{"id":3933,"date":"2018-08-15T04:28:12","date_gmt":"2018-08-15T02:28:12","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=3933"},"modified":"2023-06-09T11:58:38","modified_gmt":"2023-06-09T09:58:38","slug":"anonymity","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/15\/anonymity\/","title":{"rendered":"Preserving Anonymity"},"content":{"rendered":"<p>Since the amount and value of data are constantly increasing more and more data of each individual is collected and processed. Moreover Facebook&#8217;s recent data leak with Cambridge Analytica shows that collected data cannot be absolutely securely treated and stored.<\/p>\n<blockquote><p>In 2014 and 2015, the Facebook platform allowed an app \u2026 that ended up harvesting 87m profiles of users around the world that was then used by\u00a0<a class=\"u-underline\" href=\"https:\/\/www.theguardian.com\/uk-news\/cambridge-analytica\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\">Cambridge Analytica<\/a>\u00a0in the 2016 presidential campaign and in the referendum.<\/p><\/blockquote>\n<p class=\"p1\">This is one of the reasons why we&#8217;ll take a look on our digital identity, how it can be linked to our real identity and how we can restrict that. An understanding of what data is collected while surfing on the web is a first step in preserving anonymity.<\/p>\n<p><!--more--><\/p>\n<p class=\"p1\">Anonymity has a lot of advantages and disadvantages and the discussion if it should be\u00a0strengthened or not is roughly as old as the internet itself. We just concentrate on technical aspects here. But wait, what exactly does anonymity mean?<\/p>\n<h2>Definition<\/h2>\n<blockquote><p>Anonymity is derived from the Greek word \u1f00\u03bd\u03c9\u03bd\u03c5\u03bc\u03af\u03b1, anonymia, meaning \u201cwithout a name\u201d or \u201cnamelessness\u201d.<\/p><\/blockquote>\n<p>That&#8217;s more a historical point of view. Today we don&#8217;t need a name to identify an user on the internet, just think of the IP address. Thus a modern definition of anonymity is being unreachable. You can communicate, access or publish information and use services without revealing your identity.<\/p>\n<h2>Common identification methods<\/h2>\n<p>A very common method of identification on the internet is the user revealing his information on his own, such as registering on Facebook with the real name or purchasing clothes on Amazon.<\/p>\n<p>There are several methods to track your usage behaviour, the websites you visit and the services you use, so that a clear picture of you can be created. These identification methods are split up into two categories: cross-domain tracking and cross-device tracking.<\/p>\n<figure id=\"attachment_3942\" aria-describedby=\"caption-attachment-3942\" style=\"width: 656px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3942\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/15\/anonymity\/identification_methods\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods.png\" data-orig-size=\"1798,870\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"identification_methods\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-1024x495.png\" class=\"wp-image-3942 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-1024x495.png\" alt=\"\" width=\"656\" height=\"317\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-1024x495.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-300x145.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-768x372.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods.png 1798w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><figcaption id=\"caption-attachment-3942\" class=\"wp-caption-text\">Figure 1: Common identification method categories.<\/figcaption><\/figure>\n<p>Cross-domain states tracking on one device, in one browser across different websites and applications, whereas cross-device tracking relates to multiple devices and applications.<\/p>\n<p>Cross-domain tracking techniques include:<\/p>\n<ul>\n<li>Tracking cookies<\/li>\n<li>Virtual fingerprints\n<ul>\n<li>DNS profile<\/li>\n<li>Browser profile<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Tracking cookies are sent in a header field of the HTTP request and response, so that a server can recognise recurring users. These cookies are mostly not limited to one website, but shared across multiple domains through ad networks. Virtual fingerprints are individual characteristics, which\u00a0distinguish one user of another, for example the combination of the browser type, operating system, installed fonts and plugins. On\u00a0<a href=\"https:\/\/panopticlick.eff.org\/\">https:\/\/panopticlick.eff.org\/<\/a>\u00a0you can start a short test to see if your browser is unique and safe against cross-domain tracking.<\/p>\n<p>Cross-device tracking techniques:<\/p>\n<ul>\n<li>User permission<\/li>\n<li>Device fingerprint<\/li>\n<li>IP address<\/li>\n<li>Eavesdrop<\/li>\n<li>Compromised system<\/li>\n<li>Ultrasonic cross-device tracking<\/li>\n<\/ul>\n<p>As mentioned above obtaining the user&#8217;s permission is a great tool for cross-device tracking. If you&#8217;re logged into your Google account on several devices one can perfectly\u00a0comprehend which services you used on which device. Another method, similar to cross-domain tracking with browser fingerprints are device fingerprints. These consist of your phone type, operating system, wifi and browser information and several other. If not using any proxy or VPN the IP address is also a good indicator. A user&#8217;s data traffic can be obtained through eavesdrop on the provider or proxy side and through compromised systems, consequently\u00a0indicating user&#8217;s identity. Ultrasonic cross-device tracking is a method where a device emits a\u00a0<span class=\"s2\">unique \u201cultrasonic audio beacon\u201d that can be picked up by your device\u2019s mobile application containing a receiver. It does not require any connections, but only access to the microphone.