{"id":245907,"date":"2022-05-23T14:18:06","date_gmt":"2022-05-23T11:18:06","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-protect-your-account-from-hacking-the-most-relevant-security-measures"},"modified":"2023-05-25T16:42:59","modified_gmt":"2023-05-25T13:42:59","slug":"how-to-protect-your-account-from-hacking-the-most-relevant-security-measures","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-protect-your-account-from-hacking-the-most-relevant-security-measures","title":{"rendered":"How to protect your account from hacking \u2013 the most relevant security measures"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.1&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2019\/05\/Security-Key-NFC-by-Yubico-Laptop-1030&#215;687.jpg&#8221; parallax=&#8221;on&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-200px||||false|false&#8221; custom_padding=&#8221;50px||100px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;146px||0px|||&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;84px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; header_text_shadow_style=&#8221;preset1&#8243; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>How to protect your account from hacking \u2013 the most relevant security measures<\/b><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|5.1%||3%|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111111&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>How to protect your account from hacking \u2013 the most relevant security measures<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">Fraud and theft of data on the network is a fairly common problem for both ordinary users and corporations. Every day, attackers come up with more and more sophisticated schemes and ways to steal confidential information. What do they want to get by guessing your password?<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access to your network;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">numbers of bank cards, accounts;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">personal data in order to create copies of SIM-cards, EDS, and so on;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">contacts: telephone database, e-mail addresses, alternative sources of communication \u2013 instant messengers, social networks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">documents: passports, certificates, diplomas, certificates, etc.;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">access to corporate information, personal correspondence, secret information, etc.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Take care of<\/span> <span style=\"font-weight: 400;\">account security<\/span><span style=\"font-weight: 400;\"> it is necessary for every Internet user, regardless of the type of his activity, because each of us has hundreds of contacts in the database. Many people may think that <\/span><span style=\"font-weight: 400;\">protection against hackers<\/span><span style=\"font-weight: 400;\"> is an unnecessary reinsurance, and the tricks of scammers are easy to recognize. But as long as they do not personally encounter unauthorized withdrawals from the account or damage to the company&#8217;s reputation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">But it is better to prevent the situation than to deal with its consequences, right? And the first step is to try to be as informed as possible. Before knowing <\/span><span style=\"font-weight: 400;\">how to protect your account from hacking<\/span><span style=\"font-weight: 400;\">, let&#8217;s look at what you can be of interest to attackers, and what opportunities they have to harm you today.<\/span><\/p>\n<p><b>Types of scammers and areas in which they specialize:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>hackers<\/b> <span style=\"font-weight: 400;\">\u2013 hack not only accounts, but also websites, servers, using their vulnerabilities; they steal confidential data for the purpose of selling, publishing, or just out of curiosity \u2013 checking the reliability of the site;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>mobile scammers and telephone blackmailers<\/b> <span style=\"font-weight: 400;\">\u2013 they pretend to be bank employees, collection services or charitable organizations in order to take money from your accounts;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>specialists in the field of social engineering<\/b> <span style=\"font-weight: 400;\">\u2013 fake SIM-cards in order to carry out a variety of frauds, because with the help of SMS you can confirm a payment, access to some service, an application for participation in a tender, etc .;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Virus writers <\/b><span style=\"font-weight: 400;\">\u2013 create data-stealing spyware or ransomware;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>carders<\/b> <span style=\"font-weight: 400;\">\u2013 often use skimmers that are attached to an ATM to read bank card data, but they also steal data remotely, for example, using phishing;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>fraud in social networks<\/b><span style=\"font-weight: 400;\"> \u2014 <\/span><a href=\"https:\/\/ain.ua\/ru\/2017\/11\/21\/industriya-fejkovyx-profilej-na-facebook\/\"><span style=\"font-weight: 400;\">the creation of entire bot farms<\/span><\/a><span style=\"font-weight: 400;\"> in order to lure you into a trap, collecting your data on fake sites (phishing), selling non-existent goods, blackmail after stealing data in personal correspondence, and much more;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>document forgers <\/b><span style=\"font-weight: 400;\">\u2013 have a very wide scope for their &#8220;talents&#8221;: from creating fake passports for their frauds to real estate transactions, taking huge loans against your signature, creating front companies or shifting criminal responsibility onto you.