{"id":1321,"date":"2020-07-28T10:27:15","date_gmt":"2020-07-28T10:27:15","guid":{"rendered":"https:\/\/cryptolinks.com\/news\/?p=1321"},"modified":"2022-04-05T09:19:18","modified_gmt":"2022-04-05T09:19:18","slug":"how-culpable-is-bitcoin-in-the-twitter-hack","status":"publish","type":"post","link":"https:\/\/cryptolinks.com\/news\/how-culpable-is-bitcoin-in-the-twitter-hack","title":{"rendered":"How Culpable Is Bitcoin in The Twitter Hack?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There is nothing new about Bitcoin being in the tabloids for the wrong reasons. As such, there were no real alterations in the price performance of the digital asset when news broke that hackers had breached Twitter\u2019s security and launched a scam involving bitcoin. Regardless of the inconsequential nature of the actions of these hackers on the <a href=\"https:\/\/cryptolinks.com\/news\/bitcoin-rally-here-is-why-the-asset-is-on-the-rise\">price of bitcoin<\/a>, we, however, need to explore all loose ends. Chief among them is the fact that pundits have tried to twist the narrative and <a href=\"https:\/\/cryptolinks.com\/cryptocurrency-gambling\">play on bitcoin\u2019s reputation<\/a>. in this article, I will analyze the events that trailed the attack as well as their implications<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Is Bitcoin the Enemy?<\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1325\" src=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Is-Bitcoin-the-Enemy.jpg\" alt=\"Is Bitcoin the Enemy\" width=\"1000\" height=\"783\" srcset=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Is-Bitcoin-the-Enemy.jpg 1000w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Is-Bitcoin-the-Enemy-300x235.jpg 300w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Is-Bitcoin-the-Enemy-768x601.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">On July 15, we witnessed one of the worst cybersecurity incidents in recent memory when hackers successfully infiltrated Twitter, hijacked the accounts of high-profile personalities, and went on to initiate a giveaway scam. At the end of this fiasco, the hacker had carted away with over $100,000 worth of bitcoin, in what seems to be an uncoordinated attempt to milk a security loophole. Rather than capitalize on the illegal access to the personal data and identities of powerful individuals on twitter and push for a political undertone, the hackers appeared to be content with raking in a few bucks here and there. This move suggested that the plan was hurriedly put together.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following this attack, Twitter, through a<\/span><a href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/an-update-on-our-security-incident.html\" rel=\"noopener\"> <span style=\"font-weight: 400;\">blog post<\/span><\/a><span style=\"font-weight: 400;\">, acknowledged that the hack was a result of a security breach that might have involved a social engineering scheme targeted at some of its employees. The blog reads:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAt this time, we believe attackers targeted certain Twitter employees through a social engineering scheme. What does this mean? In this context, social engineering is the intentional manipulation of people into performing certain actions and divulging confidential information. The attackers successfully manipulated a small number of employees and used their credentials to access Twitter\u2019s internal systems, including getting through our two-factor protections. As of now, we know that they accessed tools only available to our internal support teams to target 130 Twitter accounts. For 45 of those accounts, the attackers were able to initiate a password reset, login to the account, and send Tweets. We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the immediate aftermath of this infamous attack, media platforms like the New York Times and BBC began to tag the incident as a Bitcoin or Crypto scam. Here lies the bone of contention. This attack was never about bitcoin. Therefore, it made no sense that the digital asset was in the spotlight when the real culprit is Twitter. There is no reason why Bitcoin should get the stick. As noted by Samantha Yap on<\/span> <a href=\"https:\/\/cryptolinks.com\/1\/cointelegraph\"><span style=\"font-weight: 400;\">Cointelegraph<\/span><\/a><span style=\"font-weight: 400;\">, bitcoin is not to blame for Twitter\u2019s vulnerable security system. She stated:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cTo have \u201cBitcoin\u201d and \u201cscam\u201d used in the same breath in the global media may feel like all the work that\u2019s gone into building trust for this revolutionary technology since its creation in 2009 has been for nothing. This is even more reason why companies and their communication teams must turn the publicity Bitcoin is getting now into a positive for the industry\u2026 Twitter is a centralized organization; it holds all users\u2019 data and accounts in one place. For the hackers to gain access to this many Twitter accounts, they would have to break into Twitter\u2019s centralized database. Let\u2019s spell it out clearly: Hackers broke into Twitter\u2019s database and compromised high-profile accounts to ask for Bitcoin.