{"id":8652,"date":"2019-08-31T19:08:02","date_gmt":"2019-08-31T17:08:02","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=8652"},"modified":"2023-08-06T21:44:51","modified_gmt":"2023-08-06T19:44:51","slug":"convenient-internet-voting-using-blockchain-technology","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/08\/31\/convenient-internet-voting-using-blockchain-technology\/","title":{"rendered":"Convenient internet voting using blockchain technology"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.extremetech.com\/wp-content\/uploads\/2018\/10\/511382-how-to-register-to-vote-online.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\">src: https:\/\/www.extremetech.com\/wp-content\/uploads\/2018\/10\/511382-how-to-register-to-vote-online.png <\/figcaption><\/figure>\n\n\n\n<p class=\"has-drop-cap has-text-align-left\">Within this\ncentury the use of digital technology has probably never been as high and as convenient\nas of today. People use the internet to access encyclopedias, look up food recipes\nand share pictures of their pets. It doesn\u2019t matter whether you are at home,\nstanding in an aisle at the grocery store or even flying on an airplane. Our\ndevices provide unlimited access to modern technology and even somewhat changed\nthe way we used to do things. For instance, it is now a matter of minutes,\nsometimes even seconds for us to buy some products online or quickly check our balance\non banking accounts, whereas those things used to require you to at least leave\nthe house for some time. In some cases, we even narrowed down our involvement\nfor buying products to simply pushing down a button. In comparison to the older\nday methods for those actions this seems like a huge improvement. And it is.\nBut maybe not in all regards. <\/p>\n\n\n\n<!--more-->\n\n\n\n<p>While\nconvenience and simplicity generally sound like things to aspire for, we should\nalso look at what convenience is and more importantly what effects convenience\ncan produce or whether there is any negative side to it. Our imagination rarely\nstops when we come up with ways how things could be improved through\ntechnology. We thrive towards making things as simple and convenient, making them\naccessible to as much people as possible or easy enough to get people to use\nthem. With all this thrive to make things simple and convenient to use we might\npossibly be forgetting about whether they even need to or should be. And more\nso, are we missing out on anything for having them be convenient?<\/p>\n\n\n\n<p>First, we should identify what convenience means in this context. For this article, convenience is being viewed as the amount of investments of resources including quantitative factors like time or money and qualitative factors, such as technical understanding, on the side of a user or actor while using an application or performing an action. Basically, it could be summarized to \u201cHow much does the user have to do for his goal?\u201d.<\/p>\n\n\n\n<p>From my point of view, there also exist stakeholder in convenience. While you could argue that the biggest stakeholder in convenience should be the users, since practically they are the ones that convenience should be designed around, to me the bigger stakeholder stands behind the intention to increase convenience on a specific topic.<br> To illustrate, let\u2019s use Amazons dash button as an example. While you as the user might have the stake to easily refill your washing powder as soon as you notice it is empty, by simply pressing a button, amazon probably ultimately doesn\u2019t truly care about you never having to wear dirty clothes. They most likely are simplifying ordering to generate more revenue. As ordering becomes easier, more people will order, or even prefer Amazon over other marketplaces because of that reason. At that point, you could speculate that cases exist, in which convenience will simply be viewed as a feature or unique selling point.<\/p>\n\n\n\n<p>In contrast to that, convenience can also act as an enabler. The more simplistic designs are, the more people might engage in them and that engagement can be of other sorts than financial. Think of how easy it is, to go online and speak out about something you care for. Or how simple it is to engage in a community. I could imagine there are lots of good things happening in the real world, that would see more engagement if they were more convenient. Sure, not everything in life is convenient and it doesn\u2019t have to be. But what about important things that could be made more convenient and benefit from it? Cases in which engagement through convenience is well appreciated. A perfect example for this would be an election. Would online elections increase engagement, and can we even assure that convenience in such a critical topic doesn\u2019t lack the necessary security and safety features? <\/p>\n\n\n\n<p>In this article, we are going to overlook the inconvenience in current voting systems and focus on some thoughts of implementing a secure online voting system, that would increase convenience in general elections and possible increase voting turnout.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"> Convenience through internet voting using blockchain technology \u2013 a realistic approach ?<\/h4>\n\n\n\n<p>Internet voting (i-voting) is mostly associated as a part of electronic voting (e-voting), which used to include any electronic tools assisting an election. This could range from electronic devices for taking in votes, to electronic vote counting machines that are set up at polling stations.\u00b9<\/p>\n\n\n\n<p>While i-voting might to some degree seem to also be an electronic assistance to voting, the main difference to e-voting would be that with i-voting, voters would not even have to show up at polling stations. The whole voting process would be accessible via the internet. In theory, i-voting sounds awesome and to most people it would clearly be a dream scenario, in which they can participate in their countries elections whilst not being required to make a physical appearance, for example while they are stationed overseas in the military. While theoretically i-voting appears to be a modern convenient way to cast your vote, it also raises a lot of issues, especially concerning the security of this whole process. <\/p>\n\n\n\n<p>Despite security concerns, i-voting has been used in a few cases already. An example of currently deployed internet voting solutions would be the Estonian internet voting protocol that has being used in the Estonian election 2016.