/p>\n<p>But that dot &#8211; that is also a good representation of what <strong><em>you<\/em><\/strong> know about security, compared to the whole. Its even more than what <strong><em>I<\/em><\/strong> know about security, compared with\u00a0what there is to know.<\/p>\n<p>One thing i <em>have been<\/em>\u00a0right about &#8211; security, in theory at least, is a fantastic world to be a part of. I left IBM in the late 90s because i had heard about a world that covered all bases in the IT world. And i wasn&#8217;t wrong about this. Things did get ugly in the early 2000s &#8211; basically IT folk and engineers weren&#8217;t welcome any more. This is why we&#8217;re in the mess we&#8217;re in now.\u00a0But security, relative to other fields in IT, is still by far the best place to be, at least from where i&#8217;m standing.<\/p>\n<p>Security is such a vast field, and whichever turn you take, you find another world within a world, and within that world, the more you discover, the more you realise what there is left to discover. So in other words &#8211; the more you know about security &#8211; the more you know you don&#8217;t know.<\/p>\n<p>So given all this &#8211; does ego and pride have a place in this field? And how do you assess your knowledge compared to others? If you think about it in the context of the image above, if you show excessive ego, hold grudges, or get into regular arguments with others in the field &#8211; what this really demonstrates in itself is a lack of awareness of security and how vast it is. Given the vastness of the field, if you&#8217;re taking a mocking attitude (99% of the time this will not be communicated to the target of the mockery), i hope you can see now how ludicrous is that attitude? Its diabolical actually. If an Analyst comes from a different background, spent all their time in a certain part of the universe, why on earth (pardon the pun) would you be critical or judgmental of them if they don&#8217;t know your neighbourhood as well as you do?<\/p>\n<p>Many believe that excessive pride is mainly in the territory of hacking conference speakers, and its here where things get out of control, because of the attention one can get just from doing something as simple as a <a href=\"http:\/\/null-byte.wonderhowto.com\/how-to\/hack-wi-fi-creating-evil-twin-wireless-access-point-eavesdrop-data-0147919\/\">wifi &#8220;evil twin&#8221; attack<\/a>. But no, not based on what i&#8217;ve seen. There are security folk from all walks of the sector, and not just the self-proclaimed &#8216;evangelists&#8217;, whose level of self-importance goes as far as taking patronage over the whole sector.<\/p>\n<p>From the outside looking in, we in security are viewed in a fairly dim light in many cases. While working in a small consultancy here in the UK, I&#8217;ve heard it said while management was assessing a candidate&#8217;s suitability for a Consultant role: &#8220;is he weird enough?&#8221;. Security seniors in that firm regularly used to get in to impassioned exchanges with C-levels, because of the issue as I mentioned of taking patronage over security. Disagreements would spiral out of control.<\/p>\n<p>C-levels really just want to have the same understandable conversations, and see the same reporting, from security folk as they do from others. The whole security show does seem like a circus to outsiders, especially to folk\u00a0in other IT departments. And yet many in this field blame the board (&#8220;they&#8217;re clueless&#8221;) when security is pushed further away from the board, rather than looking at themselves.<\/p>\n<p>And as long\u00a0we do not have a trustworthy means of proving our ability or experience in this field, there will be lots of issues. Many try to compensate for the aforementioned with self-proclaimed titles, and other little nuances. Many develop a whole persona around trying to show the world how great they are.<\/p>\n<p>We&#8217;re renown for being different, and we are, but we can be more careful about how we show our uniqueness.\u00a0It should be enough to just keep a lower profile and do our jobs. If we have <em><strong>confidently<\/strong><\/em> given our advice, got it in black and white somewhere, that&#8217;s all we can do. If after that, others still don&#8217;t agree with us, leave it at that.<\/p>\n<p>Having an out-of-control ego also prevents us from being team players. We need to be open minded to the idea that others can learn from us and benefit us in return &#8211; we will always be stronger as a team rather than as an individual, and no one acting as a lone gun slinger ever helped an organisation to improve its stance in information risk management.<\/p>\n<p>Here&#8217;s what the Dalai Lama said about ego: &#8220;The foundation of the Buddha&#8217;s teachings lies in compassion, and the reason for practicing the teachings is to wipe out the persistence of ego, the number-one enemy of compassion.&#8221;<\/p>\n<p>Certainly &#8211; at least between ourselves, remember how vast a field is security, and don&#8217;t lose perspective.<\/p>\n<p>As i mentioned above: the more you know about security, the more you know you don&#8217;t know. So try not to demonstrate a lack of knowledge by attempting to demonstrate lots of knowledge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is about the place of ego and pride in information security. At the request of the late Carl Sagan, as the Voyager 1 space probe was leaving the solar system, at a record distance of approx 6 billion &hellip; <a href=\"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,1,112,111],"tags":[113,114,115,116],"class_list":["post-290","post","type-post","status-publish","format-standard","hentry","category-blog","category-general","category-security-people","category-security-philosophy","tag-information-security","tag-information-security-professionals","tag-people-and-security","tag-security-and-ego"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security And A Pale Blue Dot - Security Macromorphosis<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security And A Pale Blue Dot - Security Macromorphosis\" \/>\n<meta property=\"og:description\" content=\"This