{"id":1305,"date":"2018-01-10T10:21:31","date_gmt":"2018-01-10T08:21:31","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1305"},"modified":"2020-06-10T16:41:51","modified_gmt":"2020-06-10T13:41:51","slug":"cpu-bugs-have-been-known-since-june-2017-according-to-google","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/cpu-bugs-have-been-known-since-june-2017-according-to-google\/","title":{"rendered":"CPU bugs have been known since June 2017, according to Google"},"content":{"rendered":"<header class=\"cluster-header\">Not only\u00a0Intel\u00a0is affected by the serious vulnerability in processors, by which attackers can read sensitive data.\u00a0Google&#8217;s\u00a0Project Zero explains the functioning of the memory leaks and Linus Torvalds expects honesty.<\/p>\n<\/header>\n<div class=\"formatted\">\n<p id=\"gpar1\">Intel wants to quickly take care of the vulnerability in processors, which has caused a sensation in recent days.\u00a0According to its own statement\u00a0, the company works with other processor manufacturers such as AMD and ARM Holdings together.\u00a0The vulnerability allows attackers to access data stored in the kernel, such as passwords or other encrypted information.<\/p>\n<div><\/div>\n<p id=\"gpar2\">According to Intel, the bug does not have the potential to\u00a0<em>corrupt, modify, or delete data<\/em>\u00a0.\u00a0In fact, simple reading of data is at the heart of the problem.\u00a0From Intel&#8217;s opinion is indirectly apparent when the first patches for the vulnerability can be expected: Next week they will probably be distributed.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/cpu-bugs-have-been-known-since-june-2017-according-to-google\/#First_patches_already_distributed_or_in_planning\" title=\"First patches already distributed or in planning\">First patches already distributed or in planning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/cpu-bugs-have-been-known-since-june-2017-according-to-google\/#The_devil_has_a_name_Specter_and_Meltdown\" title=\"The devil has a name: Specter and Meltdown\">The devil has a name: Specter and Meltdown<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/cpu-bugs-have-been-known-since-june-2017-according-to-google\/#Meltdown_probably_affects_only_Intel_CPUs\" title=\"Meltdown probably affects only Intel CPUs\">Meltdown probably affects only Intel CPUs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/cpu-bugs-have-been-known-since-june-2017-according-to-google\/#AMD_is_only_partially_affected\" title=\"AMD is only partially affected\">AMD is only partially affected<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"First_patches_already_distributed_or_in_planning\"><\/span>First patches already distributed or in planning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p id=\"gpar3\">Microsoft does not seem to want to wait for this and has distributed a first emergency update.\u00a0According to the online magazine The Verge\u00a0, it can already be downloaded on Windows 10 machines.\u00a0However, systems with Windows 7 or 8 installed will not be updated until next Tuesday.<\/p>\n<p id=\"gpar4\">According to a blog post\u00a0, Google has an update for the mobile operating system Android in the works, which addresses the error for ARM processors.\u00a0The patch is expected by January 5th.\u00a0However, the distribution on the many different Android phones should take longer.\u00a0Google Chrome will receive a security update on January 23, version 64.\u00a0Chromebooks and GSuite software should not be affected.<\/p>\n<p id=\"gpar5\">Apple expressed itself so far not clear to the security gap.\u00a0The online magazine Macrumor\u00a0speaks of a fix for MacOS 10.13.2, which was rolled out in December 2017.\u00a0However, the problem is probably only for the most part and not completely resolved.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"The_devil_has_a_name_Specter_and_Meltdown\"><\/span>The devil has a name: Specter and Meltdown<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The team from Google&#8217;s IT security department,\u00a0Project Zero\u00a0, said it had been aware of the bug since June 1, 2017.\u00a0He has been told manufacturers such as AMD, ARM and Intel.\u00a0So it&#8217;s not\u00a0just Intel processors that are affected\u00a0,\u00a0as it was supposed to\u00a0be\u00a0, but also various other processors &#8211; including AMD and ARM CPUs.\u00a0Google divides the gap into three categories and gives them two names: The first two categories are called Specter, the third Meltdown.<\/p>\n<p id=\"gfpop1\">Under Specter Google sums up the error that actually protected data can be read out by mis-speculated execution of instructions of a CPU within the same process.\u00a0This gap occurs in both Haswell Xeon processors from Intel and AMD CPUs FX and Pro series.