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Fraudsters often unite in groups to exchange data, update knowledge and build more effective schemes. Therefore, to the average user, in order to ensure <\/span><span style=\"font-weight: 400;\">account security<\/span><span style=\"font-weight: 400;\">, you need to monitor information about modern protection methods from time to time.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">Below we offer you to get acquainted with the most relevant data for today.<\/span><\/p>\n<h2><b>Checklist for<\/b> <b>protection against hacker attacks<\/b> <b>and more<\/b><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proven \u2013<\/span> <b>passwords cannot be trusted<\/b><span style=\"font-weight: 400;\">. Moreover, simple. Set up two-factor authentication on all accounts <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/two-factor-authentication?fbclid=IwAR3L_JNn4_jq3-YX4Qy3kdcf1b0yWRnmJfiw2RE3UkvCFjCF-IXQczqiInE\"><span style=\"font-weight: 400;\">where this option is available<\/span><\/a><span style=\"font-weight: 400;\">. Pay special attention to public service websites, corporate accounts, and protecting personal mail.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t store passwords on devices<\/b><span style=\"font-weight: 400;\">with access to the Internet. Use password managers like 1password or offline media like a flash drive.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Set up alerts<\/b> <span style=\"font-weight: 400;\">by mail, instant messengers, push notifications or SMS about any transactions performed in online services: about reissuing a digital signature, confirming a payment, debiting funds from an account, changing passwords, requesting a credit history, etc. Instantly respond and<\/span> <b>cancel unauthorized requests<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t enter payment details on unverified sites<\/b><span style=\"font-weight: 400;\">, even if you see a very tempting discount offer that is running out quickly. It is better to check the site address again and buy the original guaranteed in the seller&#8217;s store.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t autosave passwords on devices or browsers. They can be decrypted. It is better <\/span><b>to trust encryption to devices with cryptographic protection<\/b><span style=\"font-weight: 400;\">, because their code is extremely resistant to hacking<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Check application permissions<\/b> <span style=\"font-weight: 400;\">and revoke access to data and contacts where it is not critical.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Protect your mobile login<\/b><span style=\"font-weight: 400;\"> with your fingerprint (if available), PIN, or pattern. Then, if you lose your smartphone, you will at least gain time and have time to block the cards.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install<\/span> <b>reliable antivirus software<\/b> <span style=\"font-weight: 400;\">on all devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t answer unknown calls<\/b><span style=\"font-weight: 400;\"> right away. Check with <\/span><span style=\"font-weight: 400;\">Google<\/span> <span style=\"font-weight: 400;\">if the number is listed as a scam.<\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Having<\/b> <span style=\"font-weight: 400;\">received a link<\/span> <b>from a friend<\/b> <span style=\"font-weight: 400;\">by mail or in a messenger,<\/span> <b>do not rush to open it.<\/b> <b>Do not rush to believe<\/b> <span style=\"font-weight: 400;\">the tragic blows of fate and<\/span> <b>pleas for help<\/b><span style=\"font-weight: 400;\">. Try to make sure that the information was actually sent by the person for whom he claims to be. Even better, give him a call. To protect <\/span><span style=\"font-weight: 400;\">your account from hacking<\/span><span style=\"font-weight: 400;\">, you need not be afraid to look paranoid in the eyes of others. Remember, <\/span><b>checking the information you receive will save you money, nerves, time and reputation<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<h2><b>What<\/b> <b>is the most reliable method of protection<\/b> <b>against hackers<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Today, the most effective way to<\/span> <span style=\"font-weight: 400;\">protect accounts from hacking<\/span><span style=\"font-weight: 400;\"> is to use stand-alone portable hardware devices \u2013 security keys. The most important thing is to choose them correctly. <\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The keys<\/span> <b>must be internationally certified<\/b> <span style=\"font-weight: 400;\">and support commonly accepted two-factor, multi-factor authentication protocols such as FIDO\/FIDO2.