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the same vein, Anil Lulla, co-founder of Delphi Digital, in a<\/span> <span style=\"font-weight: 400;\">discussion panel convened by <a href=\"https:\/\/cryptolinks.com\/74\/coindesk\">CoinDesk<\/a><\/span><span style=\"font-weight: 400;\">, opined that he does not expect the hack to reinforce existing biases against digital assets. He explained:<\/span><\/p>\n<div id=\"attachment_1322\" style=\"width: 676px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1322\" class=\" wp-image-1322\" src=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Anil-Lulla-co-founder-of-Delphi-Digital.png\" alt=\"Anil Lulla, co-founder of Delphi Digital\" width=\"666\" height=\"429\" srcset=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Anil-Lulla-co-founder-of-Delphi-Digital.png 1035w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Anil-Lulla-co-founder-of-Delphi-Digital-300x193.png 300w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Anil-Lulla-co-founder-of-Delphi-Digital-768x494.png 768w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Anil-Lulla-co-founder-of-Delphi-Digital-1024x659.png 1024w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><p id=\"caption-attachment-1322\" class=\"wp-caption-text\">Anil Lulla, co-founder of Delphi Digital<\/p><\/div>\n<p><span style=\"font-weight: 400;\">\u201cThis is a wider topic. People have predetermined biases. Most people in the space by now have been open-minded enough to understand this. Of course, there\u2019s always going to be a subset of people who always look for information that will always support their biases or their positions. But at the end of the day, I don\u2019t think it fundamentally changes anything. It really hasn\u2019t changed anything so far.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Instead, Lulla expects this cybersecurity mishap to shed a positive light on Bitcoin. He added:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cI believe there are some positive benefits to Bitcoin. Anyone who works in crypto got messages from friends and family asking what the scam is all about. They were curious to know when they saw the word \u201cBitcoin\u201d on TV. So maybe this is an opportunity for us to explain how Bitcoin works. We can outline that this isn\u2019t a Bitcoin scam and it was not hacked; Twitter got hacked. Obviously, it is going to increase attention, though whether that\u2019s good or bad is up in the air. These little things shouldn\u2019t really affect the fundamentals of Bitcoin.\u201d<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Twitter Under Fire<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many of the prominent crypto proponents, who have lent their voice to this conversation, believe that Twitter\u2019s recent security crisis is a prime example of why centralized systems are becoming redundant. It is frightening to discover that twitter delegates god-like access to its employees, which allows them to not only override the 2FA protection of accounts but also to tweet on behalf of users. The chief security officer and vice president of LogRhytm Labs, James Carder<\/span> <span style=\"font-weight: 400;\">raised<\/span><span style=\"font-weight: 400;\"> this argument and criticized the decision to favor such a flawed system framework:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThis hack also brings into concern why \u2014 in the first place \u2014 Twitter granted its employees with the functionality to tweet on behalf of their customers. It is clear that social media organizations need the ability to manage accounts, and particularly the ability to take down offensive or inappropriate content, the employees should not have access to post an entirely unique Tweet on a user\u2019s behalf. This points to a likely case of too much functionality available in the platform and not enough robust controls.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Blair Dunbar, Kaspersky\u2019s threat research and security intelligence communications officer,<\/span> <span style=\"font-weight: 400;\">noted<\/span><span style=\"font-weight: 400;\"> these discrepancies when he told Cointelegraph:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cTwitter wrote that several of its employees were victims of the attack. This suggests that the criminals attempted to gain access to the platform\u2019s infrastructure through their accounts. In addition, the fact that the criminals were able to immediately gain access to such a large number of accounts suggests that something internal in the system was compromised.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like Dunbar, <a href=\"https:\/\/cryptolinks.com\/2\/binance\">Changpeng Zhao, CEO of Binance<\/a>, also reached a similar conclusion. He questioned Twitter\u2019s proficiency in security systems, considering how easy it was to override the platform\u2019s 2FA protection. CZ asserted:<\/span><\/p>\n<div id=\"attachment_1323\" style=\"width: 946px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1323\" class=\" wp-image-1323\" src=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Changpeng-Zhao-CEO-of-Binance.jpeg\" alt=\"Changpeng Zhao, CEO of Binance\" width=\"936\" height=\"624\" srcset=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Changpeng-Zhao-CEO-of-Binance.jpeg 4000w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Changpeng-Zhao-CEO-of-Binance-300x200.jpeg 300w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Changpeng-Zhao-CEO-of-Binance-768x512.jpeg 768w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Changpeng-Zhao-CEO-of-Binance-1024x683.jpeg 1024w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><p id=\"caption-attachment-1323\" class=\"wp-caption-text\">Changpeng Zhao, CEO of Binance<\/p><\/div>\n<p><span style=\"font-weight: 400;\">\u201cWe believe this is a good wake up call for all social media platforms to revamp their security practices given the increased adoption of cryptocurrencies. Social media platforms are no longer just a place to share a selfie, it can and will be used for financial transactions and even crime. Stronger security needs to be built into these platforms\u2026 Twitter added the 2FA feature not long ago, but its implementation is flawed and leaves the ability for an attacker who brute-force attacks your account to lock the original owner out of the account. It even resets 2FA and email addresses, which defeats the purpose of 2FA. I tweeted about this less than a month and a half ago.