&nbsp; To understand which part of the i-voting scheme could be improved through blockchain technology, Ivo Kubjas in his paper \u201cUsing blockchain for enabling internet voting\u201d took a look at how i-voting in the example of the Estonian election works and proposes possible uses of blockchain technology: <br>In Estonia, every citizen possesses a national ID-card, that holds a secret verification key. Every eligible voter <strong>v<\/strong> has a corresponding signing key <strong>skv <\/strong>to the verification key stored on the national ID-card. In addition to this, there is an encryption key <strong>ek <\/strong>to which there is also a corresponding decryption key <strong>dk<\/strong>. While the decryption key <strong>dk <\/strong>is shared securely between the members of the election committee, the encryption key <strong>ek <\/strong>is made public. &nbsp;When a voter <strong>v <\/strong>casts a ballot for a candidate <strong>c<\/strong>, the choice of the voter is encrypted using the encryption key ek and obtaining the ciphertext <strong>E=Enc(ek,c)<\/strong>. This ciphertext is then signed, using the signing key and obtaining signed ciphertext <strong>S=Sign(skv,E)<\/strong>.&nbsp; <strong>S<\/strong> is sent to the server and verified, using the verification key of the voter <strong>vkv<\/strong> (stored on the national ID card). If verified, the valid signed ciphertext is stored at the end of the elections. At the end of the elections, the stored signed ciphertexts for which there also exists a voting ballot (system allows both i-voting and traditional voting methods) are revoked. Then the remaining signed ciphertexts are stripped form their signatures, leaving the ciphertexts for candidates. This set of ciphertexts are transferred passively, for instance by using a DVD, to another computer where the decryption key dk is constructed from the members shares and the ciphertext is then decrypted.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aspects to focus on <\/h4>\n\n\n\n<p>Now with a general understanding of how internet voting can be implemented, there are a few aspects that deserve a closer look, in order to figure out whether this concept of internet voting can function securely on a larger scale or if and how it can be improved. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Voter eligibility<\/h4>\n\n\n\n<p>In Estonia, the infrastructure provides national ID cards that possess a signing key, that is used to verify a voter\u2019s eligibility. However, the process to verify a voter\u2019s eligibility on a large scale without having the required infrastructure in place can we very challenging.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Coercion-resistance<\/h4>\n\n\n\n<p>To manipulate election results, some individuals might even threaten or use violence to get other individuals to vote for their desired candidate or party. In order to prevent this from happening, the Estonian system allows for a recast of a ballot, either over the internet or a paper ballot. However, for this method to function accurately, the course of events related to the election, such as the start of elections, submission of a ballot or a change of the candidate list, must follow a strict consistent linearity. This might not be the case for procedural methods. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Distributed consensus for storing data<\/h4>\n\n\n\n<p>Similar to the pervious aspect, this resolves around consistency in data as well. Distributed storage in conventional form does not assure strict consistency of the data in different nodes, which makes it hard to the decide which node holds all the data in the case of conflicts.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Irreversibility of events <\/h4>\n\n\n\n<p>Even with backups being in use, the current system cannot guarantee that no ballot hasn\u2019t been removed. <\/p>\n\n\n\n<p>Holding a\ntotally secure election via the internet is a complex process that involves a lot\nof security issues online and in the real world. Given the Estonian internet\nvoting system as basis, the author proposes use for the blockchain technology\nin some respects.<\/p>\n\n\n\n<p>The first\nproposal looks to solve the voter eligibility issue in in countries, that\nunlike Estonia don\u2019t have the necessary infrastructure in place to implement a\nsimilar solution (e.g. in form of national ID with secret keys). An approach\nusing blockchain technology would be to have every voter create a signing key\npair usable with a digital coin, i.e. Bitcoin, which defines an address. To\nprovide eligibility to a voter, some amount of coins could be transferred to\nthe specific address. This approach would be publicly auditable, since the\ntransactions in Bitcoin blockchain are public. Therefore, every voter can prove\npublicly whether they have been rejected of the legitimate right to vote. <\/p>\n\n\n\n<p>Addressing strict linear entries, distributed consensus for storing data and irreversibility of events: According to the author, the use of blockchain itself would resolve these issues due to its nature. Blockchain technology provides strict linear entries because every entry is distributed to other nodes and validated through a hash function which is constantly changing as the data changes. Once validation is successful, assuring consistency of previous entries, every node will store the updated data and reject any further data that doesn\u2019t pass the hash function successfully, thus also guaranteeing irreversibility of events.