\u00a0The ARM Cortex A57 is also affected.\u00a0This variant is called Google Bounds Check Bypass.<\/p>\n<p id=\"gfpop2\">Under the same name, Google also poses a different problem: With normal user rights and a default configuration, read access to the virtual memory of a modern Linux kernel can be made provided the computer uses an Intel Haswell Xeon CPU.\u00a0The reading speed was measured by the team at about 2,000 bytes per second.\u00a0If the just-in-time compilation of the BPF is enabled in the kernel, this technique also works with AMD Pro CPUs.\u00a0This is not the default.<\/p>\n<p id=\"iq-gfpop\">Google was also able to reproduce Specter for a kernel virtual machine using the Intel Xeon CPU powered by virt-manager.\u00a0However, the testers used an old kernel version of Debian.\u00a0The kernel memory of the VM Host can thus be read at a transfer rate of 1500 bytes per second.\u00a0Depending on the size of the RAM, the initialization takes a while &#8211; at 64 GB, it takes 10 to 30 minutes.\u00a0This error is called by Google Branch Target Injection.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Meltdown_probably_affects_only_Intel_CPUs\"><\/span>Meltdown probably affects only Intel CPUs<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The second mistake, Meltdown, allows processes with traditional user privileges to read kernel memory under certain conditions.\u00a0Google assumes that the kernel&#8217;s vulnerable data must be stored in the processor&#8217;s L1D cache for access to work.\u00a0Here comes the problem with the speculative execution of Intel processors to fruition.\u00a0According to Google, processors from other manufacturers are for the time being not affected by the error mentioned by the rogue data cache load.<\/p>\n<p>To Meltdown\u00a0also Linux developer Linus Torvalds expressed\u00a0in a message.\u00a0He has no good words left for Intel: &#8221;\u00a0<em>A competent CPU developer would fix that by ensuring that speculative execution does not occur beyond protected areas,&#8221; he<\/em>wrote.\u00a0He also called on Intel to admit the mistake openly and honestly, instead of\u00a0<em>giving up &#8220;PR gibberish<\/em>\u00a0.&#8221;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"AMD_is_only_partially_affected\"><\/span>AMD is only partially affected<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In a separate statement\u00a0Intel competitor AMD reports\u00a0.\u00a0It only affects Specter.\u00a0The company&#8217;s security engineers divide the bug, like Google, into three categories: Bounds Check Bypass, Branch Target Injection, and Rogue Data Cache Load.\u00a0The first error should be fixed by operating system updates from third-party vendors.\u00a0In this case, a\u00a0<em>&#8220;negligible&#8221;<\/em>\u00a0performance loss is to be expected.<\/p>\n<p>A threat from the second variant named Branch Target Injection, AMD almost does not exist.\u00a0So far, this attack has not yet been adjusted on any AMD processor.\u00a0Variation three is not possible on AMD processors, because the architecture of Intel&#8217;s processors is different.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Not only\u00a0Intel\u00a0is affected by the serious vulnerability in processors, by which attackers can read sensitive data.\u00a0Google&#8217;s\u00a0Project Zero explains the functioning of the memory leaks and Linus Torvalds expects honesty. Intel wants to quickly take care of the vulnerability in processors, which has caused a sensation in recent days.\u00a0According to its<\/p>\n","protected":false},"author":4,"featured_media":1306,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-1305","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2018\/01\/not_threaded.png?fit=1540%2C1072&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-l3","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1232,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/programming-an-x86-processor-like-an-arduino\/","url_meta":{"origin":1305,"position":0},"title":"Programming an x86 processor like an Arduino","author":"Shreyash Sharma","date":"November 4, 2017","format":false,"excerpt":"The\u00a0Arduino\u00a0-Online IDE support with Intel's help in the future x86-based\u00a0Linux\u00a0Computers including migration path to professional IDEs.\u00a0A fully configured hardware kit is designed to make it easier for embedded developers to get started. Arduino Create\u00a0, the online IDE for developing Arduino programs, will also support\u00a0Up Squared in the\u00a0future\u00a0.\u00a0This was\u00a0announced by Intel\u00a0.