{"id":2360,"date":"2020-01-06T18:39:58","date_gmt":"2020-01-06T13:09:58","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=2360"},"modified":"2022-11-15T16:07:55","modified_gmt":"2022-11-15T10:37:55","slug":"application-sandboxing","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/","title":{"rendered":"Clean up your digital carpet with application sandboxing"},"content":{"rendered":"<p style=\"text-align: left;\">Beaches are my favourite. But it\u2019s been some time now since I visited one. My last visit to Myrtle Beach is a wonderful memory, but I can manage to find myself some sand in my pockets even today. As much as fun it was to play around in the sand, dragging it around is indeed a nuisance. No wonder people \u201cbox\u201d it for their kids to play in.<br \/>\nIn the digital world, you wouldn\u2019t want to drag in any malware and soil your system, right?<br \/>\nEnter Application Sandboxing.<\/p>\n<h2>What\u2019s in the \u201cSandbox\u201d?<\/h2>\n<p>Application sandboxing is all about giving an app the least number of permissions in a system. This is done such that it has all that is necessary to execute its core functions and nothing more. Consider a voice recording app seeking access to the device camera. Hmm&#8230; something fishy right. If the app is sandboxed it cannot access the camera unless permission is granted.<\/p>\n<ul>\n<li>By sandboxing an app, it\u2019s given a contained storage space and memory. The container has everything the app needs to execute its intended function. Thus, the app is caged.<\/li>\n<li>Permissions must be granted by the system, for the app to access anything outside of this container.<\/li>\n<li>The sandbox prevents all system resources, applications, intruders and malware from interacting with the containerized app so there is minimal chance for a security attack.<\/li>\n<li>If the app is compromised by any malicious content, this cage prevents or lessens the effect of a possible attack on the system.<\/li>\n<\/ul>\n<h2>Sandboxes we usually play in<\/h2>\n<p>We have been living and playing in sandboxes for a long time now. Never knew it eh! So, it has kept you safe and sound till now.<br \/>\nSome of the sandboxed content we commonly use are<\/p>\n<ul>\n<li style=\"text-align: left;\"><strong>Web pages and browsers<\/strong>: With internet browsing at its peak, browsers execute millions of lines of website code. Thus, bringing the outside activity into devices. Using a sandbox, the code is made to play around in the sandbox making an attack less likely to succeed. Webpages cannot access your files or your webcam unless exclusive permissions are granted.<\/li>\n<li style=\"text-align: left;\"><strong>Browser Plug-in content<\/strong>: These are the frills and laces you \u201cadd-on\u201d to a web browser. It supports images, videos, animations, like the flash plug-in which allows us to view video and animated content. The plug-ins also run in a sandbox and isolate the actions of the content it views.<\/li>\n<li style=\"text-align: left;\"><strong>PDFs and documents<\/strong>: Adobe Acrobat Reader now runs all the PDFs in a sandbox. Any PDF is considered malicious and is prevented from tampering the rest of your system. Microsoft Office allows its sandbox to be turned on or off to disable macros.<\/li>\n<li style=\"text-align: left;\"><strong>Mobile Applications<\/strong>: Applications in iOS, Android, Windows, and Mac must seek permission to access anything like the device camera, location, etc. The sandbox also prevents the app from interfering in each other\u2019s personal data.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\u00a0<a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/App-Sandbox.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2367\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/App-Sandbox-139x300.jpg\" alt=\"App Sandbox\" width=\"139\" height=\"300\" srcset=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/App-Sandbox-139x300.jpg?format=webp 139w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/App-Sandbox-473x1024.jpg?format=webp 473w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/App-Sandbox-102x220.jpg?format=webp 102w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/App-Sandbox.jpg?format=webp 632w\" sizes=\"auto, (max-width: 139px) 100vw, 139px\" \/><\/a><\/p>\n<h2>Android or Mac or iOS or Windows, Sandbox is everywhere<\/h2>\n<h3>Android<\/h3>\n<ul>\n<li>In Android devices, sandboxing is achieved by leveraging the Unique User ID (UID).<\/li>\n<li>In the Linux kernel, each app has its own UID. Each UID (thus the app) is a separate entity and is prevented from accessing (reading or writing) the data belonging to another app.<\/li>\n<li>An advantage of the sandbox being in the kernel is that the sandbox extends to the OS applications and the native code.<\/li>\n<\/ul>\n<h3>MacOS and iOS<\/h3>\n<ul>\n<li>App sandboxes are built right in <a href=\"https:\/\/developer.apple.com\/app-sandboxing\/\" rel=\"nofollow\"> macOS<\/a> at kernel level. This allows you to define how you want the app to interact with the system and provide it with all that is necessary to perform its intended action and nothing more.<\/li>\n<li>You can grant additional access to the app using interactions like Open and Save dialogues.<\/li>\n<li>In iOS and macOS, apps are sandboxed by making use of <a href=\"https:\/\/developer.apple.com\/library\/archive\/documentation\/Miscellaneous\/Reference\/EntitlementKeyReference\/Chapters\/AboutEntitlements.html\" rel=\"nofollow\">entitlements<\/a>.<\/li>\n<li>An entitlement is basically a permission (usually with a default value that disables the capability) that is managed by Apple.