\u00b2<\/p>\n\n\n\n<p>So far, we\nhave looked at an implementation of i-voting without blockchain technology and\nsome issues that could be resolved using a blockchain approach. To gain some\ninsight on opportunities and benefits of internet voting using blockchain\ntechnology, it is helpful to look at some recent examples.<\/p>\n\n\n\n<p>No full\nimplementation of blockchain-based voting for a national election has occurred\nyet, however there is examples for corporate, city and national voting. For\ninstance, in Russia, Moscow\u00b4s Active Citizen program started using blockchain\nin December 2017 for voting and making the results publicly auditable. The\nprogram allowed votes on diverse subjects, such as what color the seats in the\nnew sporting arena should be. Even though this doesn\u2019t deal with political\noffices, technology could be tailored for that purpose. Due to the lack of time\nof many Moscow residents, meetings have moved online since city officials\nbelieved that neighbors should have a convenient environment in which they have\nsome influence. They also believed that blockchain would increase trust between\ncitizens and government. To address this, the city of Moscow even commissioned\nan audit, conducted by the accounting firm PwC, that found no reason to be\nconcerned for polls involving more than 300,000 votes. <\/p>\n\n\n\n<p>Another\nexample would be an Estonian technology company LVH Group, that allows\nshareholders who are Estonian citizens or Estonian e-residents to vote at LVH\u00b4s\nannual general meeting, using their verified national online ID to log in. <\/p>\n\n\n\n<p>At the\ngeneral elections March 2018 in Sierra Leone, a Swiss blockchain startup named\nAgora provided a partial tally of election results to have an independent count\nfor comparison. However, this was rather considered a \u201cuse case \u201cinstead of a\n\u201cfull implementation\u201d.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Benefits and\nOpportunities<\/h4>\n\n\n\n<p>Blockchain\ntechnology provides several benefits due to its nature alone.&nbsp; For instance, addressing voter tampering,\nblockchain creates cryptographically secure voting records, providing transparency,\naccuracy and security. It also provides anonymity while still being open for\npublic inspection. Blockchain enabled voting might also improve engagement in\nvoting, especially in cases in which people often are not willing to put in the\neffort to show up in person for certain issues. It might also provide a way in\nwhich establishing voter eligibility would become easier, resolving issues of unregistered\nvoters to a certain degree, making a fairer election. Another opportunity would\nbe the increase in speed with which votes are tallied. In Addition to that,\nblockchain technology in elections could eliminate ambiguities, while promoting\ngreater transparency and clarity to voters, due to its feature of being\npublicly auditable, as mentioned before.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Challenges<\/h4>\n\n\n\n<p>As with most modern technologies that are introduced to the public, blockchain enabled voting would require public trust and confidence, which might be difficult due to its complexity. Also, widespread access to internet and digital skills to use the system are requirements. &nbsp;In addition to that, blockchain technology has insufficient observations to determine a blockchain-based platform\u2019s scalability. Concerning authorities, blockchain enabled voting might shift power away from central actors such as electoral authorities and government agencies, which might face resistance from political leaders who benefit from the current situation.\u00b3<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion<\/h4>\n\n\n\n<p>Regarding the introduction to this article, the main question remains whether convenience could be improved while maintaining high security standards. In an ideal scenario blockchain-enabled online voting could massively improve elections in general. On one hand, convenience might enable more voters and improve a democratic system by aggregating more participants. On the other hand, blockchain technology provides improved security aspects over conventional voting systems, such as transparency, irreversibility of events, lower possibility of voter tampering, improved processes to assure voter eligibility. Focusing on those aspects, it seems like a good decision to move towards blockchain-enabled online voting in the future. However, it is vastly important to understand that general elections as such are a complicated matter. It often can\u00b4t be solved just focusing on the technological part of it since there are more stakeholders in elections and often even more real-world problems that can not all be solved through technology. To me, it seems realistic that a few implementations of blockchain-enabled voting will be done in the future, from which more information resolving around this topic could be gathered and evaluated. In general, blockchain-enabled technology provides several benefits that could be translated to various use cases, exceeding online voting. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Sources<\/h4>\n\n\n\n<p>\u00b9 <a href=\"https:\/\/web.archive.org\/web\/20150402091803\/http:\/\/www.electoralpractice.ch\/2014\/02\/switzerlands-new-legislation-on-internet-voting\/#sthash.FoF0XF9m.i6VEjuJm.dpbs\">&#8220;Switzerland&#8217;s new legislation on internet voting&#8221;<\/a>.&nbsp;<em>electoralpractice.ch<\/em>.  <br>   Archived from <a href=\"http:\/\/www.electoralpractice.ch\/2014\/02\/switzerlands-new-legislation-on-internet-voting\/#sthash.FoF0XF9m.i6VEjuJm.dpbs\">the original<\/a>&nbsp;on 2015-04-02. Retrieved&nbsp;2019-02-05. <br>\u00b2  Ivo Kubjas, Using blockchain for enabling internet voting, January 6, 2017<br>\u00b3  Nir Kshetri and Jeffrey Voas, Blockchain-Enabled E-Voting, JULY\/AUGUST  <br>   2018 | IEEE SOFTWARE<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Within this century the use of digital technology has probably never been as high and as convenient as of today. People use the internet to access encyclopedias, look up food recipes and share pictures of their pets. It doesn\u2019t matter whether you are at home, standing in an aisle at the grocery store or even [&hellip;]<\/p>\n","protected":false},"author":944,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,650,223],"tags":[],"ppma_author":[798],"class_list":["post-8652","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-scalable-systems","category-ultra-large-scale-systems"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":661,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/06\/22\/keyless-gone-vulnerabilities-in-keyless-car-systems\/","url_meta":{"origin":8652,"position":0},"title":"Keyless Gone &#8211; Vulnerabilities in keyless car systems","author":"Antonia B\u00f6ttinger","date":"22. June 2016","format":false,"excerpt":"(written by Antonia B\u00f6ttinger and Andreas Gold) Introduction Modern cars embed complex technologies to improve the drivers comfort and safety. In 1999 the automobil industry introduced the smart key system that more and more cars use. Even if manufacturers make use of various designations like Keyless Go, KeyFree Power or\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/06\/keylessgo.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/06\/keylessgo.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/06\/keylessgo.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/06\/keylessgo.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/06\/keylessgo.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/06\/keylessgo.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20290,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/02\/zero-trust-security-the-further-development-of-perimeter-security\/","url_meta":{"origin":8652,"position":1},"title":"Zero Trust Security &#8211; The further development of perimeter security?","author":"Max Merz","date":"2. August 2021","format":false,"excerpt":"Most companies use perimeter security to secure their cooperate applications, services and data from attackers and unauthorised users. This approach includes a cooperate network, where clients, that are part of the network are able to access the applications. This includes attackers that got access to these networks.Additionally more applications are\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2015\/12\/17\/27\/","url_meta":{"origin":8652,"position":2},"title":"Docker- dive into its foundations","author":"Benjamin Binder","date":"17. December 2015","format":false,"excerpt":"Docker has gained a lot of attention over the past several years.\u00a0But not only because of its cool logo or it being\u00a0the top buzzword of managers, but also because of its useful features.\u00a0We talked about Docker quite a bit without really\u00a0understanding why it's so\u00a0great to use. So we decided to\u2026","rel":"","context":"In &quot;Databases&quot;","block_context":{"text":"Databases","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/databases\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3978,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/16\/security-in-smart-cities\/","url_meta":{"origin":8652,"position":3},"title":"Security in Smart Cities","author":"Johannes Kaeppler","date":"16. August 2018","format":false,"excerpt":"Today cities are growing bigger and faster than ever before. This results in various negative aspects for the citizens such as increased traffic, pollution, crime and cost of living, just to name a few. Governments and city administrations and authorities are in need to find solutions in order to alleviate\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3910,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/14\/beyond-corp-a-new-approach-to-enterprise-security\/","url_meta":{"origin":8652,"position":4},"title":"Beyond Corp &#8211; Google&#8217;s approach to enterprise security","author":"Domenik Jockers","date":"14. August 2018","format":false,"excerpt":"What is Beyond Corp? Beyond corp is a concept which was developed and is used by Google and is by now adopted by some other companies. The idea behind it was to get away from the intranet and its perimeter defense, where, if you breach the perimeter you can access\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/pipeline.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":23961,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/02\/10\/microservices-any-good\/","url_meta":{"origin":8652,"position":5},"title":"Microservices &#8211; any good?","author":"Kim Bastiaanse","date":"10. February 2023","format":false,"excerpt":"As software solutions continue to evolve and grow in size and complexity, the effort required to manage, maintain and update them increases. To address this issue, a modular and manageable approach to software development is required.\u00a0Microservices architecture provides a solution by breaking down applications into smaller, independent services that can\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/Microservice.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/Microservice.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/Microservice.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/Microservice.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/Microservice.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/Microservice.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":798,"user_id":944,"is_guest":0,"slug":"du009","display_name":"Dominik Utler","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/d3bfebe5f9440c09509649c12c603cc4472248c0d67035d04b4c02b5b97ae9ac?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/8652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/944"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=8652"}],"version-history":[{"count":8,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/8652\/revisions"}],"predecessor-version":[{"id":25431,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/8652\/revisions\/25431"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=8652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=8652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=8652"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=8652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}