{"id":9704,"date":"2023-02-01T05:22:21","date_gmt":"2023-02-01T05:22:21","guid":{"rendered":"https:\/\/flowactivo.org\/?p=9704"},"modified":"2023-02-01T05:22:21","modified_gmt":"2023-02-01T05:22:21","slug":"breakdown-bloomberg-supermicro-fbipwnallthethings","status":"publish","type":"post","link":"https:\/\/flowactivo.org\/de\/breakdown-bloomberg-supermicro-fbipwnallthethings\/","title":{"rendered":"Breakdown Bloomberg Supermicro Fbipwnallthethings"},"content":{"rendered":"<p><span style=\"font-weight: 400\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Bloomberg_L.P.\" rel=\"nofollow noopener\" target=\"_blank\">bloomberg<\/a> supermicro fbipwnallthethings &#8211; In the wake of the recent Bloomberg expose on a potentially malicious supply chain attack on Supermicro, an American computer hardware company, it\u2019s important to break down all of the information that\u2019s been revealed in order to put a larger picture into perspective. It\u2019s a complex issue, involving a sophisticated attack compromising the hardware of countless companies and leaving customers at risk of data theft and cyber-espionage. This article will further analyze the details behind \u2018Fbipwnallthethings\u2019 as well as provide insight on what it means for the future of hardware security.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400\">The Alleged Supply Chain Attack<\/span><\/h2>\n<p><span style=\"font-weight: 400\">On October 4th, Bloomberg released an article that detailed the alleged hack, in which the Chinese government is believed to have installed a malicious chip on the motherboards of Supermicro\u2019s server hardware. The chip gave the hackers a backdoor into any system they were housed in and gave them access to all of the data on those systems, potentially allowing them access to some of the world\u2019s most sensitive secrets.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">The Details of Fbipwnallthethings<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The hack is believed to have been based off of an exploit code, known as \u201cFbipwnallthethings\u201d, which was developed by a Chinese team in 2005. This code was then modified to allow hackers to gain access to the systems, giving them the ability to steal data or manipulate the servers for their own purposes.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Fbipwnallthethings is a sophisticated exploit code that takes advantage of <a href=\"https:\/\/flowactivo.org\/de\/understanding-the-gre-exam-syllabus-and-gre-model-paper\/\">weaknesses<\/a> in the UEFI firmware of Intel-based computers. This allows the hackers to gain access to the server before the operating system has even begun to load, allowing them to take full control of the system.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">The Fallout from Fbipwnallthethings<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Since the exposure of this exploit, many companies have been scrambling to ensure the security of their hardware and network systems. All potentially impacted customers were contacted and offered solutions to protect against further compromises.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But this hack could have much farther-reaching effects in the coming years, forcing companies to take a much harder look at their supply chain security and potentially make costly changes to their products. Some companies may even move their production overseas to countries that aren\u2019t as vulnerable to supply chain attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Implications of the Hack<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The implications of this exploit are far-reaching and could have a major impact on the way companies manufacture, test and deploy hardware. Firstly, companies will need to invest in better testing and validation of the components in their hardware products. This could include investing in more thorough penetration testing and running anti-malware scans on all components before they\u2019re even released for sale.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Additionally, companies may need to bolster their underlying security protocols, as this hack has shown us just how vulnerable hardware can be to malicious actors. Finally, companies may need to look into transitioning away from Intel as the underlying processor, as some of the vulnerability exposed with Fbipwnallthethings could be transcribed onto other processors.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Konklusion<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Ultimately, the Fbipwnallthethings exploit demonstrates just how vulnerable hardware can be to malicious actors. Companies now have to take a closer look at their hardware and software, from the components and processors to their underlying security protocols. Firms need to invest in better testing and validation to ensure no malicious code or components are present in their hardware in order to protect their customers from further compromising situations, such as the one Supermicro faced.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Related FAQs<\/span><\/h2>\n<p><b>What is Fbipwnallthethings?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Fbipwnallthethings is a sophisticated exploit code that takes advantage of weaknesses in the UEFI firmware of Intel-based computers. This allows hackers to gain access to the server before the operating system has even begun to load, giving them total control of the system.\u00a0<\/span><\/p>\n<p><b>What is the fallout of the Fbipwnallthethings hack?