{"id":1398,"date":"2013-05-10T14:01:29","date_gmt":"2013-05-10T18:01:29","guid":{"rendered":"http:\/\/lemasney.com\/consulting\/?p=1398"},"modified":"2020-07-11T15:48:18","modified_gmt":"2020-07-11T19:48:18","slug":"on-making-great-passwords","status":"publish","type":"post","link":"https:\/\/lemasney.com\/consulting\/2013\/05\/10\/on-making-great-passwords\/","title":{"rendered":"On making great passwords."},"content":{"rendered":"<p>&nbsp;<\/p>\n<h2>You may have heard how important it is to consider security while using technology.<\/h2>\n<div style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Scherbius-1928-patent.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"zemanta-img-inserted zemanta-img-configured\" title=\"Image from 1928 US patent 1,657,411 (Enigma ma...\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/300px-scherbius-1928-patent.png?resize=300%2C190&#038;ssl=1\" alt=\"Image from 1928 US patent 1,657,411 (Enigma ma...\" width=\"300\" height=\"190\" \/><\/a><p class=\"wp-caption-text\">Image from 1928 US patent 1,657,411 (Enigma machine) by Arthur Scherbius (died 1929). (Photo credit: Wikipedia)<\/p><\/div>\n<p>This is rather abstract. A more concrete example of technology security is to choose great passwords. If you choose a great password and keep it in your head and not on paper or in anyone else&#8217;s head, you immediately offer yourself more security against someone using your devices and services as though they were you. You might be tempted to write it down on a note in your office, or share the password with a trusted friend, but the minute you do that you immediately offer a chance for the password to get into the wrong hands, eyes, or ears. Also, if you believe that you are not important enough to be targeted for password theft, or that it&#8217;s about money or fun, you are overlooking the possibility that your account might be used to simply disguise the activities of the person who uses it, making it seem as though you did something illegal, immoral, or sinister instead of them.<\/p>\n<h2>Make your password hard to guess, hard to crack, and easy for you to remember.<\/h2>\n<div style=\"width: 310px\" class=\"wp-caption alignright\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"zemanta-img-inserted zemanta-img-configured\" title=\"English: This is a screenshot of windows passw...\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/300px-windows_password_unlocker2.jpg?resize=300%2C225&#038;ssl=1\" alt=\"English: This is a screenshot of windows passw...\" width=\"300\" height=\"225\" \/><p class=\"wp-caption-text\">English: This is a screenshot of windows password unlocker, which is a professional windows password reset tool (Photo credit: Wikipedia)<\/p><\/div>\n<p>For example, let&#8217;s look at creating a great password from a not so great one.<\/p>\n<p>&#8216;<strong>06011960<\/strong>&#8216; is a horrible password. It&#8217;s a birthday, and anyone who can find out your birthday (not as hard as you might think) can try to log in with it to your accounts.<\/p>\n<p>&#8216;<strong>jimmy<\/strong>&#8216; is also a very bad password, for a few reasons, namely I probably chose it because it is significant to me, and anyone who knows me might be able to guess it. Even if they don;t they might use what&#8217;s called &#8220;<a class=\"zem_slink\" title=\"Brute-force attack\" href=\"https:\/\/en.wikipedia.org\/wiki\/Brute-force_attack\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">brute force attacks<\/a>&#8221; with dictionaries of common words, names, and strings used for passwords to automatically get into my account. With simple passwords like this, they emphasize the ease of you remembering it, rather than the difficulty of bypassing it.<\/p>\n<p>&#8216;<strong>JimmY<\/strong>&#8216; is a better password, because I have introduced shift characters (capital letters), which extend the time that someone would need to brute force attack and discover the password. It&#8217;s still kind of short and common, though.<\/p>\n<p>&#8216;<strong>JimmY&amp;jAne<\/strong>&#8216; is better yet, because it is longer, uses shift characters, and uses a non-<a class=\"zem_slink\" title=\"Alphanumeric\" href=\"https:\/\/en.wikipedia.org\/wiki\/Alphanumeric\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">alphanumeric<\/a> character.<\/p>\n<p>If we take this to an extreme, we might choose &#8216;<strong>!32%tRuH&amp;k*9<\/strong>&#8216;, which would be incredibly hard to guess, and difficult to crack, but there&#8217;s a problem in that there is little chance that you will remember it.<\/p>\n<p>A good compromise, and a great password, is something like &#8216;<strong>The4WallsOfMyR00mAreFriends<\/strong>&#8216; which introduces some great features.<\/p>\n<div style=\"width: 250px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.flickr.com\/photos\/20172348@N00\/2334027222\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"zemanta-img-inserted zemanta-img-configured\" title=\"German \/ Deutsch Enigma Machine: World War II ...\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/2334027222_9b958e7d25_m.jpg?resize=240%2C180&#038;ssl=1\" alt=\"German \/ Deutsch Enigma Machine: World War II ...