{"id":6036,"date":"2015-10-10T15:37:00","date_gmt":"2015-10-10T14:37:00","guid":{"rendered":"https:\/\/usersearch.org\/updates\/?p=6036"},"modified":"2022-07-24T15:48:54","modified_gmt":"2022-07-24T14:48:54","slug":"the-ultimate-guide-to-protecting-your-online-identity","status":"publish","type":"post","link":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity","title":{"rendered":"The Ultimate Guide To Protecting Your Online Identity"},"content":{"rendered":"\n<p>With social media penetrating all aspects of our lives, keeping your data secure and private becomes quite challenging. eBay, Evernote, Adobe, Court Ventures, the US Military, and now notorious Ashley Madison are just a few companies that failed to keep customers\u2019 databases safe.<\/p>\n\n\n\n<p>Even if you think you are browsing the web privacy-aware, you may be somewhat surprised by the amount of your private data listed publicly on the Internet. Just launch a quick search with User Search \u2013 a deep web engine that helps you locate places where your data like email, mobile phone, and more is publicly available. Found some personal records where they are not supposed to be? This tool allows you to identify website\/company owners through their IP address to contact them directly or even make a DMCA claim. It\u2019s a convenient option when it comes to social media squatting.<\/p>\n\n\n\n<p>If you are a public persona \u2013 a journalist, entrepreneur, business owner, or a significant niche influencer; protecting your online identity and personal data should become your number one concern.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-secure-your-social-media\"><strong>Secure Your Social Media<\/strong><\/h3>\n\n\n\n<p>Though Facebook now forces users to sign up with their real names only \u2013 a<a href=\"http:\/\/thinkprogress.org\/economy\/2015\/07\/04\/3676529\/truth-behind-facebooks-real-name-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\"> policy found somewhat controversial<\/a> by many users, you can still omit to list essential data like your phone number, address, family connections, and more. Those tiny bits of personal records are enough for a skilled hacker to break into your online storage account or track your credit card data.<\/p>\n\n\n\n<p>On your profiles, minimize the details in the \u201cAbout Me\u201d section and stay selective about shooting updates on your location with geotags and hitting the \u201clike\u201d button too frequently.<\/p>\n\n\n\n<p>Change your privacy settings to \u201cFriends Only\u201d for all the content you share, and avoid connecting with people you do not know in person. Additionally, go to Settings -> Privacy and make unique adjustments when getting friend requests or finding your profile through email or phone. Also, disable other search engines from linking to your profile if you prefer not to have your profile listed in Google Search results.<\/p>\n\n\n\n<p>Third-party apps can be a significant hazard regarding personal information security \u2013 including games, quizzes, online polls, and other apps that request access to certain information when authenticating through social media. \u00a0Avoid using Facebook as a login option when it\u2019s possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-using-secure-passwords\"><strong>Using Secure Passwords<\/strong><\/h3>\n\n\n\n<p>Passwords are consistently underestimated when it comes to privacy. The golden rule here is: the easier it is to remember \u2013 the easier it is to crack. Remembering a bunch of long, complicated passwords is somewhat uncomfortable unless you use a secure password manager like One Password or Last Pass. \u00a0Both allow storing passwords online or locally and synced with other devices, encourage you to use stronger passwords in general, conduct timely audits and even automatically change passwords for you.<\/p>\n\n\n\n<p>Always use two-factor authentication whenever the option is available and change your password once you see any odd log activity in your account. \u00a0Never allow websites or browsers to store your login\/password data, especially when using public Wi-Fi networks.<\/p>\n\n\n\n<p>Never open emails sent from unlisted contacts or containing suspicious links and downloads. The fewer software and files you download from the web, the fewer the chances of getting your data hacked.<\/p>\n\n\n\n<p>To avoid having your cookies tracked and stored, use private browsing modes when using Chrome and Firefox.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-conducting-online-payments\"><strong>Conducting Online Payments<\/strong><\/h3>\n\n\n\n<p>With eCommerce and online services on the rise, you are spending more and more dollars online. As a result, credit card data theft is now on the rise, with billions of dollars vanishing from users\u2019 accounts each month.<\/p>\n\n\n\n<p>Always shop through protected HTTPS:\/\/ connections. Whenever this option isn\u2019t available, or you are dealing with an unknown online merchant rather than making a payment through your credit card directly, use online payment systems like PayPal or virtual credit cards like <a href=\"https:\/\/www.entropay.com\/\">Visa Entropay<\/a>. Sure, that means some extra dollars spent in commission; however, the hacker will not have direct access to your bank account if anything goes wrong.