<\/li>\n<li>The app developer sets entitlements to an app thus restricting its functionality. For example, using an entitlement key to allow read access to the user\u2019s Pictures folder automatically restricts the app\u2019s write access.<\/li>\n<li>Since June 2012 sandboxing has been made mandatory for all apps submitted to the Mac app store.<\/li>\n<\/ul>\n<h3>Windows<\/h3>\n<ul>\n<li>Windows UWP apps are sandboxed in a manner like Mac store apps. Analogous to entitlements, UWP apps are designed with <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/uwp\/packaging\/app-capability-declarations\" rel=\"nofollow\">capabilities<\/a>. Capabilities are attached in the app package to allow its access to device features like storage and camera or access music or pictures folder.<\/li>\n<\/ul>\n<h2>The Ah- Yeses!<\/h2>\n<ul>\n<li>Works against Zero-day threats (an unknown or totally new threat). Once the threat behaviour is understood future attacks can be prevented as well. Much like a vaccine!<\/li>\n<li>Cloud-based and on-premise deployment: Cloud-based sandboxes can track the malware even over a period of days. It can also prevent malware from a different region which is otherwise difficult with an on-premise sandbox.<\/li>\n<li>Works well with other security programs like antivirus.<br \/>\nYou must now be thinking of sandboxes to be like Captain America\u2019s shield huh? Absolutely not. It just takes a drizzle to mush it all up.<\/li>\n<\/ul>\n<h2>The Oh- Noes!<\/h2>\n<ul>\n<li><strong>Act as a weak point<\/strong> \u2013 the sandbox itself can act as an attack point for bugs. A weak foundation can bring the whole castle down!<\/li>\n<li><a href=\"https:\/\/www.apriorit.com\/dev-blog\/545-sandbox-evading-malware\" rel=\"nofollow\"><strong>Sandbox evasion<\/strong><\/a>: Sandboxes remain active searching for malware only for a short period of time. Once the time period is over, malware can snoop in.<\/li>\n<li>A sandboxed environment is considerably slow as it runs on limited hardware.<\/li>\n<li>Sandboxed apps are more complex and hence take more time to develop.<\/li>\n<li>The sandbox itself should contain all the files that the application needs to execute.<\/li>\n<li>It restricts developer freedom.<\/li>\n<li>It creates issues between apps that need to interact with each other<\/li>\n<\/ul>\n<h2>Will the sandbox get washed away?<\/h2>\n<ul>\n<li>Cyber turbulence is at its peak and malware are as strong as ever.<\/li>\n<li>The <a href=\"https:\/\/developers.google.com\/web\/updates\/2018\/02\/meltdown-spectre\" rel=\"nofollow\">Meltdown\/Spectre<\/a> vulnerabilities in CPU\u2019s have proven that sandboxes can be ineffective.<br \/>\nCisco researches discovered a trojan called <a href=\"https:\/\/www.virusbulletin.com\/blog\/2018\/04\/gravityrat-malware-takes-your-systems-temperature\/\" rel=\"nofollow\">GravityRAT<\/a>. This uses a temperature check of the CPU to determine the presence of antimalware sandboxes.<\/li>\n<li>But sandboxes have evolved as well.<\/li>\n<\/ul>\n<p>\u201cSmart\u201d sandboxes and AI sandboxes can match the system configurations, drivers and applications more accurately. Thus, they can understand malware behaviour, better. Software containers have developed over the years and are the successors to sandboxes. Since sandbox is used for testing how a file will behave when released to the system, evasion techniques have proven to be quite successful. Containers, on the other hand, do no weighing. It considers all files as potential threats and cages them. <a href=\"https:\/\/docs.oracle.com\/cd\/E37670_01\/E36387\/html\/ol_cj_sec.html\" rel=\"nofollow\">Chroot jails<\/a> in Linux is similar and can limit the directory access.<\/p>\n<h2>Keep your androids safe in a sandbox<\/h2>\n<p>Mobile device management vendors now focus on app sandboxing and containerization by allowing enterprises to configure a Profile owner mode in Android Enterprise, which maintains personal and work apps separate. This OS-level container is supported in Android 5.0 and above devices. The work apps will have a briefcase icon on it. Users can simultaneously use their personal and work apps without having any clash. They can even turn off the work profile temporarily. The applications in the work profile will be fully managed while the personal apps and data are left untouched. This helps draw a clear- cut difference as to what is managed and what is not, by isolating the work apps in an encrypted sandboxed environment. Application management in devices helps to blacklist, whitelist and configure an app to pre-define its behaviour. Hexnode offers you powerful app management features to sandbox your applications, leaving the rest of the device untouched.<\/p>\n<h2>Apples prosper in sandboxes<\/h2>\n<p>Don\u2019t want your employees mixing up their work and personal life? Don\u2019t want apps mixing up data? This can be achieved via the implementation of Managed Open-In for Apple devices. This feature is powered by Apple\u2019s VPP for application distribution. They use a set of policies that restrict data (attachments or documents) from managed sources from being accessed in unmanaged destinations and vice versa. They prevent managed applications from accessing unmanaged contact accounts and unmanaged applications from reading from managed contact accounts. Managed Open-In can also be used as a data loss prevention technique for iOS devices.<\/p>\n<p>Sandboxing alone can never assure you 100% protection. But it sure can act as an additional layer of security when deployed along with protections like anti-virus. In this era of \u201cCyber- insecurity\u201d you better have anything and everything you can possibly lay hands on to protect your device and data. Like they say, \u201cA single twig breaks but a bundle of twigs is strong.