<\/b><\/p>\n<p><span style=\"font-weight: 400\">The fallout of the Fbipwnallthethings hack has been companies scrambling to ensure their hardware and network security. This has included customer notification and offering solutions to mitigate further compromises. Additionally, companies may have to make costly changes or transition to countries less vulnerable to supply chain attacks.\u00a0<\/span><\/p>\n<p><b>What implications does this exploit have for hardware security?<\/b><\/p>\n<p><span style=\"font-weight: 400\">The implications of this exploit are far-reaching and could have a major impact on hardware security. Companies will need to invest in better testing and validation of components, bolster their security protocols and look into transitioning away from Intel processors.<\/span><\/p>\n<p><b>What is breakdown supermicro fbipwnallthethings?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Breakdown Supermicro fbipwnallthethings is the analysis of the Bloomberg expose on a potentially malicious supply chain attack on Supermicro, providing insight into the details of the exploit and its implications for hardware security.<\/span><\/p>\n<p><b>What is breakdown bloomberg fbipwnallthethings?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Bloomberg supermicro fbipwnallthethings is the analysis of the Bloomberg expose on a potentially malicious supply chain attack on Supermicro, providing insight into the details of the exploit and its implications for hardware security.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>bloomberg supermicro fbipwnallthethings &#8211; In the wake of the recent Bloomberg expose on a potentially malicious supply chain attack on Supermicro, an American computer hardware company, it\u2019s important to break down all of the information that\u2019s been revealed in order to put a larger picture into perspective. It\u2019s a complex issue, involving a sophisticated attack [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":9705,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[2],"tags":[11557,11556,11558,11552,11553,11555,11559,11554,11560,11551],"class_list":["post-9704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-bloomberg-fbipwnallthethings","tag-bloomberg-supermicro-fbipwnallthethings","tag-breakdown-bloomberg-fbipwnallthethings","tag-breakdown-bloomberg-supermicro","tag-breakdown-bloomberg-supermicro-fbipwnallthethings","tag-breakdown-fbipwnallthethings","tag-breakdown-supermicro","tag-breakdown-supermicro-fbipwnallthethings","tag-pwnallthethings","tag-supermicro-fbipwnallthethings"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Breakdown Bloomberg Supermicro Fbipwnallthethings - Flowactivo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/flowactivo.org\/de\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breakdown Bloomberg Supermicro Fbipwnallthethings - Flowactivo\" \/>\n<meta property=\"og:description\" content=\"bloomberg supermicro fbipwnallthethings &#8211; In the wake of the recent Bloomberg expose on a potentially malicious supply chain attack on Supermicro, an American computer hardware company, it\u2019s important to break down all of the information that\u2019s been revealed in order to put a larger picture into perspective. It\u2019s a complex issue, involving a sophisticated attack [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/flowactivo.org\/de\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\" \/>\n<meta property=\"og:site_name\" content=\"Flowactivo\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T05:22:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bharti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bharti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\"},\"author\":{\"name\":\"Bharti\",\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/person\/13957efdb9563bd09ffbf8085f65304b\"},\"headline\":\"Breakdown Bloomberg Supermicro Fbipwnallthethings\",\"datePublished\":\"2023-02-01T05:22:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\"},\"wordCount\":797,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/flowactivo.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg\",\"keywords\":[\"bloomberg fbipwnallthethings\",\"bloomberg supermicro fbipwnallthethings\",\"breakdown bloomberg fbipwnallthethings\",\"breakdown bloomberg supermicro\",\"breakdown bloomberg supermicro fbipwnallthethings\",\"breakdown fbipwnallthethings\",\"breakdown supermicro\",\"breakdown supermicro fbipwnallthethings\",\"pwnallthethings\",\"supermicro fbipwnallthethings\"],\"articleSection\":[\"Business\"],\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\",\"url\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\",\"name\":\"Breakdown Bloomberg Supermicro Fbipwnallthethings - Flowactivo\",\"isPartOf\":{\"@id\":\"https:\/\/flowactivo.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg\",\"datePublished\":\"2023-02-01T05:22:21+00:00\",\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage\",\"url\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg\",\"contentUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Supermicro Fbipwnallthethings\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/flowactivo.org\/#website\",\"url\":\"https:\/\/flowactivo.org\/\",\"name\":\"Flowactivo\",\"description\":\"Stay Updated with the Latest Insights\",\"publisher\":{\"@id\":\"https:\/\/flowactivo.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/flowactivo.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/flowactivo.org\/#organization\",\"name\":\"Flowactivo\",\"url\":\"https:\/\/flowactivo.