{"id":62645,"date":"2016-08-15T00:00:00","date_gmt":"2016-08-15T00:00:00","guid":{"rendered":"http:\/\/blog.mozilla.org\/foxtail\/2016\/08\/15\/six-times-encryption-made-it-to-the-movies\/"},"modified":"2016-08-15T00:00:00","modified_gmt":"2016-08-15T00:00:00","slug":"six-times-encryption-made-it-to-the-movies","status":"publish","type":"post","link":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/","title":{"rendered":"Six Times Encryption Made It to the Movies"},"content":{"rendered":"<blockquote><p><em><u>encrypt<\/u>\u00a0(verb) en\u00b7crypt in-<\/em><em>\u02c8<\/em><em>kript, en-\u00a0: to change (information) from one form to another, especially to hide its\u00a0meaning<\/em><\/p><\/blockquote>\n<p>Since the\u00a0<a href=\"https:\/\/blog.mozilla.org\/blog\/2016\/03\/03\/standing-up-with-apple-to-fight-for-everyones-security\/\">Apple v FBI case<\/a>\u00a0broke in early 2016, encryption has become a new topic of conversation and mainstream concern like never before\u200a\u2014\u200aor so you thought.<\/p>\n<p>Encryption has actually been around\u00a0<a href=\"https:\/\/medium.com\/encryption-matters\/encryption-through-the-ages-a-history-c9bea239247a#.7u7m8ozhc\">for centuries<\/a>, at least as far back as the Caesar Cipher and as recent as today\u2019s chipped credit cards. That fact got us thinking about how encryption evokes a certain level of intrigue and public fascination, showing up not just in journalism but in a range of movies and popular entertainment, as well.<\/p>\n<p>Thus, we offer a list of six movies to consider for your viewing pleasure.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>Sneakers\u00a0(1992)<\/strong><\/h2>\n<h4><strong>\u201cIt\u2019s all about the information.\u201d<\/strong><\/h4>\n<p><em>Why see it: At ~41:40, Martin gets out of a car in front of Mozilla\u2019s San Francisco Embarcadero office and meets the NSA agents at the cafe next door.<\/em><\/p>\n<p><iframe loading=\"lazy\" title=\"Ben Kingsley in &quot;Sneakers&quot;\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/oKprr3tEBew?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>With its light, fast-paced script, humorous overtones and emotionally-manipulative soundtrack, Sneakers is a classic 1990s flick, and by that we mean,\u00a0<em>they don\u2019t make movies like they used to<\/em>.<\/p>\n<p>The story involves a group of security experts, the NSA and a powerful code-breaking box that supposedly holds the power to unlock any computer\u2019s encryption technology. Reviews were mixed in the day, but\u00a0<em>Sneakers<\/em>\u00a0has still has a following today. In fact, in 2012,\u00a0<a href=\"http:\/\/www.slate.com\/articles\/arts\/culturebox\/features\/2012\/sneakers_20th_anniversary\/robert_redford_sidney_poitier_and_ben_kingsley_made_one_very_prescient_movie_.html\">Slate paid tribute to the film<\/a>, noting that its greatest accomplishment was its prescience:<\/p>\n<p style=\"padding-left: 30px;\"><em>Though much of its technology looks hopelessly dated 20 years on<\/em><em>\u200a<\/em><em>\u2014<\/em><em>\u200a<\/em><em>motion sensors! voice activation! pleated pants!<\/em><em>\u200a<\/em><em>\u2014<\/em><em>\u200a<\/em><em>the movie was spot-on in its prediction of how a computer-connected world would change the nature, and wages, of power. As Cosmo tells Marty: \u201cIt\u2019s not about who has the most bullets, it\u2019s about who controls the information: What we see and hear, how we work, what we think. It\u2019s all about the\u00a0<\/em>information<em>.\u201d<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em>That may seem like an obvious statement in 2012, but it was written<\/em><em>\u200a<\/em><em>\u2014<\/em><em>\u200a<\/em><em>by Robinson, and by\u00a0War Games-screenwriters Lawrence Lasker and Walter F. Parkes<\/em><em>\u200a<\/em><em>\u2014<\/em><em>\u200a<\/em><em>before Google, before Facebook, before smartphones, before any of us had email. And it\u2019s not just that the screenwriters recognized that information would be the coin of the digital realm. They had a dark vision in which governments and private enterprise alike would go to law-breaking lengths to access that information. I remember re-watching\u00a0<\/em>Sneakers\u00a0<em>around the time it was revealed that the NSA had been secretly (and\u00a0<a href=\"http:\/\/www.nytimes.com\/2010\/04\/01\/us\/01nsa.html\">illegally<\/a>) wiretapping American citizens. Marty may have palmed the circuit board from the little black box at the end of\u00a0<\/em>Sneakers<em>, but the NSA found a way to spy on us anyway.