\" width=\"240\" height=\"180\" \/><\/a><p class=\"wp-caption-text\">German \/ Deutsch Enigma Machine: World War II Museum, New Orleans, Lousiana, USA (Photo credit: Bogdan Migulski)<\/p><\/div>\n<p>It&#8217;s both memorable and nonsensical. It&#8217;s long, which makes it harder to crack. It has alphanumeric and non-alphanumeric characters, making it harder to crack. It mentions a personal keyword (friends) for the site that I am using the password for (facebook), because I am choosing a different password for each site or service. This is a good thing for when someone guesses one of my passwords, they would not necessarily know my other passwords. It uses many shift characters. This password would be very hard for others to guess or crack, but very easy for you to remember. You might choose a favorite song lyric, quote, or statement as the basis for your password. If you are a <em>Rolling Stones<\/em> fan, perhaps &#8216;DidY0uGuessMyName?&#8217;<\/p>\n<h2>HTTP vs. HTTPS<\/h2>\n<p>One last point: If you are using public WiFi, such as at a Panera, you should be extra careful about logging into important sites (e.g. banking, email, social networks) unless the URL for the site begins with <a class=\"zem_slink\" title=\"HTTP Secure\" href=\"https:\/\/en.wikipedia.org\/wiki\/HTTP_Secure\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">https:\/\/<\/a> because otherwise someone could capture your password as it travels to the site over <a class=\"zem_slink\" title=\"Hypertext Transfer Protocol\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hypertext_Transfer_Protocol\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">http:\/\/<\/a> using what&#8217;s known as ethernet sniffing software. https:\/\/ is an encrypted protocol, and provides some (if imperfect) protection from password capture and other activity.<\/p>\n<p>If you want to know more about how you can stay protected while you are using technology, please contact me at <a href=\"mailto:lemasney@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">lemasney@gmail.com<\/a>. The first session with new clients is always free.<\/p>\n<h6 class=\"zemanta-related-title\" style=\"font-size: 1em;\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul zemanta-article-ul-image\" style=\"margin: 0; padding: 0; overflow: hidden;\">\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"https:\/\/m2teknikinformatika2010.wordpress.com\/2013\/04\/28\/cryptography-and-network-security-principles-and-practices\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/163881774_80_80.jpg?w=1170&#038;ssl=1\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 80px; padding: 5px 2px 0 2px;\" href=\"https:\/\/m2teknikinformatika2010.wordpress.com\/2013\/04\/28\/cryptography-and-network-security-principles-and-practices\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cryptography and Network Security Principles and Practices<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"https:\/\/www.roguelynn.com\/words\/explain-like-im-5-kerberos\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/156934027_80_80.jpg?w=1170&#038;ssl=1\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 80px; padding: 5px 2px 0 2px;\" href=\"https:\/\/www.roguelynn.com\/words\/explain-like-im-5-kerberos\/\" target=\"_blank\" rel=\"noopener noreferrer\">Explain like I&#8217;m 5: Kerberos<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"https:\/\/powersthatbeat.wordpress.com\/2013\/04\/02\/big-brother-in-the-wires-wiretapping-in-the-digital-age-american-civil-liberties-union\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/157020895_80_80.jpg?w=1170&#038;ssl=1\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 80px; padding: 5px 2px 0 2px;\" href=\"https:\/\/powersthatbeat.wordpress.com\/2013\/04\/02\/big-brother-in-the-wires-wiretapping-in-the-digital-age-american-civil-liberties-union\/\" target=\"_blank\" rel=\"noopener noreferrer\">Big Brother in the Wires: Wiretapping in the Digital Age | American Civil Liberties Union<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"https:\/\/io9.gizmodo.com\/how-the-u-s-cracked-japans-purple-encryption-machine-458385664\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/154387350_80_80.jpg?w=1170&#038;ssl=1\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 80px; padding: 5px 2px 0 2px;\" href=\"https:\/\/io9.gizmodo.com\/how-the-u-s-cracked-japans-purple-encryption-machine-458385664\" target=\"_blank\" rel=\"noopener noreferrer\">How the U.S. Cracked Japan&#8217;s &#8216;Purple Encryption Machine&#8217; at the Dawn of World War II<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; You may have heard how important it is to consider security while using technology. This is rather abstract. A more concrete example of technology security is to choose great passwords. If you choose a great password and keep it in your head and not on paper or in anyone else&#8217;s head, you immediately offer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1815,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,3653,23,5],"tags":[],"class_list":{"0":"post-1398","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-consulting","8":"category-insights","9":"category-professional-experience","10":"category-technology","11":"czr-hentry"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2013\/01\/300px-Stage1.gif?fit=300%2C378&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3h6y2-my","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":31,"url":"https:\/\/lemasney.com\/consulting\/2009\/04\/17\/john-lemasney-speaks-identity-theft-internet-security\/","url_meta":{"origin":1398,"position":0},"title":"John LeMasney speaks on Identity Theft and Internet Security","author":"lemsy","date":"2009-04-17","format":false,"excerpt":"John LeMasney speaks on Internet Security and Identity Theft","rel":"","context":"In &quot;classes and presentations&quot;","block_context":{"text":"classes and presentations","link":"https:\/\/lemasney.com\/consulting\/category\/portfolio\/classes-presentations\/"},"img":{"alt_text":"Jedediah