{"id":3720,"date":"2016-11-30T14:35:08","date_gmt":"2016-11-30T13:35:08","guid":{"rendered":"https:\/\/www.polyas.de\/blog\/?p=3720"},"modified":"2016-11-30T14:35:08","modified_gmt":"2016-11-30T13:35:08","slug":"dangerous-router-ddos-attacks-internet-things","status":"publish","type":"post","link":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things","title":{"rendered":"Dangerous Router: DDoS-Attacks in the Age of Internet of Things"},"content":{"rendered":"<p>Many Telekom customers in Germany had to live without internet and telephone on the weekend. Hackers tried to install malware on 900,000 routers and integrate them into a botnet. Presumably to carry out DDoS-attacks. Fortunately, this did not work out thanks to a badly programmed software. However, DDoS-attacks with web-enabled devices have already caused great sensation\u00a0in 2016. Foremost the attack on the DNS-provider DYN in October this year.\u00a0<!--more--><\/p>\n<p>We wanted to know, how DDoS-attacks work, which aims the offenders have and\u00a0which precaution measures against the attacks are useful.<\/p>\n<h3>Procedure at DDos-attacks<\/h3>\n<div id=\"attachment_3726\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack.png\"><img aria-describedby=\"caption-attachment-3726\" data-attachment-id=\"3726\" data-permalink=\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things\/attachment\/ddos-attack\" data-orig-file=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack.png\" data-orig-size=\"640,433\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ddos-attack\" data-image-description=\"&lt;p&gt;Botnet under DDoS-attack&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;Botnet at DDoS-attack&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack-300x203.png\" data-large-file=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack.png\" loading=\"lazy\" class=\"size-medium wp-image-3726\" src=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack-300x203.png\" alt=\"Botnet at DDoS-attack\" width=\"300\" height=\"203\" srcset=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack-300x203.png 300w, https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack-500x338.png 500w, https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/Ddos-attack.png 640w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-3726\" class=\"wp-caption-text\">Botnet at DDoS-attack<\/p><\/div>\n<p>DDoS is the abbreviation for &#8220;Distributed Denial of Service&#8221;. Thus, when a DDoS-attack happens, it should suspend the availability of a computer or system.<\/p>\n<p>The victim&#8217;s system is bombarded with such a high number of service data which cannot be processed anymore. As a result, regular requests by users can only be answered slowly or not at all.<br \/>\nThe attack occurs with\u00a0many spread out computers, or rather devices which are infected with malware &#8211; a so-called botnet. That is how third parties can control the devices without the owner knowing of it.<\/p>\n<h3>Aims of the offenders<\/h3>\n<p>DDos-attacks are one of the most common cyber attacks today. Aim of the attacks are\u00a0foremost companies based in the industrial or financial sector. The company is supposed to be put under pressure. However, DDoS-attacks can also be a form of protest. Besides, now they are also used in cyber espionage.<\/p>\n<h3>Networked devices with an independent existence<\/h3>\n<p>The increasing meaning of the internet of things leads to smart devices being\u00a0abused for DDoS-attacks. Hence all web-enabled devices can become potential tools of cyber criminals. Since they are often delivered with standard passwords and companies rarely update, they are easily to manipulate. Many users do not change their password after they connected their device. This makes it especially easy for hackers to abuse the devices to create a botnet.<\/p>\n<h3>Producers are criticized<\/h3>\n<p>Not only user are criticized but also the device producers are responsible according to experts. Manufactures rarely publicize updates for their produced devices. The smart devices are so quickly developed that it is not worthwhile to bring updates for old models. Furthermore, producers have to communicate better with their customers. A certain number of users does not know that their device needs regular updates. In addition, producers could force customers to change their password with a software.<\/p>\n<h3>Attack on\u00a0Dyn: Twitter, Amazon and Netflix\u00a0were not available<\/h3>\n<p>In the morning of October 21 2016, many people on the east coast of the United States had to live for hours without Twitter, Netflix and Spotify. The internet service provider Dyn was the victim of a DDoS-attack. The attack used digital cameras which were infected with the malware Mirai. Although the DNS-provider Dyn protects itself against such attacks, it could not hold out\u00a0the surge. As a result, also websites of Dyn customers were not available. Besides, the created botnet by Mirai has capacity of one terabit and it therefore the biggest known net of this kind.<\/p>\n<h3>DDoS-attack against journalist Brian Krebs: using a sledgehammer to crack a nut<\/h3>\n<p>The website of journalist Brian Krebs was also recently affected by a massive DDoS-attack. During the attack, 620 gigabit per second were send to Krebs website and thereby shut it down. Usually a fraction of this data volume is sufficient to bring a website to standstill. Moreover, the attacks against Krebs and Dyn probably had the same origin. In the case of Krebs website, the attack could also be attributed to &#8220;Mirai&#8221;.<\/p>\n<h3>Protection against DDoS-attacks at POLYAS<\/h3>\n<p>It is complicated to protect yourself preventative against DDoS-attacks, but measures can be taken to moderate the consequences of an attack. We at POLYAS work with trustworthy service provider.