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In response to this unfortunate incident, the U.S. Federal Bureau of Investigation, FBI, has moved to<\/span><a href=\"https:\/\/www.wsj.com\/articles\/fbi-investigates-twitter-hack-amid-broader-concerns-about-platforms-security-11594922537?mod=e2twd\" rel=\"noopener\"> <span style=\"font-weight: 400;\">investigate<\/span><\/a><span style=\"font-weight: 400;\"> this hack, considering how such vulnerabilities could have caused a nationwide panic. Likewise, the governor of New York, Andrew Cuomo, has urged the state\u2019s Department of Financial Services to probe all parties involved. According to<\/span><a href=\"https:\/\/nypost.com\/2020\/07\/16\/gov-cuomo-orders-full-investigation-into-massive-twitter-hack\/\" rel=\"noopener\"> <span style=\"font-weight: 400;\">New York Post<\/span><\/a><span style=\"font-weight: 400;\">, Cuomo stated that \u201cforeign interference remains a grave threat to our democracy and New York will continue to lead the fight to protect our democracy and the integrity of our elections in any way we can.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">New York Attorney General, Letitia James, also took a<\/span><a href=\"https:\/\/www.theverge.com\/2020\/7\/16\/21327249\/twitter-bitcoin-scam-congress-action-ed-markey-josh-hawley\" rel=\"noopener\"> <span style=\"font-weight: 400;\">similar stance<\/span><\/a><span style=\"font-weight: 400;\"> and will lead a separate investigation of the events that led to the security breaches recorded on July 15. He stated:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cCountless Americans rely on Twitter to read and watch the news, to engage in public debate, and to hear directly from political leaders, activists, business executives, and other thought leaders. Last night\u2019s attack on Twitter raises serious concerns about data security and how platforms like Twitter could be used to harm public debate. I have ordered my office to open an immediate investigation into this matter.\u201d<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">All Eyes on The Loot<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">For some reason, the hacker opted for bitcoin as the currency of choice. One thing is clear, the bitcoin network is big on transparency, and every transaction executed on it is traceable via specialized tools. And so, it comes as a surprise that the attacker would risk being tracked by law enforcement agencies. However, this could be all part of the plan. As noted by cybersecurity analytic firms like<\/span><a href=\"https:\/\/ciphertrace.com\/twitter-hack-update-scammed-funds-traced-to-exchanges-and-mixing-services\/\" rel=\"noopener\"> <span style=\"font-weight: 400;\">CipherTrace<\/span><\/a><span style=\"font-weight: 400;\"> and Chainalysis, the hacker has begun to move bits and pieces of the loot to obfuscate the money trail.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As expected, this tactic involves the use of mixers, coin swap services, and unregulated <a href=\"https:\/\/cryptolinks.com\/cryptocurrency-exchange\">crypto exchanges<\/a>. Nonetheless, these strategies do not necessarily mean that these funds are untraceable. Maddie Kennedy, a <a href=\"https:\/\/cryptolinks.com\/news\/the-beacon-chain-a-pivotal-moment-in-the-ethereum-2-0-narrative\">Chainalysis spokesperson<\/a>, mentioned that it is often possible to trace stolen funds even if the culprit attempts to use mixers to go off the radar. According to Tom Robinson, the chief scientist and co-founder of Elliptic, it is &#8220;very difficult to mask all your activity when you\u2019re using a system that\u2019s as transparent as Bitcoin.\u201d He added:<\/span><\/p>\n<div id=\"attachment_1327\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1327\" class=\"size-full wp-image-1327\" src=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Tom-Robinson-the-chief-scientist-and-co-founder-of-Elliptic.png\" alt=\"Tom Robinson, the chief scientist and co-founder of Elliptic\" width=\"500\" height=\"500\" srcset=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Tom-Robinson-the-chief-scientist-and-co-founder-of-Elliptic.png 500w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Tom-Robinson-the-chief-scientist-and-co-founder-of-Elliptic-150x150.png 150w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Tom-Robinson-the-chief-scientist-and-co-founder-of-Elliptic-300x300.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><p id=\"caption-attachment-1327\" class=\"wp-caption-text\">Tom Robinson, the chief scientist and co-founder of Elliptic<\/p><\/div>\n<p><span style=\"font-weight: 400;\">\u201cIt&#8217;s likely the hackers will be able to cash out in some way, [but] the question is whether they will be able to do so in a way that cannot be traced back to them.\u201d<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What Role Did Exchanges Play in All of His?