\u00a0Aaeon,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/arduino-tre.jpg?fit=600%2C400&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/arduino-tre.jpg?fit=600%2C400&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/arduino-tre.jpg?fit=600%2C400&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":26,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/bash-vulnerability-fix\/","url_meta":{"origin":1305,"position":1},"title":"Linux bash vulnerability fix","author":"Virtono","date":"September 16, 2014","format":false,"excerpt":"As you may already know, from the last days a\u00a0bash vulnerability\u00a0is started being exploited.\u00a0All majority of distros\u00a0( Redhat \/ Centos, Debian, Ubuntu) already\u00a0launched a fix\u00a0for this, so all you need to do is to\u00a0update your linux server: for Redhat \/ Centos servers : \u00a0yum update for Ubuntu and Debian :\u00a0sudo\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2014\/09\/bash-shellshock.png?fit=728%2C450&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2014\/09\/bash-shellshock.png?fit=728%2C450&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2014\/09\/bash-shellshock.png?fit=728%2C450&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2014\/09\/bash-shellshock.png?fit=728%2C450&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":724,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/how-to-protect-your-server-against-the-dirty-cow-linux-vulnerability\/","url_meta":{"origin":1305,"position":2},"title":"How To Protect Your Server Against the Dirty COW Linux Vulnerability","author":"Virtono","date":"October 25, 2016","format":false,"excerpt":"Introduction : On October 19, 2016, a privilege escalation vulnerability in the Linux kernel was disclosed. The bug is nicknamed Dirty COW because the underlying issue was a race condition in the way kernel handles copy-on-write (COW). Dirty COW has existed for a long time at least since 2007, with\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3143,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/cloud-services-are-provisioned-in-29-different-locations-globally\/","url_meta":{"origin":1305,"position":3},"title":"Cloud Services are provisioned in 29 different locations globally.","author":"Daniel Draga","date":"February 26, 2023","format":false,"excerpt":"We're excited to announce that Virtono.com has recently made some significant investments and upgrades to our hardware, which allows us to offer even better services to our clients. We've installed infrastructure in new data centers all over the world, and our Cloud VPS services and cloud hosting servers are now\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"Virtono worldwide datacenters","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/02\/Screenshot-2023-02-26-at-15.29.29.png?fit=1200%2C738&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/02\/Screenshot-2023-02-26-at-15.29.29.png?fit=1200%2C738&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/02\/Screenshot-2023-02-26-at-15.29.29.png?fit=1200%2C738&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/02\/Screenshot-2023-02-26-at-15.29.29.png?fit=1200%2C738&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/02\/Screenshot-2023-02-26-at-15.29.29.png?fit=1200%2C738&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":260,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/introduction-to-virtualization\/","url_meta":{"origin":1305,"position":4},"title":"Introduction To Virtualization","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"At the beginning, before the dawn of time\u00a0 there was emulation.(overly exaggerated) \u00a0Emulation,\u00a0the virtual machine simulates the complete hardware in software. This allows an operating system for one computer architecture to be run on the architecture that the emulator is written for. Sine all operations are run in software, emulation\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic-2.jpg?fit=940%2C266&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1239,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/tor-browser-exploit-reveals-ip-address-of-some-users\/","url_meta":{"origin":1305,"position":5},"title":"Tor browser exploit reveals IP address of some users","author":"Daniel Draga","date":"November 5, 2017","format":false,"excerpt":"Under certain conditions, the Tor Browser reveals the unveiled IP address of the users.\u00a0Affected are only\u00a0Mac\u00a0and\u00a0Linux\u00a0versions of the Firefox bundle, in daily use, the error should affect only a few people. The Tor project has released an\u00a0emergency update\u00a0for the Linux and Mac versions of the Tor Browser Bundle.\u00a0Under certain circumstances,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1305"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1305\/revisions"}],"predecessor-version":[{"id":1307,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1305\/revisions\/1307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1306"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}