{"id":9198,"date":"2021-06-16T15:10:30","date_gmt":"2021-06-16T13:10:30","guid":{"rendered":"https:\/\/www.polyas.de\/blog\/?p=9198"},"modified":"2021-06-16T15:10:31","modified_gmt":"2021-06-16T13:10:31","slug":"it-security-for-virtual-voting-expert-interview","status":"publish","type":"post","link":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","title":{"rendered":"IT security for virtual voting &#8211; Expert interview"},"content":{"rendered":"\n<p>At the latest with the occurrence of corona, the question of IT security in virtual voting has become even more important. We are repeatedly being asked how we protect the data of eligible voters and improve the security of voting. So we put the question to somebody who should know: Our colleague Vasko Hristov has been a member of the POLYAS data protection team for a long time and is an expert on IT security.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h3><strong>An association decides to carry out an online vote with POLYAS during corona. But what about the IT security, and what happens to the data during virtual voting? Where is the data stored with POLYAS?<\/strong><\/h3>\n\n\n\n<p><img data-attachment-id=\"9202\" data-permalink=\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview\/attachment\/polyas_vassil-hristov-300x300-1\" data-orig-file=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/POLYAS_Vassil-Hristov-300x300-1.png\" data-orig-size=\"300,300\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"POLYAS_Vassil-Hristov-300&#215;300-1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/POLYAS_Vassil-Hristov-300x300-1-300x300.png\" data-large-file=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/POLYAS_Vassil-Hristov-300x300-1.png\" loading=\"lazy\" width=\"300\" height=\"300\" class=\"wp-image-9202\" style=\"width: 150px;\" src=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/POLYAS_Vassil-Hristov-300x300-1.png\" alt=\"\" srcset=\"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/POLYAS_Vassil-Hristov-300x300-1.png 300w, https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/POLYAS_Vassil-Hristov-300x300-1-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>We take the protection of personal data very seriously. For this reason, the data of eligible voters are stored exclusively on the servers of certified data centers in the EU. In general, access authorizations are <strong>restricted according to a role concept.<\/strong><\/p>\n\n\n\n<h3>Who can see who or what voters voted for?<\/h3>\n\n\n\n<p>Nobody. When the ballot papers land in the ballot box, they contain absolutely no personal data. After successful authentication on the POLYAS voting system, the identity of eligible voters is anonymized using a token. The consequence of this is that, in a secret ballot, it is impossible to infer how individual voters voted. Election officers can only see who has voted.<\/p>\n\n\n\n<h3>Which data does POLYAS collect during online voting?<\/h3>\n\n\n\n<p>POLYAS basically works on the principle of data minimization. That means that you only collect data that is absolutely necessary for the correct implementation of your election or<span style=\"color: #3c987b;\"> <a style=\"color: #3c987b;\" href=\"https:\/\/www.polyas.com\/live-voting\">live voting<\/a>.<\/span> These are:<\/p>\n\n\n\n<ul><li>Identification data (e.g. voter ID and password)<\/li><li>An indication of who has cast a vote<\/li><li>The ballot paper, but without any means of inferring any further data<\/li><\/ul>\n\n\n\n<p>The ID data and the details of who voted are used exclusively to ensure one-time voting and to determine your voter turnout.<\/p>\n\n\n\n<p>At no time does even the election organizer have any way of discovering any individual\u2019s voting choice.<\/p>\n\n\n\n<p><span style=\"color: #3c987b;\"><a style=\"color: #3c987b;\" href=\"https:\/\/www.polyas.com\/data-protection\">Would you like to learn more about data protection at POLYAS?<\/a><\/span><\/p>\n\n\n\n<h3>How does POLYAS secure customer and voter data?<\/h3>\n\n\n\n<p>As soon as we receive plain text that contains sensitive or personal data, this is converted into an illegible character string (ciphertext) with the help of encryption.&nbsp;We also delete the data after the expiry of statutory deadlines in order to reduce the risk of unauthorized access.<\/p>\n\n\n\n<p>The voting system itself encrypts the ballot papers within the voters\u2019 browsers. The vote is securely transmitted to POLYAS via TLS connections and is saved to the ballot box in encrypted form. This end-to-end encryption is used in all POLYAS voting systems.<\/p>\n\n\n\n<p>Decryption after the virtual voting is performed using cryptographic shuffling methods, which makes external manipulation impossible.<\/p>\n\n\n\n<h3>Which security risks can be reduced with POLYAS?<\/h3>\n\n\n\n<p>One possible attack vector is the use of malicious software on the end device. If this risk is classified as high, POLYAS offers verification methods with alternative devices. For example, a vote cast per laptop can be cross-checked with a smartphone. Furthermore, we always recommend that you keep the operating software and browser version up-to-date so that known software vulnerabilities have been solved by the manufacturer.<\/p>\n\n\n\n<p><span style=\"color: #3c987b;\"><a style=\"color: #3c987b;\" href=\"https:\/\/www.polyas.com\/security\/bsi-security-goals\">Learn more about the security goals for virtual conferences and voting<\/a><\/span><\/p>\n\n\n\n<h3>What do election officers have to consider to ensure compliance with data protection and data security during the online voting?<\/h3>\n\n\n\n<p>When setting up the electoral roll in the POLYAS Online Voting Manager, you should ideally ensure that you only use data about the eligible voters that is really necessary for carrying out the election.<br>You should also ensure that the e-mail addresses to which election invitations are sent are up to date.