<\/span><\/h2>\n<div id=\"attachment_1329\" style=\"width: 878px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1329\" class=\" wp-image-1329\" src=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/What-Role-Did-Exchanges-Play-in-All-of-His.jpg\" alt=\"What Role Did Exchanges Play in All of His\" width=\"868\" height=\"579\" srcset=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/What-Role-Did-Exchanges-Play-in-All-of-His.jpg 1000w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/What-Role-Did-Exchanges-Play-in-All-of-His-300x200.jpg 300w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/What-Role-Did-Exchanges-Play-in-All-of-His-768x512.jpg 768w\" sizes=\"auto, (max-width: 868px) 100vw, 868px\" \/><p id=\"caption-attachment-1329\" class=\"wp-caption-text\">What Role Did Exchanges Play in All of His<\/p><\/div>\n<p><span style=\"font-weight: 400;\">On the day of the attack, exchanges initiated various measures to prevent their users from falling victim to the scam. <a href=\"https:\/\/cryptolinks.com\/1178\/coinbase-buybitcoinmore\">Coinbase<\/a>, the largest crypto exchange in the U.S. and owner of one of the twitter accounts hacked, opted to blacklist the bitcoin address attached to the now-infamous tweets when it realized that 14 customers had already begun to fall for the scam and sent $3,000 worth of bitcoin to the said address. Per the data released, Coinbase managed to thwart the fraud, to an extent, by preventing about 1,100 of its users from sending over $280,000 worth of bitcoin to the hacker\u2019s address. Findings show that the same tactic was employed by other prominent exchanges.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A particular exchange that was vocal about this development is Kraken. Jesse Powell, chief executive of Kraken,<\/span><a href=\"https:\/\/www.forbes.com\/sites\/billybambrough\/2020\/07\/19\/exclusive-twitter-hackers-could-have-stolen-a-whole-lot-more\/#599aaadb2f84\" rel=\"noopener\"> <span style=\"font-weight: 400;\">highlighted<\/span><\/a><span style=\"font-weight: 400;\"> that the \u201chack shows that security is about layers of protection.\u201d And there is the need to adopt advanced surveillance systems to avoid a recurrence of such attacks:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Somebody has to be watching the admins and setting up alerts to watch for these vulnerabilities. The Twitter hack was a more widespread event, but scams of this nature are not new. Kraken proactively monitors for this type of activity and blocks certain addresses that we come across. Like any other scam, we proactively <a href=\"https:\/\/cryptolinks.com\/news\/the-arguments-for-and-against-blockchain-technology\">blocked the addresses<\/a> from the Twitter hack earlier this week.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, London-based Luno has moved to educate its users on the importance of identifying scams and ways to spot them. Marcus Swanepoel, chief executive of Luno, said in an email:<\/span><\/p>\n<div id=\"attachment_1326\" style=\"width: 693px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1326\" class=\"size-full wp-image-1326\" src=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Marcus-Swanepoel-chief-executive-of-Luno.jpg\" alt=\"Marcus Swanepoel, chief executive of Luno\" width=\"683\" height=\"600\" srcset=\"https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Marcus-Swanepoel-chief-executive-of-Luno.jpg 683w, https:\/\/cryptolinks.com\/news\/wp-content\/uploads\/2020\/07\/Marcus-Swanepoel-chief-executive-of-Luno-300x264.jpg 300w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><p id=\"caption-attachment-1326\" class=\"wp-caption-text\">Marcus Swanepoel, chief executive of Luno<\/p><\/div>\n<p><span style=\"font-weight: 400;\">&#8220;We have taken some in-app steps to avoid our customers becoming the victim of scams including blacklisting known scam addresses and also a pop-up scam warning box if we detect they are about to transfer funds to a known scam address. If it sounds too good to be true, then it generally is.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although blacklisting accounts is a common trope in the traditional financial scene, it is not particularly popular in the crypto industry. As soon as the report revealed the measures exchanges adopted to foil the hacker\u2019s plan, skeptics were quick to register their thoughts on the issue. To them, the actions of these exchanges go against everything bitcoin and decentralization stand for. On the one hand, the fundamental of <a href=\"https:\/\/cryptolinks.com\/staking\">bitcoin is at stake<\/a>. On the other hand, the inactions of exchanges pose a threat to crypto holders. Therefore, it is left for participants to choose which is the most important.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is nothing new about Bitcoin being in the tabloids for the wrong reasons. As such, there were no real alterations in the price performance of the digital asset when news broke that hackers had breached Twitter\u2019s security and launched a scam involving bitcoin. Regardless of the inconsequential nature of the actions of these hackers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1324,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/posts\/1321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/comments?post=1321"}],"version-history":[{"count":6,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/posts\/1321\/revisions"}],"predecessor-version":[{"id":2046,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/posts\/1321\/revisions\/2046"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/media\/1324"}],"wp:attachment":[{"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/media?parent=1321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/categories?post=1321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptolinks.com\/news\/wp-json\/wp\/v2\/tags?post=1321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}