Higgins House, Kingston, NJ, Interior, Rooms, details, construction, cc-by lemasney","src":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/09\/DSC_2084_1.jpg?fit=893%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/09\/DSC_2084_1.jpg?fit=893%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/09\/DSC_2084_1.jpg?fit=893%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/09\/DSC_2084_1.jpg?fit=893%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":41995,"url":"https:\/\/lemasney.com\/consulting\/2015\/04\/15\/tonight-at-ppl-google-drive\/","url_meta":{"origin":1398,"position":1},"title":"Tonight at PPL: Google Drive","author":"lemsy","date":"2015-04-15","format":false,"excerpt":"View image | gettyimages.com There's a free and open to the public class tonight (4\/15\/2015) at Princeton Public Library at 7 pm on Google Drive. I'm excited for the session because in many of the conversations that I have with clients about how they manage documents and archives, I usually\u2026","rel":"","context":"In &quot;affiliations&quot;","block_context":{"text":"affiliations","link":"https:\/\/lemasney.com\/consulting\/category\/cv\/professional-affiliations\/"},"img":{"alt_text":"cloud by lemasney","src":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2014\/07\/20100123.png?fit=500%2C500&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":72,"url":"https:\/\/lemasney.com\/consulting\/2012\/05\/19\/night-walk-in-ocnj\/","url_meta":{"origin":1398,"position":2},"title":"Night walk in OCNJ","author":"lemsy","date":"2012-05-19","format":false,"excerpt":"Tonight, Melissa and I took a walk on Asbury West Avenue from one end of Ocean City to 34th street, where we stopped at Wawa and had a 10 p.m. coffee. Love that place, great conversation, and well worth the walk. night walk in OCNJ (fitbit record)[\/caption]","rel":"","context":"In &quot;consulting&quot;","block_context":{"text":"consulting","link":"https:\/\/lemasney.com\/consulting\/category\/consulting\/"},"img":{"alt_text":"night walk in OCNJ (fitbit record)","src":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2012\/05\/night-walk-in-ocnj.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":695,"url":"https:\/\/lemasney.com\/consulting\/2009\/06\/15\/why-firefox\/","url_meta":{"origin":1398,"position":3},"title":"Why Firefox?","author":"lemsy","date":"2009-06-15","format":false,"excerpt":"Image via CrunchBase Event: Why Firefox? at Rossmoor Computer Club Date: Monday, June 15th at 9:30 am-11:00 am. Venue: Rossmoor Community Center, Monroe, NJ Abstract: Firefox is an open source web browser. I'll be discussing the benefits of its features such as personal bookmarks and history, security & privacy, customization,\u2026","rel":"","context":"In &quot;research interests&quot;","block_context":{"text":"research interests","link":"https:\/\/lemasney.com\/consulting\/category\/cv\/research-interests\/"},"img":{"alt_text":"Image representing Firefox as depicted in Crun...","src":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2009\/06\/13109v1-max-450x450.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":42071,"url":"https:\/\/lemasney.com\/consulting\/2015\/05\/12\/27-questions-on-being-a-technology-consultant-a-high-school-class-interviews-john-lemasney\/","url_meta":{"origin":1398,"position":4},"title":"27 questions on being a technology consultant: A high school class interviews John LeMasney","author":"lemsy","date":"2015-05-12","format":false,"excerpt":"27 questions asked by students in an interview on being a technology consultant with John LeMasney","rel":"","context":"In &quot;brand&quot;","block_context":{"text":"brand","link":"https:\/\/lemasney.com\/consulting\/category\/consulting\/brand\/"},"img":{"alt_text":"Losing Weight: John LeMasney after picture","src":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/03\/headshot2.jpg?fit=640%2C480&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/03\/headshot2.jpg?fit=640%2C480&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2015\/03\/headshot2.jpg?fit=640%2C480&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":43085,"url":"https:\/\/lemasney.com\/consulting\/2016\/02\/21\/choose-to-live\/","url_meta":{"origin":1398,"position":5},"title":"I&#8217;m changing the way that I choose to live cc-by lemasney","author":"lemsy","date":"2016-02-21","format":false,"excerpt":"I am changing the way that I choose to live, cc-by lemasney","rel":"","context":"In &quot;consulting&quot;","block_context":{"text":"consulting","link":"https:\/\/lemasney.com\/consulting\/category\/consulting\/"},"img":{"alt_text":"Geodesic model for organic home framing cc-by lemasney","src":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2016\/02\/IMG_20160221_130400.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2016\/02\/IMG_20160221_130400.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2016\/02\/IMG_20160221_130400.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2016\/02\/IMG_20160221_130400.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/lemasney.com\/consulting\/wp-content\/uploads\/2016\/02\/IMG_20160221_130400.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/posts\/1398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":16,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"predecessor-version":[{"id":46203,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/posts\/1398\/revisions\/46203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/media\/1815"}],"wp:attachment":[{"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lemasney.com\/consulting\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}