<\/em><\/p>\n<p>Yep. Sneakers is worth a watch.<\/p>\n<p><strong>Encryption level: Ahead of its time.<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2><strong>The Da Vinci Code\u00a0(2006)<\/strong><\/h2>\n<h4><strong>\u201cIt\u2019s a cryptex. Da Vinci\u2019s design. [My grandfather] made me one for my birthday once.\u201d<br \/>\n\u201cMy grandfather gave me a\u00a0wagon.\u201d<\/strong><\/h4>\n<p><em>Why see it: Learn art history and solve the mystery. The main character returns this summer in Dan Brown\u2019s Inferno.<\/em><\/p>\n<p><iframe loading=\"lazy\" title=\"The Da Vinci Code (3\/8) Movie CLIP - So Dark the Con of Man (2006) HD\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/F_HKGZRUroE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Based on the best-selling novel by Dan Brown,\u00a0<em>The Da Vinci Code <\/em>film opens with a bang, literally, when the Louvre\u2019s curator is shot after-hours by an assailant in the museum. Before succumbing to his injuries, the curator arranges his body to resemble Da Vinci\u2019s Vitruvian Man and writes a coded message on the floor in his own blood. What does it all mean?! Enter our protagonists, an American academic symbologist and French police cryptographer who join forces to embark on a puzzle-breaking \u201ctreasure hunt\u201d across Paris and London to crack various encrypted messages and solve the crime.<\/p>\n<p><strong>Encryption level: Less elusive than the Holy Grail.<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2><strong>Girl with the Dragon Tattoo\u00a0(2011)<\/strong><\/h2>\n<h4><strong>\u201cWhy do you need such an expensive computer?\u201d<\/strong><\/h4>\n<p><em>Why see it: As \u201cresearchers\u201d go, Salander is a captivating character.<\/em><\/p>\n<p>Like many films that depict cryptology,\u00a0<em>The Girl with the Dragon Tattoo<\/em>\u00a0is yet another mystery-thriller. \u201cThe girl,\u201d Lisbeth Salander, is one of those characters you don\u2019t soon forget after meeting her. She\u2019s a dark, combat boot-wearing computer \u201cresearcher\u201d wound so tightly you imagine she might explode upon touch. Possessing a near photographic memory, Salander holds a cold ability to collect and store information for later use. Though Salander wields her technical skills masterfully throughout the film, Hollywood still makes some blunders.\u00a0<a href=\"http:\/\/www.imdb.com\/title\/tt1132620\/goofs\">According to IMDB<\/a>, the movie flubs the scene when Salander is sending an encrypted email, the screen shows the message\u00a0<em>decrypting<\/em>\u00a0not\u00a0<em>encrypting<\/em>. Maybe you\u2019ll spot a few more. Also, be forewarned that the film contains graphic scenes of sexual violence.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=gEW1hgCmOiE\">https:\/\/www.youtube.com\/watch?v=gEW1hgCmOiE<\/a><\/p>\n<p><strong>Encryption level: Better than the Swedish version.<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2><strong>Skyfall\u00a0(2012)<\/strong><\/h2>\n<h4><strong>\u201cHe\u2019s using polymorphic engine to mutate the\u00a0code.\u201d<\/strong><\/h4>\n<p><em>Why see it: Bond. James Bond. And we\u2019re introduced to a new Q, who ushers in a youthful, modern take on the enduring gadget master.<\/em><\/p>\n<p>Skyfall, the 23rd James Bond film, features a villain who uses computers as his weapon of choice to take down MI6. The movie presents technology in a range of ways, from a stolen hard drive containing Important Top Secret\u2122 files on it (plausible) to M falling for a phishing trick (eye roll) to dastardly polymorphic encryption techniques.<\/p>\n<p>Wait, what?<\/p>\n<p>That\u2019s right.\u00a0<em>Polymorphic encryption.<\/em><\/p>\n<p>Suffice it to say, if you\u2019re a fan of Bond movies and you enjoy smirking at the ways technology, including encryption, is <a href=\"http:\/\/erickolb.me\/post\/36695497447\/skyfall-think-on-your-technology-sins\"><u>misrepresented by Hollywood<\/u><\/a>, Skyfall is for you.