<\/p>\n\n\n\n<p>And last but not least: Restrict access to your election configuration in the POLYAS Online Voting Manager to as few users as possible. We also advise you to use two-factor authentication for your account. You can find this function in your profile.<\/p>\n\n\n\n<h3>What is the minimum number of members for IT security to be worthwhile?<\/h3>\n\n\n\n<p>There is no lower limit for protecting sensitive data. This includes everybody, from small to large associations, universities, companies, municipalities, and even major political parties.&nbsp;<span style=\"color: #3c987b;\"><a style=\"color: #3c987b;\" href=\"https:\/\/www.polyas.com\/corona\">POLYAS ensures that everyone can hold an online general meeting even during corona.<\/a>&nbsp;<\/span>So there is no specific number of members that an association, company or party should have before carrying out an election with us.<\/p>\n\n\n\n<p><strong>Would you like to conduct online voting with POLYAS?&nbsp;<\/strong><span style=\"color: #3c987b;\"><a style=\"color: #3c987b;\" href=\"https:\/\/configure.polyas.com\/\">This way &gt;<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the latest with the occurrence of corona, the question of IT security in virtual voting has become even more important. We are repeatedly being asked how we protect the data of eligible voters and improve the security of voting. So we put the question to somebody who should know: Our colleague Vasko Hristov has [&hellip;]<\/p>\n","protected":false},"author":281,"featured_media":9201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ub_ctt_via":"","spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1,37,240,47],"tags":[439,2596,2597,79,897,1183],"featured_image_src":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/IT-Security.png","author_info":{"display_name":"Zoe Kraft","author_link":"https:\/\/www.polyas.de\/blog\/author\/z-kraft"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT security for virtual voting - Expert interview<\/title>\n<meta name=\"description\" content=\"IT security in virtual voting is very important. You can find out about data protection and secrecy of the ballot here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security for virtual voting - Expert interview\" \/>\n<meta property=\"og:description\" content=\"IT security in virtual voting is very important. You can find out about data protection and secrecy of the ballot here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-16T13:10:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-16T13:10:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/IT-Security.png?fit=860%2C200&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zoe Kraft\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Kraft\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview\",\"url\":\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview\",\"name\":\"IT security for virtual voting - Expert interview\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\"},\"datePublished\":\"2021-06-16T13:10:30+00:00\",\"dateModified\":\"2021-06-16T13:10:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/e60582cba3cde9e20a517ab2fbee72a8\"},\"description\":\"IT security in virtual voting is very important. You can find out about data protection and secrecy of the ballot here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/blog\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security for virtual voting &#8211; Expert interview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\",\"url\":\"https:\/\/www.polyas.de\/blog\/\",\"name\":\"POLYAS\",\"description\":\"the blog for secure online voting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/e60582cba3cde9e20a517ab2fbee72a8\",\"name\":\"Zoe Kraft\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/448f2e68fb06e6641a25b97310519515?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/448f2e68fb06e6641a25b97310519515?s=96&d=mm&r=g\",\"caption\":\"Zoe Kraft\"},\"sameAs\":[\"http:\/\/www.polyas.de\"],\"url\":\"https:\/\/www.polyas.de\/blog\/author\/z-kraft\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security for virtual voting - Expert interview","description":"IT security in virtual voting is very important. You can find out about data protection and secrecy of the ballot here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","og_locale":"de_DE","og_type":"article","og_title":"IT security for virtual voting - Expert interview","og_description":"IT security in virtual voting is very important. You can find out about data protection and secrecy of the ballot here.","og_url":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","og_site_name":"POLYAS","article_published_time":"2021-06-16T13:10:30+00:00","article_modified_time":"2021-06-16T13:10:31+00:00","og_image":[{"width":860,"height":200,"url":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/IT-Security.png?fit=860%2C200&ssl=1","type":"image\/png"}],"author":"Zoe Kraft","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Zoe Kraft","Gesch\u00e4tzte Lesezeit":"4 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","url":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","name":"IT security for virtual voting - Expert interview","isPartOf":{"@id":"https:\/\/www.polyas.de\/blog\/#website"},"datePublished":"2021-06-16T13:10:30+00:00","dateModified":"2021-06-16T13:10:31+00:00","author":{"@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/e60582cba3cde9e20a517ab2fbee72a8"},"description":"IT security in virtual voting is very important. You can find out about data protection and secrecy of the ballot here.","breadcrumb":{"@id":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/blog\/de"},{"@type":"ListItem","position":2,"name":"IT security for virtual voting &#8211; Expert interview"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/blog\/#website","url":"https:\/\/www.polyas.de\/blog\/","name":"POLYAS","description":"the blog for secure online voting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/e60582cba3cde9e20a517ab2fbee72a8","name":"Zoe Kraft","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/448f2e68fb06e6641a25b97310519515?