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png\",\"contentUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png\",\"width\":16,\"height\":16,\"caption\":\"Flowactivo\"},\"image\":{\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/person\/13957efdb9563bd09ffbf8085f65304b\",\"name\":\"Bharti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a346ed21b3ae333909f2de8b5fc36705ec9a5555be3240a7ca9ea215325cb07?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a346ed21b3ae333909f2de8b5fc36705ec9a5555be3240a7ca9ea215325cb07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a346ed21b3ae333909f2de8b5fc36705ec9a5555be3240a7ca9ea215325cb07?s=96&d=mm&r=g\",\"caption\":\"Bharti\"},\"url\":\"https:\/\/flowactivo.org\/de\/author\/bharti\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Breakdown Bloomberg Supermicro Fbipwnallthethings - Flowactivo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/flowactivo.org\/de\/breakdown-bloomberg-supermicro-fbipwnallthethings\/","og_locale":"da_DK","og_type":"article","og_title":"Breakdown Bloomberg Supermicro Fbipwnallthethings - Flowactivo","og_description":"bloomberg supermicro fbipwnallthethings &#8211; In the wake of the recent Bloomberg expose on a potentially malicious supply chain attack on Supermicro, an American computer hardware company, it\u2019s important to break down all of the information that\u2019s been revealed in order to put a larger picture into perspective. It\u2019s a complex issue, involving a sophisticated attack [&hellip;]","og_url":"https:\/\/flowactivo.org\/de\/breakdown-bloomberg-supermicro-fbipwnallthethings\/","og_site_name":"Flowactivo","article_published_time":"2023-02-01T05:22:21+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg","type":"image\/jpeg"}],"author":"Bharti","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"Bharti","Estimeret l\u00e6setid":"4 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#article","isPartOf":{"@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/"},"author":{"name":"Bharti","@id":"https:\/\/flowactivo.org\/#\/schema\/person\/13957efdb9563bd09ffbf8085f65304b"},"headline":"Breakdown Bloomberg Supermicro Fbipwnallthethings","datePublished":"2023-02-01T05:22:21+00:00","mainEntityOfPage":{"@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/"},"wordCount":797,"commentCount":0,"publisher":{"@id":"https:\/\/flowactivo.org\/#organization"},"image":{"@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage"},"thumbnailUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg","keywords":["bloomberg fbipwnallthethings","bloomberg supermicro fbipwnallthethings","breakdown bloomberg fbipwnallthethings","breakdown bloomberg supermicro","breakdown bloomberg supermicro fbipwnallthethings","breakdown fbipwnallthethings","breakdown supermicro","breakdown supermicro fbipwnallthethings","pwnallthethings","supermicro fbipwnallthethings"],"articleSection":["Business"],"inLanguage":"da-DK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/","url":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/","name":"Breakdown Bloomberg Supermicro Fbipwnallthethings - Flowactivo","isPartOf":{"@id":"https:\/\/flowactivo.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage"},"image":{"@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage"},"thumbnailUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg","datePublished":"2023-02-01T05:22:21+00:00","inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/flowactivo.org\/breakdown-bloomberg-supermicro-fbipwnallthethings\/#primaryimage","url":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg","contentUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/02\/blaz-erzetic-g5f0BJq-FRs-unsplash.jpg","width":1920,"height":1280,"caption":"Supermicro Fbipwnallthethings"},{"@type":"WebSite","@id":"https:\/\/flowactivo.org\/#website","url":"https:\/\/flowactivo.org\/","name":"Flowactivo","description":"Hold dig opdateret med de nyeste indsigter","publisher":{"@id":"https:\/\/flowactivo.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/flowactivo.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/flowactivo.org\/#organization","name":"Flowactivo","url":"https:\/\/flowactivo.org\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/","url":"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png","contentUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png","width":16,"height":16,"caption":"Flowactivo"},"image":{"@id":"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/flowactivo.org\/#\/schema\/person\/13957efdb9563bd09ffbf8085f65304b","name":"Bharti","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/secure.gravatar.com\/avatar\/9a346ed21b3ae333909f2de8b5fc36705ec9a5555be3240a7ca9ea215325cb07?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a346ed21b3ae333909f2de8b5fc36705ec9a5555be3240a7ca9ea215325cb07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a346ed21b3ae333909f2de8b5fc36705ec9a5555be3240a7ca9ea215325cb07?s=96&d=mm&r=g","caption":"Bharti"},"url":"https:\/\/flowactivo.org\/de\/author\/bharti\/"}]}},"_links":{"self":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts\/9704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/comments?post=9704"}],"version-history":[{"count":1,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts\/9704\/revisions"}],"predecessor-version":[{"id":9706,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts\/9704\/revisions\/9706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/media\/9705"}],"wp:attachment":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/media?parent=9704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/categories?post=9704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/tags?post=9704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}