{"id":7636,"date":"2016-09-08T14:05:52","date_gmt":"2016-09-08T18:05:52","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=7636"},"modified":"2019-11-22T10:09:28","modified_gmt":"2019-11-22T10:09:28","slug":"bitcoin-easy-explanation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/bitcoin-easy-explanation\/7636\/","title":{"rendered":"What is blockchain technology and how it works"},"content":{"rendered":"<p>Bitcoin, and its fundamental technology <b>blockchain<\/b>, have been popping up in the news plenty over the past few years. However, discussion about them is typically a bit high level \u2014 or, OK, gibberish \u2014 leaving the average person with the vague impression that something cool is happening with currency, but very little in the way of actual knowledge or understanding.<\/p>\n<p>The technology is indeed elegant, but it is not that difficult to understand. We\u2019ll take a shot at explaining in a straightforward way how blockchain works, avoiding geeky jargon as much as possible. <\/p>\n<h3>Just two tech concepts\u2026<\/h3>\n<h3>How <a href=\"https:\/\/en.wikipedia.org\/wiki\/digital_signature\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">digital signatures<\/a> work<\/h3>\n<p>Anyone can generate a <i>digital name<\/i> and <i>digital signature<\/i>. Those aren\u2019t like your typed name and handwritten signature; they are a public key and a private key, respectively. Having these digital assets enables the following scenario:<\/p>\n<ol>\n<li>A person can write messages, sign them digitally, and publish online.<\/li>\n<li>The world can see that the message is genuine \u2014 people can identify the person\u2019s digital name thanks to the digital signature.<\/li>\n<li>No one can forge a signed message.\n<\/li>\n<li>A person may generate numerous name-and-signature pairs (think of them as stage names) for various purposes.<\/li><\/ol>\n\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">What is All this Business about <a href=\"https:\/\/twitter.com\/hashtag\/Bitcoin?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Bitcoin<\/a>? <a href=\"http:\/\/t.co\/scbRcfPmoX\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/scbRcfPmoX<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/onlinethreats?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#onlinethreats<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/398910721531977728?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 8, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>How hashing works<\/h3>\n<p>Let\u2019s say I write a message (\u201cHello\u201d) and want to send it to my friend. But I need to make sure it reaches the intended recipient unaltered. How would I do that? The easiest way would be to ask my friend to send the whole message back to me so I can compare the two messages and see if they match. Many people use the same approach when dictating some numbers or spelling e-mail addresses over the phone.<\/p>\n<p>However, the message might reach my friend perfectly but \u201cbreak\u201d on its way back, and in that case we would not be able to ensure its integrity. Moreover, the message might be very long. What if the message contains a high-def video? It makes no sense to send back all those gigabytes of data just to verify they were received properly, and that\u2019s why another approach is used to ensure message fidelity. It\u2019s called <i>hashing<\/i>.<\/p>\n<p>Let\u2019s create a numeric representation of \u201cHello.\u201d Here\u2019s one way to do that:<\/p>\n<p>Let each letter be associated with a sequential number (i.e., a=1, b=2, z=26), so Hello would read 8 5 12 12 15.<\/p>\n<p>Multiply the numbers to get 86400. That\u2019s how we get the simplest hash.<\/p>\n<p>After I have sent a primary message to my friend, I send the hash so that they can check whether the received message matches the intended one.<\/p>\n<p>Now, what if the message was altered on its way, and now it reads \u201cHallo\u201d? Well, that would change its hash: 8*1*12*12*15=17280. My friend would expect to get 86400, so when they get 17280, the difference would alert us both that something went wrong.<\/p>\n<p>We should note here that the hash itself could be altered or otherwise compromised. It does not serve to protect the integrity of the message (a signature does that); it is used to simplify and speed up the process of integrity checking. Also, in actual use, people do not encode their hashes and send them to their friends as separate messages; their computers handle the entire process in a way that is invisible to the users.<\/p>\n<p>That simple hash method would not catch swapped letters in the message \u2014 it was just an example. In the real world, we use much more complex algorithms. <\/p>\n<p>Creating a message with a \u201ccryptographically strong\u201d matching hash becomes an extremely long process. Take, for example, the popular <a href=\"https:\/\/en.wikipedia.org\/wiki\/sha-1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">SHA-1<\/a> algorithm (which is not as strong as it was designed to be, but that\u2019s another story). A hash for \u201cHello\u201d would look like this:<\/p>\n<p><strong>f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0<\/strong><\/p>\n<p>For \u201cHallo,\u201d the hash would look like this:<\/p>\n<p><strong>59d9a6df06b9f610f7db8e036896ed03662d168f<\/strong><\/p>\n<p>Not much in common, is there? Well, that\u2019s how it was meant to be \u2014 it\u2019s a code.<\/p>\n<h3>Enabling virtual money<\/h3>\n<p>OK, that\u2019s the hard part done. So, what cool things can we do with these technologies?