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beaches are my favourite. But it\u2019s been some time now since I visited one. My&#8230;<\/p>\n","protected":false},"author":19,"featured_media":3057,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[263],"tags":[5019,886],"class_list":["post-2360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-deep-dives","tag-bring-your-own-device","tag-app-management","tab_group-how-tos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Clean up your digital carpet with application sandboxing<\/title>\n<meta name=\"description\" content=\"Application Sandboxing limits an application&#039;s access to the system resources and data in order to safeguard the system from potential security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Clean up your digital carpet with application sandboxing\" \/>\n<meta property=\"og:description\" content=\"Application Sandboxing limits an application&#039;s access to the system resources and data in order to safeguard the system from potential security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-06T13:09:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-15T10:37:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/23145258\/application-sandboxing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1340\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jayden Traor\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jayden Traor\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/\",\"name\":\"Clean up your digital carpet with application sandboxing\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/application-sandboxing.jpg?format=webp\",\"datePublished\":\"2020-01-06T13:09:58+00:00\",\"dateModified\":\"2022-11-15T10:37:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d\"},\"description\":\"Application Sandboxing limits an application's access to the system resources and data in order to safeguard the system from potential security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/application-sandboxing.jpg?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/application-sandboxing.jpg?format=webp\",\"width\":1340,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Clean up your digital carpet with application sandboxing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d\",\"name\":\"Jayden Traor\u00e9\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g\",\"caption\":\"Jayden Traor\u00e9\"},\"description\":\"Product Evangelist @ Hexnode. Sometimes, I have the feeling I live in a story: a magnificent story written by a mediocre writer living off coffee and technology.\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/melvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Clean up your digital carpet with application sandboxing","description":"Application Sandboxing limits an application's access to the system resources and data in order to safeguard the system from potential security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/","og_locale":"en_US","og_type":"article","og_title":"Clean up your digital carpet with application sandboxing","og_description":"Application Sandboxing limits an application's access to the system resources and data in order to safeguard the system from potential security threats.","og_url":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/","og_site_name":"Hexnode Blogs","article_published_time":"2020-01-06T13:09:58+00:00","article_modified_time":"2022-11-15T10:37:55+00:00","og_image":[{"width":1340,"height":720,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/23145258\/application-sandboxing.jpg","type":"image\/jpeg"}],"author":"Jayden Traor\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jayden Traor\u00e9","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/","url":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/","name":"Clean up your digital carpet with application sandboxing","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/application-sandboxing.jpg?format=webp","datePublished":"2020-01-06T13:09:58+00:00","dateModified":"2022-11-15T10:37:55+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d"},"description":"Application Sandboxing limits an application's access to the system resources and data in order to safeguard the system from potential security threats.","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/application-sandboxing.jpg?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/01\/application-sandboxing.jpg?format=webp","width":1340,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/application-sandboxing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Clean up your digital carpet with application sandboxing"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d","name":"Jayden Traor\u00e9","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g","caption":"Jayden Traor\u00e9"},"description":"Product Evangelist @ Hexnode. Sometimes, I have the feeling I live in a story: a magnificent story written by a mediocre writer living off coffee and technology.","url":"https:\/\/www.hexnode.com\/blogs\/author\/melvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/2360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=2360"}],"version-history":[{"count":4,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/2360\/revisions"}],"predecessor-version":[{"id":15532,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/2360\/revisions\/15532"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/3057"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=2360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=2360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=2360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}