<\/p>\n<p><iframe loading=\"lazy\" title=\"Skyfall - &quot;He Hacked Us&quot; Scene\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/aApTVqeGJMw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><strong>Encryption level: Quartermaster approved.<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2><strong>The Imitation Game\u00a0(2014)<\/strong><\/h2>\n<h4><strong>\u201cWe\u2019re going to break an unbreakable Nazi code and win the\u00a0war.\u201d<\/strong><\/h4>\n<p><em>Why see it: Brilliance, courage, persecution, respect.<\/em><\/p>\n<p>You\u2019ve probably heard of Alan Turing, but if you don\u2019t know why he\u2019s been dubbed the \u201cFather of Computer Science,\u201d\u00a0<em>The Imitation Game<\/em>\u00a0will get you up to speed in 114 minutes. This historical drama captures the essence of Turing\u2019s life, including his time at Bletchley Park during World War II, where he worked for the British government to crack the Enigma code, the powerful encryption method the Germans used to mask their communications. With 159,000,000,000,000,000,000 (that\u2019s 18 zeros) possible keys and being reset nightly by the Germans, Enigma was considered humanly unbreakable. History is grateful that Alan Turing was up to the task:<\/p>\n<p><iframe loading=\"lazy\" title=\"THE IMITATION GAME - Alan Turing Interview at Bletchley Park - Film Clip\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/NlYtYJcY0R0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>We can only imagine where Turing\u2019s brain would have taken him\u200a\u2014\u200aand us\u200a\u2014\u200ahad he lived longer.<\/p>\n<p><strong>Encryption level: It\u2019s the bombe.<\/strong><\/p>\n<p>\u00a0<\/p>\n<h2><strong>A Christmas Story\u00a0(1983)<\/strong><\/h2>\n<h4><strong>\u201cA crummy commercial?\u201d<\/strong><\/h4>\n<p><em>Why see it: It\u2019ll set you on a hunt through the depths of your closet to find that ratty old shoe box with the decoder pins, rings and wheels and secret notes from your own childhood.<\/em><\/p>\n<p>We\u2019ll close out our list with a movie that features one of our favorite encryption references ever,\u00a0<em>A Christmas Story<\/em>. The only thing little Ralphie yearns for more than a Red Ryder BB gun is a Little Orphan Annie Secret Society Decoder Pin. Maybe it\u2019s the build-up as Ralphie anxiously awaits delivery of his decoder pin in the mail. Or maybe it\u2019s feeling the tension rise as his family pounds on Ralphie\u2019s office door where he has locked himself to privately decode his first secret message. Or perhaps it\u2019s the utter letdown after Ralphie reads the decrypted message.<\/p>\n<p><iframe loading=\"lazy\" title=\"Be sure to drink your Ovaltine\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/zdA__2tKoIU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>In any case,\u00a0<em>A Christmas Story<\/em>\u00a0reminds us that the desire to send private messages starts in childhood and never quite goes away.<\/p>\n<p><strong>Encryption level: You\u2019ll shoot your eye out.<\/strong><\/p>\n<p>\u00a0<\/p>\n<p>Do these movies always get encryption right? Some do, some don\u2019t. Nonetheless, give yourself permission for a couple hours of entertainment while considering that our personal privacy isn\u2019t something we should leave to fiction.<\/p>\n<p>Oh, and if you\u2019re intrigued and want to learn more about how\u00a0<em>real <\/em>encryption works, why it\u2019s essential to a strong Web, and why it\u2019s worth protecting,\u00a0<a href=\"https:\/\/advocacy.mozilla.org\/en-US\/encrypt\/codemoji\/2\">here\u2019s the website (with more videos!) for you<\/a>.<\/p>\n<p><strong>Know of a movie that you\u2019d put on the list? We\u2019d love to hear about it in the comments.