<\/p>\n<p>Imagine there are 30 kids in a classroom, and they would like to use their own play money, which should be entirely virtual (i.e., mere numbers written on paper or stored on the Internet).<\/p>\n<p>To do this, the kids write the values of their initial cash possessions on the chalkboard, and then write down how much money each of them gave to another person. They write down each \u201ctransaction\u201d in their genuine handwriting and sign it with a signature, so no one can mess with transactions while everyone is out during the break. This approach works perfectly until a teacher comes and wipes it all off the board, claiming control over the cash flows because he or she has power and, say, wants to prevent children from using the system for buying drugs from each other.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Bitcoin?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Bitcoin<\/a> Safety Guide by <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Kaspersky<\/a> Lab <a href=\"http:\/\/t.co\/RjwzqAwPXR\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/RjwzqAwPXR<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/404271120578535424?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 23, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As a result of these unfavorable conditions, kids turn to keeping their financial records in notepads. Each of them keeps a notepad under their desk and constantly updates the record with transactions. Of course, they cannot shout about their purchases during class, so they use paper notes (aka the Internet). So, at first sight, this is cryptocurrency in action!<\/p>\n<h3>Problems<\/h3>\n<h3>Bundling transactions into pages<\/h3>\n<p>Now there are 30 notes circulating in the classroom; how would one know that each of students copied the contents of all of the paper notes into their notepad? Which paper notes were copied by all of the students and can be disposed of? How would one know if Billy has 50 coins to pay to Johnny and has not paid them to someone else without Johnny\u2019s knowledge?<\/p>\n<p>There is a solution to those problems: Children need to exchange not only short notes containing lines of transactions, but entire pages. When someone has accumulated a lot of transactions, they copy accurately all of the lines, calculate the hash for the previous page, copy it on the top of the new page and distribute the new page to all of the students in the class.<\/p>\n<p>On receiving the page, Johnny checks it for consistency: All lines should be written in the same handwriting, the page should contain a new number, and the hash for the previous page should match the hash written on the new page. And one more thing: Each contributor should have as much money as they want to pay. To ensure that, Johnny needs to read through the entire transaction journal and count the money. Sounds quite cumbersome, yet a computer will manage the task with ease.<\/p>\n<p>So, if the numbers add up right, Johnny then accurately writes down a new page in his journal and accepts the transactions. Separate lines\/transactions that are now included in the page needn\u2019t be passed around the class; they can be disposed of, and the new page passed around instead.<\/p>\n<p>If something is wrong (someone does not have enough money for a transaction, or the page number seems odd, or hashes don\u2019t match), Johnny says, \u201cThat\u2019s fishy,\u201d get rids of the entire page, and then goes back to business as usual.<\/p>\n<p>A collection of numbered pages (blocks) is, in essence, <i>blockchain<\/i>. It\u2019s very simple, and no magic is involved.<\/p>\n<h3>Graphomania<\/h3>\n<p>If this process is not controlled by any additional rules, each student would start their own version of page #123. As a result, there would be 30 versions of the transaction journal circulating in the class. How would one know which one is correct? A certain routine makes that possible: The page is created once every 10 minutes, so it can be distributed to the entire class, and the writer responsible for keeping the journal is chosen randomly.<\/p>\n<p>With Bitcoin, they decided to deal with that in the following way. Students have to do some useful task \u2014 like solving randomly picked math problems from the textbook. Whoever is the first to solve the problem collects all of the notes and starts to create a new page. While others continue solving the problem, that star student\u2019s page is distributed among the class, is accepted by everyone, and then the class would start solving another math problem.<\/p>\n<p>It\u2019s not an issue if the pages are written down by a sole A student; it\u2019s much more important it\u2019s someone with high speed of execution. And if there are many A students in a class, problems are solved faster, and the group can upgrade to the next chapter of the textbook.<\/p>\n<p>However, if only Karl, a straight A student, is always entrusted with the task of compiling pages, he might be in power to deny Johnny any chances to pass virtual money to anyone. Anyone willing to do so should be a real badass student \u2014 she or he should possess computing capacity exceeding half of aggregated computing capacity of all Bitcoin users (which is yielded by millions of computers all over the world). So, should Karl be capable of that (meaning he invested that much in computing capacity), petty cheating would not make any sense.<\/p>\n<p>There is another peculiarity. An A student also writes down the solution to the math problem on the page (mind you, this math problem is not really random but relevant to the page itself). It\u2019s essential to prevent one from forging all pages from 123 to the current one even in a year\u2019s time. A cheater otherwise would have to solve a <i>huge<\/i> number of problems.