<\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Choose devices that are guaranteed to be<\/span> <b>compatible with your favorite services<\/b> <span style=\"font-weight: 400;\">(by list of supported devices or form factor).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Make sure your devices are reliable<\/b><span style=\"font-weight: 400;\">. How resistant are they to mechanical damage? Are the devices waterproof?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Decide what you will use the devices for.<\/b> <span style=\"font-weight: 400;\">You can either<\/span> <span style=\"font-weight: 400;\">protect your account from hacking<\/span> <span style=\"font-weight: 400;\">or purchase a package to protect the accounts of your company&#8217;s employees.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><b>YubiKey as<\/b> <b>an account protection method<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Above, we mentioned the<\/span> <span style=\"font-weight: 400;\">YubiKey<\/span> <span style=\"font-weight: 400;\">hardware<\/span> <span style=\"font-weight: 400;\">as<\/span> <span style=\"font-weight: 400;\">one of the best ways<\/span> <span style=\"font-weight: 400;\">to protect your account from being hacked.<\/span><span style=\"font-weight: 400;\">. Let&#8217;s see why this is so.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">YubiKey hardware<\/span> <span style=\"font-weight: 400;\">devices<\/span> <span style=\"font-weight: 400;\">manufactured in Sweden and the USA since 2007. They have cryptographic encryption, and reliably protect accounts from hacking and phishing. <\/span><b>New versions released annually<\/b><span style=\"font-weight: 400;\">, in accordance with the requirements of realities and user requests. There are devices suitable for<\/span><span style=\"font-weight: 400;\"> protection against hackers<\/span><span style=\"font-weight: 400;\"> for ordinary users, there are funds for government agencies, with enhanced protection. Latest of the versions <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-bio-fido-edition\"><span style=\"font-weight: 400;\">YubiKey Bio \u2014 FIDO<\/span><\/a><span style=\"font-weight: 400;\">, released at the end of last year, has a biometric scanner.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The reliability of devices has been proven by time<\/b><span style=\"font-weight: 400;\"> \u2014 they do not have retractable parts in the assembly that wear out and require replacement over time. There are also series with IP68 water resistance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Yubikey security<\/span> <span style=\"font-weight: 400;\">keys<\/span> <b>support international open authentication standards<\/b> <span style=\"font-weight: 400;\">and are not tied to a proprietary platform that can become outdated or more expensive.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">YubiKey<\/span> <span style=\"font-weight: 400;\">keys<\/span> <b>support hundreds of popular services<\/b><span style=\"font-weight: 400;\">. Among them there is a fairly common postal service <\/span><span style=\"font-weight: 400;\">Gmail<\/span><span style=\"font-weight: 400;\">,giving access to widely used<\/span> <span style=\"font-weight: 400;\">Google<\/span> <span style=\"font-weight: 400;\">services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Now you can buy<\/span> <b>YubiKey<\/b> <b>in<\/b> <b>Ukraine<\/b><span style=\"font-weight: 400;\">!<\/span><\/li>\n<\/ul>\n<p><b>For advice and assistance in choosing devices, call our managers!<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||-100px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;current&#8221; orderby=&#8221;rand&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to protect your account from hacking \u2013 the most relevant security measures How to protect your account from hacking \u2013 the most relevant security measures Fraud and theft of data on the network is a fairly common problem for both ordinary users and corporations. Every day, attackers come up with more and more sophisticated [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":246277,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"How to protect your account from hacking \u2013 security measures | YubiKey","_seopress_titles_desc":"Account protection from hacking. How to protect your account from a hacker \u2013 Topical tips from YubiKey. 20 working methods with protection guarantee!","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403,437],"tags":[],"class_list":["post-245907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-articles-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/245907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=245907"}],"version-history":[{"count":4,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/245907\/revisions"}],"predecessor-version":[{"id":246276,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/245907\/revisions\/246276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/246277"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=245907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=245907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=245907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}