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/448f2e68fb06e6641a25b97310519515?s=96&d=mm&r=g","caption":"Zoe Kraft"},"sameAs":["http:\/\/www.polyas.de"],"url":"https:\/\/www.polyas.de\/blog\/author\/z-kraft"}]}},"jetpack_featured_media_url":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/IT-Security.png","jetpack_publicize_connections":[],"jetpack_shortlink":"https:\/\/wp.me\/p72Pnr-2om","jetpack-related-posts":[{"id":9425,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/virtual-voting-despite-corona-potential-for-political-parties","url_meta":{"origin":9198,"position":0},"title":"Virtual voting despite Corona \u2013 potential for political parties","date":"10\/03\/2021","format":false,"excerpt":"2021 is a super election year. Elections are taking place in seven federal states and the general election is also taking place at the end of September. But how can the parties elect their candidates contact-free during a global pandemic? What are the opportunities and advantages of virtual voting for\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"virtual elections","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/07\/virtual-elections.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9596,"url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/bsi-certificate","url_meta":{"origin":9198,"position":1},"title":"Fact check: BSI certificate for online elections","date":"03\/11\/2021","format":false,"excerpt":"On June 25, 2021, the POLYAS CORE 2.5.0 was once again certified according to the international Common Criteria standards. We took this opportunity to fact-check the frequently asked questions concerning the BSI certificate (BSI = German Federal Office for Information Security). What does the BSI certificate mean? What exactly is\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"BSI-Certificate-online-voting","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/08\/BSI-Certificate-online-voting.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9063,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/free-test-voting","url_meta":{"origin":9198,"position":2},"title":"Free test voting: Get to know POLYAS Live Voting now","date":"01\/06\/2021","format":false,"excerpt":"POLYAS developed Live Voting so that you can conduct live voting that is legally compliant and barrier-free at any in-person event or at a virtual conference. You can also include voting for candidates in your live voting. After all, this is how the CDU held this year\u2019s party conference with\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"POLYAS Live Voting free test vote","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/05\/Kostenlose-Testabstimmung-Live-Voting.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":8531,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/digital-voting-in-politics","url_meta":{"origin":9198,"position":3},"title":"Digital voting in politics: POLYAS and the CDU party conference","date":"16\/02\/2021","format":false,"excerpt":"The CDU implemented the first fully digital national party conference and set new standards with digital voting. This was the first time that POLYAS Live Voting was used to help the 1,001 delegates conduct a secure vote from the comfort of their homes. Being able to enhance the CDU party\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"Digital Voting with POLYAS","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/02\/POLYAS-Digital-Voting-in-Politics.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9419,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/virtual-elections-in-parties-legal-basics","url_meta":{"origin":9198,"position":4},"title":"Virtual elections in parties: Legal basics","date":"07\/04\/2021","format":false,"excerpt":"Postal elections are experiencing a breakthrough. The pandemic means that growing numbers of people are in favor of postal voting. However, there is an alternative: Virtual elections such as digital membership polling in parties. In this blog post, we outline the legal situation with virtual elections and the opportunities that\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"Virtual elections in parties","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/07\/virtual-elections-in-parties.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":184,"url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/polyas-becomes-independent","url_meta":{"origin":9198,"position":5},"title":"POLYAS becomes independent","date":"12\/01\/2013","format":false,"excerpt":"The online voting system POLYAS has been independent since 2012 and branched off into POLYAS GmbH. POLYAS is an online voting system developed by Micromata, and is able to look back on a sixteen-year success story. It all began in 1996 with the trilingual youth election in Finland. The product\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2015\/04\/IMG_1626.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/9198"}],"collection":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/users\/281"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/comments?post=9198"}],"version-history":[{"count":6,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/9198\/revisions"}],"predecessor-version":[{"id":9241,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/9198\/revisions\/9241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media\/9201"}],"wp:attachment":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media?parent=9198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/categories?post=9198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/tags?post=9198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}