article is about the place of ego and pride in information security. At the request of the late Carl Sagan, as the Voyager 1 space probe was leaving the solar system, at a record distance of approx 6 billion &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Macromorphosis\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-12T22:57:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-12-04T21:56:09+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-265x300.jpg\" \/>\n<meta name=\"author\" content=\"itibble@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:site\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itibble@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/\"},\"author\":{\"name\":\"itibble@gmail.com\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"headline\":\"Information Security And A Pale Blue Dot\",\"datePublished\":\"2016-11-12T22:57:29+00:00\",\"dateModified\":\"2016-12-04T21:56:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/\"},\"wordCount\":961,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/Pale_Blue_Dot-265x300.jpg\",\"keywords\":[\"information security\",\"information security professionals\",\"people and security\",\"security and ego\"],\"articleSection\":[\"Blog\",\"General\",\"security people\",\"security philosophy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/\",\"name\":\"Information Security And A Pale Blue Dot - Security Macromorphosis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/Pale_Blue_Dot-265x300.jpg\",\"datePublished\":\"2016-11-12T22:57:29+00:00\",\"dateModified\":\"2016-12-04T21:56:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/Pale_Blue_Dot.jpg\",\"contentUrl\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/Pale_Blue_Dot.jpg\",\"width\":792,\"height\":895,\"caption\":\"Earth From 6 Billion Miles - Thanks To Voyager 1 - Courtesy Of NASA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/information-security-and-a-pale-blue-dot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security And A Pale Blue Dot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\",\"name\":\"Security Macromorphosis\",\"description\":\"Ian Tibble&#039;s Security Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\",\"name\":\"itibble@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"caption\":\"itibble@gmail.com\"},\"description\":\"Author of Security De-engineering, CTO at Seven Stones (Indonesia)\",\"sameAs\":[\"http:\\\/\\\/www.seven-stones.biz\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security And A Pale Blue Dot - Security Macromorphosis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/","og_locale":"en_US","og_type":"article","og_title":"Information Security And A Pale Blue Dot - Security Macromorphosis","og_description":"This article is about the place of ego and pride in information security. At the request of the late Carl Sagan, as the Voyager 1 space probe was leaving the solar system, at a record distance of approx 6 billion &hellip; Continue reading &rarr;","og_url":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/","og_site_name":"Security Macromorphosis","article_published_time":"2016-11-12T22:57:29+00:00","article_modified_time":"2016-12-04T21:56:09+00:00","og_image":[{"url":"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-265x300.jpg","type":"","width":"","height":""}],"author":"itibble@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@seven_stones","twitter_site":"@seven_stones","twitter_misc":{"Written by":"itibble@gmail.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#article","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/"},"author":{"name":"itibble@gmail.com","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"headline":"Information Security And A Pale Blue Dot","datePublished":"2016-11-12T22:57:29+00:00","dateModified":"2016-12-04T21:56:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/"},"wordCount":961,"commentCount":0,"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#primaryimage"},"thumbnailUrl":"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-265x300.jpg","keywords":["information security","information security professionals","people and security","security and ego"],"articleSection":["Blog","General","security people","security philosophy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/","url":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/","name":"Information Security And A Pale Blue Dot - Security Macromorphosis","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#primaryimage"},"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#primaryimage"},"thumbnailUrl":"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot-265x300.jpg","datePublished":"2016-11-12T22:57:29+00:00","dateModified":"2016-12-04T21:56:09+00:00","author":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"breadcrumb":{"@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#primaryimage","url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot.jpg","contentUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Pale_Blue_Dot.jpg","width":792,"height":895,"caption":"Earth From 6 Billion Miles - Thanks To Voyager 1 - Courtesy Of NASA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.seven-stones.biz\/blog\/information-security-and-a-pale-blue-dot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.seven-stones.biz\/blog\/"},{"@type":"ListItem","position":2,"name":"Information Security And A Pale Blue Dot"}]},{"@type":"WebSite","@id":"https:\/\/www.seven-stones.biz\/blog\/#website","url":"https:\/\/www.seven-stones.biz\/blog\/","name":"Security Macromorphosis","description":"Ian Tibble&#039;s Security Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seven-stones.biz\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28","name":"itibble@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","caption":"itibble@gmail.com"},"description":"Author of Security De-engineering, CTO at Seven Stones (Indonesia)","sameAs":["http:\/\/www.seven-stones.biz"]}]}},"_links":{"self":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":7,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/290\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}