<\/span><\/p>\n<p>With these techniques a lot of separate information can be collected, which often lead through connections to an user&#8217;s identity.<\/p>\n<h2>Defending your anonymity<\/h2>\n<p>Defending your anonymity is not an easy task to achieve, because it is not a discrete condition but a spectrum. This section is targeting users with a normal internet behaviour and should give a first insight on the tools and methods for preserving anonymity.<\/p>\n<figure id=\"attachment_3951\" aria-describedby=\"caption-attachment-3951\" style=\"width: 656px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3951\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/15\/anonymity\/spectrum\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum.png\" data-orig-size=\"1308,550\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"spectrum\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum-1024x431.png\" class=\"wp-image-3951 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum-1024x431.png\" alt=\"\" width=\"656\" height=\"276\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum-1024x431.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum-300x126.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum-768x323.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/spectrum.png 1308w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><figcaption id=\"caption-attachment-3951\" class=\"wp-caption-text\">Figure 2: Anonymity spectrum.<\/figcaption><\/figure>\n<p>An unwritten law on the internet is using pseudonyms instead of real names in online forums and games, so you don&#8217;t give out your identity to everyone. Exceptions are social networks like Facebook, where the real identity is a central part of the application.<\/p>\n<p>To come back to the two mentioned categories, cross-domain tracking and cross-device tracking, there are tools and techniques to prevent this kind of tracking.<\/p>\n<p>Tracking-Cookies can be either marked as not preferred through the Do Not Track Value (DNT) or completely disabled in most browser&#8217;s settings. The user experience on websites can suffer from disabled tracking cookies, as the individualization of websites relies on these cookies.<\/p>\n<p>Virtual fingerprints can be reduced through the usage of a common, less individualized browser, e.g. Safari on an iPhone. Disabling JavaScript prevents obtaining installed fonts and plugins, but at the expense of usability. The <a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en\">Tor browser<\/a> includes a feature for reducing the browser fingerprint and\u00a0<span class=\"s2\">is immune against most of the conventional browser fingerprinting techniques.<\/span><\/p>\n<p>Prevention of cross-device tracking techniques includes:<\/p>\n<ul>\n<li>Anonymizer\n<ul>\n<li>Proxy<\/li>\n<li>VPN<\/li>\n<li>Onion routing (<a href=\"https:\/\/www.torproject.org\/projects\/torbrowser.html.en\">Tor<\/a>, <a href=\"https:\/\/geti2p.net\/en\/\">I2P<\/a>)<\/li>\n<\/ul>\n<\/li>\n<li>Anonymous remailers (<a href=\"https:\/\/packages.debian.org\/search?keywords=mixmaster\">Mixmaster<\/a>) and filesharing (<a href=\"https:\/\/freenetproject.org\/author\/freenet-project-inc.html\">Freenet<\/a>)<\/li>\n<li>Friend-to-friend networks (<a href=\"https:\/\/ripple.com\/\">Ripple<\/a>)<\/li>\n<\/ul>\n<p>With an Anonymizer the real IP address can be hidden through a connection to a broker, which forwards the requests and responses. There are different architectural types, including proxy, VPN and onion routing. Anonymous remailers and filesharing tools are based on the peer-to-peer (P2P) principle, where systems are connected with each other without the need of a central instance. Friend-to-friend networks are working similar, but the peers are solely familiar people.<\/p>\n<p>User permissions are critical for preserving anonymity and should be chosen wisely, so that unnecessary information and rights are not provisioned. As described above, there are several ways to protect your digital identity, but mostly at the expense of usability.<\/p>\n<h2>Further research<\/h2>\n<p>There are several unaddressed topics which are gaining relevance in the future and thus require further research:<\/p>\n<ul>\n<li class=\"p1\">How to provide positive aspects of anonymity without strengthening cyber crime?<\/li>\n<li class=\"li1\"><span class=\"s2\">How would the internet change if every user would need a clear identification for access?<\/span><\/li>\n<li class=\"li1\"><span class=\"s2\">How does the uprising connectivity of all kinds of objects (IoT) influences anonymity?