<\/p>\n<h3>Benefit<\/h3>\n<p>With the aforementioned approach, our journal is evenly incremented by new, correctly filled pages.<\/p>\n<ol>\n<li>This process does not depend on the number of participants.<\/li>\n<li>This process is decentralized. It cannot be shut down or forged \u2014 any contributor to the system can check the integrity of all the pages any time they want.<\/li>\n<li>This process is anonymous, provided a digital name cannot be traced to the real one. Any Johnny can prove the wallet pertaining to a particular digital last name belongs to him \u2014 if he has a corresponding digital signature, he can use the wallet. But it would be extremely challenging to prove that the wallet belongs to Johnny in real life if Johnny himself doesn\u2019t want it to be proved.<\/li>\n<li>No fee is charged. However, you can pay an A student to ensure your transaction is copied to the page in fast-track mode.<\/li>\n<li>Once done, a transaction cannot be reversed \u2014 meaning no one can cross out the line stating Billy has passed money to Johnny (as each page relates to the previous one). Once one page is altered (even with consent from other participants), the rest of the pages must be altered too, which means many, very many math problems should be solved. When in doubt, participants would trust the longest chain of pages.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Why are tech giants betting on <a href=\"https:\/\/twitter.com\/hashtag\/BitCoin?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BitCoin<\/a>? \u2013 <a href=\"http:\/\/t.co\/xcGx5EOPFC\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/xcGx5EOPFC<\/a> <a href=\"http:\/\/t.co\/MImFiCndcD\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/MImFiCndcD<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/585121100784398337?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 6, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>If I bribe more than a half of the class (preferably, A students), I can spin the students off into a separate classroom and start an alternative history in which I never passed my money to anyone. After that, I can return to the former class and present them a longer journal of transactions. This trick is the essence of the so-called <a href=\"http:\/\/bits.media\/news\/eba-schitaet-chto-ataka-51-sama-bolshaya-problema-bitcoin-i-bolshe-ne-doveryaet-bitcoin-foundation\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">51 per cent attack<\/a> (though we have already discussed why it would be very challenging in real life, as we showed in the example of Karl, the straight A \u201cbadass\u201d).<\/p>\n<h3>Where the money comes from<\/h3>\n<p>Initially, all bitcoins could have been distributed among lucky ones who compiled the very first page. But that would have been both unfair and pointless. To get more people involved in the system, the founders agreed to distribute money incrementally: The person who solves a problem and starts a new page would put a line at the top saying: \u201cCredit me with 50 coins out of nowhere.\u201d<\/p>\n<p>Also, everyone agrees the page is correct if the amount is exactly 50, and that in a couple of years 50 will become 25, and so on. As a result, people grow their assets, but the total amount of coins is limited: There can be no more than 21 million bitcoins (as of today, about 15 million have been \u201cemitted\u201d).<\/p>\n<p>Thanks to this principle, many people wanted to join the project as early birds and earn some money by dint of being the first \u2014 later, the money would be distributed in smaller portions and to more participants. Also, more and more people are working really hard to nail those math problems as fast as possible.<\/p>\n<p>So, now a lot of people possess of a lot of cryptocurrency. And now is when we announce that the cryptocurrency is the stock of the new Money Of The Future, Inc., and start trading it on the stock exchange for real money. The cryptocurrency is sold at a market price which starts to grow: Many want to get their hands on the money of the future. For many people, the most favorable option would be to purchase the cryptocurrency, now that it\u2019s given away in lots of 25 just once every 10 minutes, and also getting it that way means you have to solve some math problems \u2026 yes, it\u2019s easier to purchase than to mine.<\/p>\n<p>Then online merchants realize that the coins can be exchanged for real money at the stock exchange, and they start to accept cryptocurrency \u2014 considering it constantly grows in price, that\u2019s a wise move.<\/p>\n<h3>Some criticism<\/h3>\n<p>Now that readers are up to speed with the concept of Bitcoin, I\u2019ll get a bit biased about it.<\/p>\n<p>1. Bitcoins <i>are<\/i> a real innovation. A <a href=\"https:\/\/en.wikipedia.org\/wiki\/satoshi_nakamoto\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">mysterious author<\/a> (or an even more mysterious group of authors) did quite well right away, at the first shot, and their idea is still working.<\/p>\n<p>2. Bitcoins are pure gold for various illegal deeds. Weapons and drugs trading, bribery, and extortion all become easy to manage because transactions are very hard to trace and impossible to shut down. In the offline world, people would just pay in cash in such cases, but online, traditional payment systems are controlled and not anonymous \u2014 hence the value of Bitcoin.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Many people think that <a href=\"https:\/\/twitter.com\/hashtag\/Bitcoin?