<\/p>\n<p>Furthermore, our infrastructure is constructed in a way which does not allow a\u00a0<em>Single Point auf Failure.\u00a0<\/em>This means that our servers are at various locations and the incoming and outgoing data do not converge at one point. So if one server breaks down, a complete breakdown of the system can be avoided. By using this smart system, we can guarantee a high server availability and security of our customer&#8217;s data.<\/p>\n<p>In case of a DDoS-attack, we outsource the affected parts of our infrastructre to different cloud servers until the surge is over. In additon, we work with several server providern to have a permanent alternative solution at hand.<\/p>\n<p><a href=\"https:\/\/www.polyas.com\/security\">Get details about security in online voting with\u00a0POLYAS<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many Telekom customers in Germany had to live without internet and telephone on the weekend. Hackers tried to install malware on 900,000 routers and integrate them into a botnet. Presumably to carry out DDoS-attacks. Fortunately, this did not work out thanks to a badly programmed software. However, DDoS-attacks with web-enabled devices have already caused great [&hellip;]<\/p>\n","protected":false},"author":268,"featured_media":3697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ub_ctt_via":"","spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[47],"tags":[740,441,439,443],"featured_image_src":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/DDoS-Attacken.jpg","author_info":{"display_name":"Jaqueline Bargmann","author_link":"https:\/\/www.polyas.de\/blog\/author\/j-bargmann"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Dangerous Router: DDoS-Attacks in the Age of Internet of Things<\/title>\n<meta name=\"description\" content=\"To carry out DDoS-attacks, smart devices are more often used by hackers. Why are these devices especially attractive for cyber criminals?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dangerous Router: DDoS-Attacks in the Age of Internet of Things\" \/>\n<meta property=\"og:description\" content=\"To carry out DDoS-attacks, smart devices are more often used by hackers. Why are these devices especially attractive for cyber criminals?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-30T13:35:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/DDoS-Attacken.jpg?fit=860%2C340&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jaqueline Bargmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jaqueline Bargmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things\",\"url\":\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things\",\"name\":\"The Dangerous Router: DDoS-Attacks in the Age of Internet of Things\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\"},\"datePublished\":\"2016-11-30T13:35:08+00:00\",\"dateModified\":\"2016-11-30T13:35:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4\"},\"description\":\"To carry out DDoS-attacks, smart devices are more often used by hackers. Why are these devices especially attractive for cyber criminals?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/blog\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dangerous Router: DDoS-Attacks in the Age of Internet of Things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\",\"url\":\"https:\/\/www.polyas.de\/blog\/\",\"name\":\"POLYAS\",\"description\":\"the blog for secure online voting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4\",\"name\":\"Jaqueline Bargmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g\",\"caption\":\"Jaqueline Bargmann\"},\"sameAs\":[\"http:\/\/www.polyas.de\"],\"url\":\"https:\/\/www.polyas.de\/blog\/author\/j-bargmann\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dangerous Router: DDoS-Attacks in the Age of Internet of Things","description":"To carry out DDoS-attacks, smart devices are more often used by hackers. Why are these devices especially attractive for cyber criminals?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things","og_locale":"de_DE","og_type":"article","og_title":"The Dangerous Router: DDoS-Attacks in the Age of Internet of Things","og_description":"To carry out DDoS-attacks, smart devices are more often used by hackers. Why are these devices especially attractive for cyber criminals?","og_url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things","og_site_name":"POLYAS","article_published_time":"2016-11-30T13:35:08+00:00","og_image":[{"width":860,"height":340,"url":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/DDoS-Attacken.jpg?fit=860%2C340&ssl=1","type":"image\/jpeg"}],"author":"Jaqueline Bargmann","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Jaqueline Bargmann","Gesch\u00e4tzte Lesezeit":"4 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things","url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things","name":"The Dangerous Router: DDoS-Attacks in the Age of Internet of Things","isPartOf":{"@id":"https:\/\/www.polyas.de\/blog\/#website"},"datePublished":"2016-11-30T13:35:08+00:00","dateModified":"2016-11-30T13:35:08+00:00","author":{"@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4"},"description":"To carry out DDoS-attacks, smart devices are more often used by hackers. Why are these devices especially attractive for cyber criminals?","breadcrumb":{"@id":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/blog\/de"},{"@type":"ListItem","position":2,"name":"Dangerous Router: DDoS-Attacks in the Age of Internet of Things"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/blog\/#website","url":"https:\/\/www.polyas.de\/blog\/","name":"POLYAS","description":"the blog for secure online