{"id":1,"date":"2022-08-12T23:18:30","date_gmt":"2022-08-12T21:18:30","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=1"},"modified":"2022-09-07T09:10:08","modified_gmt":"2022-09-07T07:10:08","slug":"breaking-things-legally-for-fun-and-profit","status":"publish","type":"post","link":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/","title":{"rendered":"Breaking things legally for fun and profit"},"content":{"rendered":"\n<p>Now and then we can hear that some company has been hacked. People think it&#8217;s black magic or something.  No, it&#8217;s not. It usually means some evil dude found a way to break the system&#8217;s security mechanisms to get into the system. It might be either innocent such as a company&#8217;s website defacement to show off or a serious security breach such as stealing confidential information &#8211; documents or customers&#8217; data. In both cases, the company suffers losses. <\/p>\n\n\n\n<p>There is also a group of people who does it out of curiosity. They don&#8217;t want money, don&#8217;t want to be famous, they just want to challenge themselves. Sometimes they even report the vulnerabilities they found to the company in good faith. Unfortunately, this very often ends up in court. Despite their intentions, this is treated as breaking the law and they have problems.<\/p>\n\n\n\n<p>So what if you want to be one of them but not break the law at the same time? Is it possible? The answer is YES!!!  And even more &#8211; you can not only challenge yourself but also be rewarded for your time and effort at the same time. <strong>Bug Bounty<\/strong> <strong>Programs <\/strong>come into play.<\/p>\n\n\n\n<p>The &#8220;Bug Bounty Program&#8221; is a program runs by the company, which allows people from the outside (wannabe hackers, security specialists, researchers, and you) to search for vulnerabilities inside the company&#8217;s assets. If you find a valid vulnerability &#8211; you will be (mostly) awarded for it somehow.<\/p>\n\n\n\n<p>There are two types of bug bounty programs &#8211; the one the company runs on its own and the &#8220;Bug Bounty Platform&#8221; which is a kind of bridge between the bug hunter and the company which runs the program. The bug bounty platform hosts many bug bounty programs from different companies. <\/p>\n\n\n\n<p>The programs on the bug bounty platform may be public or private ones. The public ones are available to everybody whilst the private ones are available only for the chosen researchers who already have some reputation on the platform. In this case, they get special invitations to participate in a private program. The main rule of bug bounty programs is when that you have to be first to find the bug. Only then you will be rewarded. Otherwise, your finding will be treated as a duplicate. It gives you knowledge and experience but no reward.. and it is sometimes frustrating. That&#8217;s why if you hack on the private program, you have less competition and a higher chance of getting the valid bug.<\/p>\n\n\n\n<p>There is also a category like VDP which stands for Vulnerability Disclosure Program. Simplified things this is a kind of Bug Bounty Program without bounty :). I mean a company that runs this kind of program will accept the bugs and you might expect in return:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>nothing<\/li><li>&#8220;thank you&#8221; e-mail or letter of appreciation<\/li><li>entry in the Hall of Fame &#8211; your name will be listed among other hackers on the special &#8220;Thank You&#8221; page<\/li><li>reward such as swag (the mug, some gadget, gift card, t-shirt)<\/li><\/ul>\n\n\n\n<p>It all depends on the company. I personally think VDPs are good for beginners to sharpen their skills,  as they are less crowded because everybody goes for money :].