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Bitcoin<\/a> and other <a href=\"https:\/\/twitter.com\/hashtag\/cryptocurrency?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cryptocurrency<\/a> are made for criminals. It's really not the case <a href=\"https:\/\/twitter.com\/hashtag\/klcsw?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#klcsw<\/a> <a href=\"http:\/\/t.co\/B318zHv69t\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/B318zHv69t<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/538317805721255936?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 28, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>3. For legal deeds, decentralization and anonymity are useless and even harmful. We have been using Visa\/MasterCard, bank transfers, and PayPal\/WebMoney for ages. These systems have their flaws but also useful features:<\/p>\n<p>a. We pay fees (especially when sending a payment that crosses borders), but we get a valuable service.<\/p>\n<p>b. The transfers take some time, but they are checked and can be revoked.<\/p>\n<p>Bitcoin is faster and cheaper, but to enjoy its benefits, we have to burn an awful amount of electricity, and duplicate information over and over. If we decided to hand over those tasks to, say, PayPal, it would not be any worse.<\/p>\n<p>4. People like bitcoins because they constantly grow in price. It\u2019s like a Ponzi investment producing more and more bubbles. People won\u2019t completely lose interest in the scheme, and the more willing buyers there are, the greater the demand. That\u2019s why those who already bought their share of coins actively promote \u201cthe money of the future\u201d \u2014 to stir up interest and thus increase the price. Demand is clearly surpassing supply, which shrinks over time.<\/p>\n<p>5. People dislike bitcoins because they constantly grow in price. Traditional economy is regulated by a central bank, which ensures the volume of available money corresponds to the volume of goods and services, making the latter become a bit cheaper over time. As for bitcoins, this process is distorted: Bitcoins are continually and abruptly growing in price, which means it\u2019s unprofitable to spend them on goods; better to spend real currency and leave the bitcoins for later (or, likely, forever).<\/p>\n<p>6. Why regulators don\u2019t like Bitcoin.<\/p>\n<p>a. It\u2019s a Ponzi scheme. If the people of one country rushed to buy out bitcoins and then the bubble bursts (as it does every couple of years), it would mark the start of a crisis. That\u2019s why Ponzi schemes are out of bounds in most countries.<\/p>\n<p>b. Bitcoin is associated with drugs, tax avoidance, murky incomes, and terrorism \u2014 precisely due to the absence of control. Regulators therefore ban cryptocurrencies and urge people to use the traditional tools that are widely available everywhere.<\/p>\n<p>7. As for using blockchain in areas beyond exchange, the majority of projects that involve blockchain manage the same tasks in a centralized manner. They are able to do so by using one or more computing hubs, which come a lot cheaper in terms of computing power and efficiency. In the aforementioned chalkboard example, it\u2019s obvious that writing transactions on the board is much easier than doing the same discreetly, in notepads under a desk. But, of course, that\u2019s true if there\u2019s no overbearing teacher to suddenly erase the chalkboard.<\/p>\n<p>That\u2019s it. Now you are more familiar with Bitcoin and blockchain that the majority of the planet. Feels good to be so smart, doesn\u2019t it?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.<\/p>\n","protected":false},"author":669,"featured_media":7637,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[374,956,573,1609,993],"class_list":{"0":"post-7636","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bitcoin","9":"tag-blockchain","10":"tag-cryptography","11":"tag-easy-explanation","12":"tag-technologies"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bitcoin-easy-explanation\/7636\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/bitcoin-easy-explanation\/7617\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/bitcoin-easy-explanation\/7648\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bitcoin-easy-explanation\/9071\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bitcoin-easy-explanation\/8922\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bitcoin-easy-explanation\/12668\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bitcoin-easy-explanation\/12915\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bitcoin-easy-explanation\/8668\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/bitcoin-easy-explanation\/12567\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/bitcoin-easy-explanation\/12668\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bitcoin-easy-explanation\/12915\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bitcoin-easy-explanation\/12915\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/bitcoin\/","name":"bitcoin"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/669"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=7636"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7636\/revisions"}],"predecessor-version":[{"id":17648,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7636\/revisions\/17648"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/7637"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=7636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=7636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=7636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}