voting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4","name":"Jaqueline Bargmann","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g","caption":"Jaqueline Bargmann"},"sameAs":["http:\/\/www.polyas.de"],"url":"https:\/\/www.polyas.de\/blog\/author\/j-bargmann"}]}},"jetpack_featured_media_url":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/DDoS-Attacken.jpg","jetpack_publicize_connections":[],"jetpack_shortlink":"https:\/\/wp.me\/p72Pnr-Y0","jetpack-related-posts":[{"id":4778,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1","url_meta":{"origin":3720,"position":0},"title":"Cyber Security Definitions: Part One &#8211; the Basics","date":"12\/04\/2017","format":false,"excerpt":"Cyber security\u00a0is becoming more and more important in the globalized world. Since everything is connected, IT security should, and often is, a central focus for companies, organizations and private individuals. The internet can be intimidating and even sometimes dangerous. There are a variety of threats which should be clarified\u00a0in this,\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"Cyber Security","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/04\/DDoS-Attacken.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5268,"url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/alleged-russian-interference-how-did-they-do-it","url_meta":{"origin":3720,"position":1},"title":"Alleged Russian Interference &#8211; How did they do it and did it work?","date":"29\/06\/2017","format":false,"excerpt":"Meddling in foreign elections is a major topic as investigations continue into potential Russian interference in the 2016 US election and collusion with the Trump campaign. In this edition of our blog series on foreign election interference, we look at the allegations made against Russia. In December 2016, outgoing President\u2026","rel":"","context":"In &quot;Electoral research&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9198,"url":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","url_meta":{"origin":3720,"position":2},"title":"IT security for virtual voting &#8211; Expert interview","date":"16\/06\/2021","format":false,"excerpt":"At the latest with the occurrence of corona, the question of IT security in virtual voting has become even more important. We are repeatedly being asked how we protect the data of eligible voters and improve the security of voting. So we put the question to somebody who should know:\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"IT security","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/IT-Security.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5952,"url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/eu-data-protection-regulations","url_meta":{"origin":3720,"position":3},"title":"New EU-Data Protection Regulations &#8211; What you need to know for 2018","date":"15\/11\/2017","format":false,"excerpt":"In just half a year new data protection regulations are coming into effect. This new set of legislation will be enshrined into EU law on the 25th of May 2018. They are aimed at giving more control to Internet users over their personal data. Altering the data protection regulations will\u2026","rel":"","context":"In &quot;IT Security&quot;","img":{"alt_text":"New EU Data Protection Regulations to be implemented in May 2018","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/11\/Data-Protection-Regulations.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9412,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/the-digital-cdu-party-conference-interview-with-dr-stefan-hennewig","url_meta":{"origin":3720,"position":4},"title":"The digital CDU party conference \u2013 interview with Dr. Stefan Hennewig","date":"02\/03\/2021","format":false,"excerpt":"The CDU held a fully digital party conference for the first time in January 2021. The new CDU leader, Armin Laschet, was elected by 1,001 delegates using the POLYAS Live Voting. How the German party managed to prepare its party congress within 5 weeks and the situations it had to\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"digital DCU party conference","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/07\/digital-CDU-party-conference-2021.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9596,"url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/bsi-certificate","url_meta":{"origin":3720,"position":5},"title":"Fact check: BSI certificate for online elections","date":"03\/11\/2021","format":false,"excerpt":"On June 25, 2021, the POLYAS CORE 2.5.0 was once again certified according to the international Common Criteria standards. We took this opportunity to fact-check the frequently asked questions concerning the BSI certificate (BSI = German Federal Office for Information Security). What does the BSI certificate mean? What exactly is\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"BSI-Certificate-online-voting","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/08\/BSI-Certificate-online-voting.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/3720"}],"collection":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/users\/268"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/comments?post=3720"}],"version-history":[{"count":4,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/3720\/revisions"}],"predecessor-version":[{"id":3728,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/3720\/revisions\/3728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media\/3697"}],"wp:attachment":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media?parent=3720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/categories?post=3720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/tags?post=3720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}