<\/p>\n\n\n\n<p>Keep a close eye on your bank statements and cross-check your receipts with the payment history on the statements when it\u2019s possible. Consider making an inquiry to your bank whenever you see odd transactions (even small ones).<\/p>\n\n\n\n<p>Make the following tips part of your daily web routine. While taking just a few minutes a day, they can save you hours of frustration if your data gets into the wrong hands!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With social media penetrating all aspects of our lives, keeping your data secure and private becomes quite challenging. eBay, Evernote, Adobe, Court Ventures, the US Military, and now notorious Ashley Madison are just a few companies that failed to keep customers\u2019 databases safe. Even if you think you are browsing the web privacy-aware, you may [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6039,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Ultimate Guide To Protecting Your Online Identity<\/title>\n<meta name=\"description\" content=\"Learn how to protect your identity using our reverse username search tool, for free. Find out if someone else is using your identity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ultimate Guide To Protecting Your Online Identity\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect your identity using our reverse username search tool, for free. Find out if someone else is using your identity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\" \/>\n<meta property=\"og:site_name\" content=\"News &amp; Articles\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-10T14:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-24T14:48:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1954\" \/>\n\t<meta property=\"og:image:height\" content=\"1139\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"AndrewJ\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Usersearch_web\" \/>\n<meta name=\"twitter:site\" content=\"@Usersearch_web\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#article\",\"isPartOf\":{\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\"},\"author\":{\"name\":\"AndrewJ\",\"@id\":\"https:\/\/usersearch.org\/updates\/#\/schema\/person\/f2070fad176592330ff24bc74661b80e\"},\"headline\":\"The Ultimate Guide To Protecting Your Online Identity\",\"datePublished\":\"2015-10-10T14:37:00+00:00\",\"dateModified\":\"2022-07-24T14:48:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\"},\"wordCount\":740,\"publisher\":{\"@id\":\"https:\/\/usersearch.org\/updates\/#organization\"},\"image\":{\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\",\"url\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\",\"name\":\"The Ultimate Guide To Protecting Your Online Identity\",\"isPartOf\":{\"@id\":\"https:\/\/usersearch.org\/updates\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage\"},\"image\":{\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage\"},\"thumbnailUrl\":\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg\",\"datePublished\":\"2015-10-10T14:37:00+00:00\",\"dateModified\":\"2022-07-24T14:48:54+00:00\",\"description\":\"Learn how to protect your identity using our reverse username search tool, for free. Find out if someone else is using your identity.\",\"breadcrumb\":{\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage\",\"url\":\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg\",\"contentUrl\":\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg\",\"width\":1954,\"height\":1139,\"caption\":\"protect your identity online\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/usersearch.org\/updates\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ultimate Guide To Protecting Your Online Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/usersearch.org\/updates\/#website\",\"url\":\"https:\/\/usersearch.org\/updates\/\",\"name\":\"News &amp; Articles\",\"description\":\"News &amp; Articles, provided by UserSearch.org\",\"publisher\":{\"@id\":\"https:\/\/usersearch.org\/updates\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/usersearch.org\/updates\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/usersearch.org\/updates\/#organization\",\"name\":\"UserSearch\",\"url\":\"https:\/\/usersearch.org\/updates\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/usersearch.org\/updates\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2021\/07\/cropped-User-Search2-2.png\",\"contentUrl\":\"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2021\/07\/cropped-User-Search2-2.png\",\"width\":1000,\"height\":857,\"caption\":\"UserSearch\"},\"image\":{\"@id\":\"https:\/\/usersearch.org\/updates\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Usersearch_web\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/usersearch.org\/updates\/#\/schema\/person\/f2070fad176592330ff24bc74661b80e\",\"name\":\"AndrewJ\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/usersearch.org\/updates\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/usersearch.org\/updates\/wp-content\/wphb-cache\/gravatar\/9a4\/9a4e5c9073d6a10df031f6ef6f1b0559x96.jpg\",\"contentUrl\":\"https:\/\/usersearch.org\/updates\/wp-content\/wphb-cache\/gravatar\/9a4\/9a4e5c9073d6a10df031f6ef6f1b0559x96.jpg\",\"caption\":\"AndrewJ\"},\"sameAs\":[\"https:\/\/usersearch.org\/updates\",\"https:\/\/www.linkedin.com\/in\/usersearch\/\",\"https:\/\/x.com\/Usersearch_web\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Ultimate