<\/span><\/li>\n<\/ul>\n<h2>References<\/h2>\n<p>[ 1 ] &#8211; https:\/\/www.theguardian.com\/technology\/2018\/jul\/11\/facebook-fined-for-data-breaches-in-cambridge-analytica-scandal<\/p>\n<p>[ 2 ] &#8211;\u00a0https:\/\/www.dictionary.com\/browse\/anonymous<\/p>\n<p>[ 3 ] &#8211;\u00a0https:\/\/thehackernews.com\/2017\/05\/ultrasonic-tracking-signals-apps.html<\/p>\n<p>[ 4 ] &#8211;\u00a0https:\/\/www.eff.org\/issues\/do-not-track<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the amount and value of data are constantly increasing more and more data of each individual is collected and processed. Moreover Facebook&#8217;s recent data leak with Cambridge Analytica shows that collected data cannot be absolutely securely treated and stored. In 2014 and 2015, the Facebook platform allowed an app \u2026 that ended up harvesting [&hellip;]<\/p>\n","protected":false},"author":877,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[183,185,186,45,184],"ppma_author":[759],"class_list":["post-3933","post","type-post","status-publish","format-standard","hentry","category-secure-systems","category-system-designs","tag-anonymity","tag-cookies","tag-onion-routing","tag-tor","tag-tracking"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":780,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/11\/incognito-in-the-dark-web-a-guide\/","url_meta":{"origin":3933,"position":0},"title":"Incognito in the dark web &#8211; a guide","author":"Chris Uhrig","date":"11. July 2016","format":false,"excerpt":"\u201cBig Brother is watching you\u201d, \u201cdata kraken\u201d or \u201cthe transparent man\u201d are often used as catchwords, when talking about the shrinking privacy on the internet. This blog post will how a possible way of protecting the anonymity and privacy of the users in the internet. A possible way to do\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"darknet","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet-300x298.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3867,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/social-engineering-hacking-the-human-os\/","url_meta":{"origin":3933,"position":1},"title":"Social Engineering &#8211; Hacking the human OS","author":"Benjamin Kowatsch","date":"7. August 2018","format":false,"excerpt":"Abstract Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4024,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/","url_meta":{"origin":3933,"position":2},"title":"Why AI is a Threat for our Digital Security","author":"Katharina Strecker","date":"22. August 2018","format":false,"excerpt":"Artificial intelligence has a great potential to improve many areas of our lives in the future. But what happens when these AI technologies are used maliciously? Sure, a big topic may be autonomous weapons or so called \u201ckiller robots\u201d. But beside our physical security - what about our digital one?\u2026","rel":"","context":"In &quot;Artificial Intelligence&quot;","block_context":{"text":"Artificial Intelligence","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/artificial-intelligence\/"},"img":{"alt_text":"Computer image recognition has beaten human-level image recognition in 2015","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3730,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/06\/26\/metadata-in-the-world-of-smartphones\/","url_meta":{"origin":3933,"position":3},"title":"Metadata in the world of smartphones","author":"Ronny Rampp","date":"26. June 2018","format":false,"excerpt":"Metadata is data about data. Thus, it provides information about data. Examples for metadata are file size, time and date of creation, means of creation of data etc. Every day, we deal with it, but no one really cares about it. Sometimes, metadata gives us more information than the data\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"A nice picture of a dog in garden","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/06\/Hund.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7381,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/08\/31\/how-does-tor-work\/","url_meta":{"origin":3933,"position":4},"title":"How does Tor work?","author":"tt031","date":"31. August 2019","format":false,"excerpt":"Written by Tim Tenckhoff - tt031 | Computer Science and Media 1. Introduction The mysterious dark part of the internet - hidden in depths of the world wide web, is well known as a lawless space for shady online drug deals or other criminal activities. But in times of continuous\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1568,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/08\/secure-systems-2016-an-overview-walter-kriha\/","url_meta":{"origin":3933,"position":5},"title":"Secure Systems 2016 &#8211; An Overview, Walter Kriha","author":"Walter Kriha","date":"8. September 2016","format":false,"excerpt":"This is an attempt to provide an overview of the topics in \"Secure Systems\", a seminar held during the summer term 2016 at the Stuttgart Media University HdM. Presentations have been given and blog entries into our new MI blog were made. With the chosen topics we have been quite\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"securesystems","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/securesystems-205x300.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":759,"user_id":877,"is_guest":0,"slug":"db119","display_name":"David Bochan","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/510559b8e34676ae83d86fc1470ae3228455bd8fda382c2a50d6360dafb99f6c?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/877"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=3933"}],"version-history":[{"count":30,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3933\/revisions"}],"predecessor-version":[{"id":4106,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3933\/revisions\/4106"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=3933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=3933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=3933"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}