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>encrypt\u00a0(verb) en\u00b7crypt in-\u02c8kript, en-\u00a0: to change (information) from one form to another, especially to hide its\u00a0meaning Since the\u00a0Apple v FBI case\u00a0broke in early 2016, encryption has become a new topic of conversation and mainstream concern like never before\u200a\u2014\u200aor so you thought. Encryption has actually been around\u00a0for centuries, at least as far back as the Caesar [&hellip;]<\/p>\n","protected":false},"author":727,"featured_media":20020,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,289374],"tags":[],"coauthors":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Six Times Encryption Made It to the Movies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/\",\"url\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/\",\"name\":\"Six Times Encryption Made It to the Movies\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-U9MM2AJ7tlXR_1BDvEcdoQ.jpeg\",\"datePublished\":\"2016-08-15T00:00:00+00:00\",\"dateModified\":\"2016-08-15T00:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#primaryimage\",\"url\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-U9MM2AJ7tlXR_1BDvEcdoQ.jpeg\",\"contentUrl\":\"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-U9MM2AJ7tlXR_1BDvEcdoQ.jpeg\",\"width\":1400,\"height\":908,\"caption\":\"Image source: imdb.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.mozilla.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Six Times Encryption Made It to the Movies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#website\",\"url\":\"https:\/\/blog.mozilla.org\/en\/\",\"name\":\"The Mozilla Blog\",\"description\":\"News and Updates about Mozilla\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c\",\"name\":\"M.J. Kelly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/70718b02fa9f11d88288b937f1da2ac1\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g\",\"caption\":\"M.J. Kelly\"},\"description\":\"Mozilla Communications\",\"url\":\"https:\/\/blog.mozilla.org\/en\/author\/mjkellymozilla-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six Times Encryption Made It to the Movies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/","url":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/","name":"Six Times Encryption Made It to the Movies","isPartOf":{"@id":"https:\/\/blog.mozilla.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#primaryimage"},"image":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-U9MM2AJ7tlXR_1BDvEcdoQ.jpeg","datePublished":"2016-08-15T00:00:00+00:00","dateModified":"2016-08-15T00:00:00+00:00","author":{"@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c"},"breadcrumb":{"@id":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#primaryimage","url":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-U9MM2AJ7tlXR_1BDvEcdoQ.jpeg","contentUrl":"https:\/\/blog.mozilla.org\/wp-content\/blogs.dir\/278\/files\/2016\/09\/1-U9MM2AJ7tlXR_1BDvEcdoQ.jpeg","width":1400,"height":908,"caption":"Image source: imdb.com"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mozilla.org\/en\/firefox\/six-times-encryption-made-it-to-the-movies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mozilla.org\/en\/"},{"@type":"ListItem","position":2,"name":"Six Times Encryption Made It to the Movies"}]},{"@type":"WebSite","@id":"https:\/\/blog.mozilla.org\/en\/#website","url":"https:\/\/blog.mozilla.org\/en\/","name":"The Mozilla Blog","description":"News and Updates about Mozilla","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mozilla.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/5c987afc4f606be73692d2acfdd1316c","name":"M.J. Kelly","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mozilla.org\/en\/#\/schema\/person\/image\/70718b02fa9f11d88288b937f1da2ac1","url":"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d61ff6a9eb6dd324df20cb773e6c416e?s=96&d=mm&r=g","caption":"M.J. Kelly"},"description":"Mozilla Communications","url":"https:\/\/blog.mozilla.org\/en\/author\/mjkellymozilla-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62645"}],"collection":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/users\/727"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/comments?post=62645"}],"version-history":[{"count":0,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/posts\/62645\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media\/20020"}],"wp:attachment":[{"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/media?parent=62645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/categories?post=62645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/tags?post=62645"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mozilla.org\/en\/wp-json\/wp\/v2\/coauthors?post=62645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}