Guide To Protecting Your Online Identity","description":"Learn how to protect your identity using our reverse username search tool, for free. Find out if someone else is using your identity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity","og_locale":"en_GB","og_type":"article","og_title":"The Ultimate Guide To Protecting Your Online Identity","og_description":"Learn how to protect your identity using our reverse username search tool, for free. Find out if someone else is using your identity.","og_url":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity","og_site_name":"News &amp; Articles","article_published_time":"2015-10-10T14:37:00+00:00","article_modified_time":"2022-07-24T14:48:54+00:00","og_image":[{"width":1954,"height":1139,"url":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg","type":"image\/jpeg"}],"author":"AndrewJ","twitter_card":"summary_large_image","twitter_creator":"@Usersearch_web","twitter_site":"@Usersearch_web","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#article","isPartOf":{"@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity"},"author":{"name":"AndrewJ","@id":"https:\/\/usersearch.org\/updates\/#\/schema\/person\/f2070fad176592330ff24bc74661b80e"},"headline":"The Ultimate Guide To Protecting Your Online Identity","datePublished":"2015-10-10T14:37:00+00:00","dateModified":"2022-07-24T14:48:54+00:00","mainEntityOfPage":{"@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity"},"wordCount":740,"publisher":{"@id":"https:\/\/usersearch.org\/updates\/#organization"},"image":{"@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage"},"thumbnailUrl":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity","url":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity","name":"The Ultimate Guide To Protecting Your Online Identity","isPartOf":{"@id":"https:\/\/usersearch.org\/updates\/#website"},"primaryImageOfPage":{"@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage"},"image":{"@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage"},"thumbnailUrl":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg","datePublished":"2015-10-10T14:37:00+00:00","dateModified":"2022-07-24T14:48:54+00:00","description":"Learn how to protect your identity using our reverse username search tool, for free. Find out if someone else is using your identity.","breadcrumb":{"@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#primaryimage","url":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg","contentUrl":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2015\/10\/protect-your-online-profile.jpg","width":1954,"height":1139,"caption":"protect your identity online"},{"@type":"BreadcrumbList","@id":"https:\/\/usersearch.org\/updates\/the-ultimate-guide-to-protecting-your-online-identity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/usersearch.org\/updates\/"},{"@type":"ListItem","position":2,"name":"The Ultimate Guide To Protecting Your Online Identity"}]},{"@type":"WebSite","@id":"https:\/\/usersearch.org\/updates\/#website","url":"https:\/\/usersearch.org\/updates\/","name":"News &amp; Articles","description":"News &amp; Articles, provided by UserSearch.org","publisher":{"@id":"https:\/\/usersearch.org\/updates\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/usersearch.org\/updates\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/usersearch.org\/updates\/#organization","name":"UserSearch","url":"https:\/\/usersearch.org\/updates\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/usersearch.org\/updates\/#\/schema\/logo\/image\/","url":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2021\/07\/cropped-User-Search2-2.png","contentUrl":"https:\/\/usersearch.org\/updates\/wp-content\/uploads\/2021\/07\/cropped-User-Search2-2.png","width":1000,"height":857,"caption":"UserSearch"},"image":{"@id":"https:\/\/usersearch.org\/updates\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Usersearch_web"]},{"@type":"Person","@id":"https:\/\/usersearch.org\/updates\/#\/schema\/person\/f2070fad176592330ff24bc74661b80e","name":"AndrewJ","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/usersearch.org\/updates\/#\/schema\/person\/image\/","url":"https:\/\/usersearch.org\/updates\/wp-content\/wphb-cache\/gravatar\/9a4\/9a4e5c9073d6a10df031f6ef6f1b0559x96.jpg","contentUrl":"https:\/\/usersearch.org\/updates\/wp-content\/wphb-cache\/gravatar\/9a4\/9a4e5c9073d6a10df031f6ef6f1b0559x96.jpg","caption":"AndrewJ"},"sameAs":["https:\/\/usersearch.org\/updates","https:\/\/www.linkedin.com\/in\/usersearch\/","https:\/\/x.com\/Usersearch_web"]}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/posts\/6036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/comments?post=6036"}],"version-history":[{"count":0,"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/posts\/6036\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/media\/6039"}],"wp:attachment":[{"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/media?parent=6036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/categories?post=6036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/usersearch.org\/updates\/wp-json\/wp\/v2\/tags?post=6036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}