<\/p>\n\n\n\n<p>The VDPs I&#8217;ve got good experience with are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>BBC<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.bbc.com\/backstage\/security-disclosure-policy\/\" data-type=\"URL\" data-id=\"https:\/\/www.bbc.com\/backstage\/security-disclosure-policy\/\" target=\"_blank\">https:\/\/www.bbc.com\/backstage\/security-disclosure-policy\/<\/a> &#8211; really cool t-shirts<\/li><li>Government Of The Netherlands<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.government.nl\/topics\/cybercrime\/fighting-cybercrime-in-the-netherlands\/responsible-disclosure\" data-type=\"URL\" data-id=\"https:\/\/www.government.nl\/topics\/cybercrime\/fighting-cybercrime-in-the-netherlands\/responsible-disclosure\" target=\"_blank\">https:\/\/www.government.nl\/topics\/cybercrime\/fighting-cybercrime-in-the-netherlands\/responsible-disclosure<\/a><\/li><li>Erasmus University Rotterdam<br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.eur.nl\/en\/campus\/locations\/campus-woudestein\/security-safety\/information-security\/responsible-disclosure\" data-type=\"URL\" data-id=\"https:\/\/www.eur.nl\/en\/campus\/locations\/campus-woudestein\/security-safety\/information-security\/responsible-disclosure\" target=\"_blank\">https:\/\/www.eur.nl\/en\/campus\/locations\/campus-woudestein\/security-safety\/information-security\/responsible-disclosure<\/a><\/li><li>RedBull<br><a rel=\"noreferrer noopener\" href=\"https:\/\/app.intigriti.com\/programs\/redbull\/redbull\/detail\" target=\"_blank\">https:\/\/app.intigriti.com\/programs\/redbull\/redbull\/detail<\/a> &#8211; found on Intigriti platform<\/li><\/ul>\n\n\n\n<p>The bug bounty platforms I am active at are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Hackerone  &#8211; <a href=\"https:\/\/hackerone.com\/users\/sign_up\">https:\/\/hackerone.com\/users\/sign_up<\/a><\/li><li>Intigriti &#8211; <a href=\"https:\/\/login.intigriti.com\/account\/register\">https:\/\/login.intigriti.com\/account\/register<\/a><\/li><li>Bugcrowd &#8211; <a href=\"https:\/\/bugcrowd.com\/user\/sign_up\">https:\/\/bugcrowd.com\/user\/sign_up<\/a><\/li><\/ul>\n\n\n\n<p>There are more bug bounty platforms, however, I don&#8217;t have any experience with them. Try them and challenge yourself. <\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td><strong>Bug Bounty Platform<\/strong><\/td><td><strong>Website URL<\/strong><\/td><\/tr><tr><td>1<\/td><td>HackerOne<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.hackerone.com\/\" target=\"_blank\">https:\/\/www.hackerone.com<\/a><\/td><\/tr><tr><td>2<\/td><td>Bugcrowd<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.bugcrowd.com\/\" target=\"_blank\">https:\/\/www.bugcrowd.com<\/a><\/td><\/tr><tr><td>3<\/td><td>Synack<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.synack.com\/\" target=\"_blank\">https:\/\/www.synack.com<\/a><\/td><\/tr><tr><td>4<\/td><td>Detectify<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/cs.detectify.com\/\" target=\"_blank\">https:\/\/cs.detectify.com<\/a><\/td><\/tr><tr><td>5<\/td><td>Cobalt<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/cobalt.io\/\" target=\"_blank\">https:\/\/cobalt.io<\/a><\/td><\/tr><tr><td>6<\/td><td>Open Bug Bounty<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.openbugbounty.org\/\" target=\"_blank\">https:\/\/www.openbugbounty.org<\/a><\/td><\/tr><tr><td>7<\/td><td>Zero Copter<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.zerocopter.com\/\" target=\"_blank\">https:\/\/www.zerocopter.com<\/a><\/td><\/tr><tr><td>8<\/td><td>Yes We Hack<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.yeswehack.com\/\" target=\"_blank\">https:\/\/www.yeswehack.com<\/a><\/td><\/tr><tr><td>9<\/td><td>Hacken Proof<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/hackenproof.com\/\" target=\"_blank\">https:\/\/hackenproof.com<\/a><\/td><\/tr><tr><td>10<\/td><td>Vulnerability Lab<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.vulnerability-lab.com\/\" target=\"_blank\">https:\/\/www.vulnerability-lab.com<\/a><\/td><\/tr><tr><td>11<\/td><td>Fire Bounty<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/firebounty.com\/\" target=\"_blank\">https:\/\/firebounty.com<\/a><\/td><\/tr><tr><td>12<\/td><td>Bug Bounty<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/bugbounty.jp\/\" target=\"_blank\">https:\/\/bugbounty.jp<\/a><\/td><\/tr><tr><td>13<\/td><td>Anti Hack<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/antihack.me\/\" target=\"_blank\">https:\/\/antihack.me<\/a><\/td><\/tr><tr><td>14<\/td><td>Intigrity<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/intigrity.com\/\" target=\"_blank\">https:\/\/intigrity.com<\/a><\/td><\/tr><tr><td>15<\/td><td>Safe Hats<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/safehats.com\/\" target=\"_blank\">https:\/\/safehats.com<\/a><\/td><\/tr><tr><td>16<\/td><td>Red Storm<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.redstorm.io\/\" target=\"_blank\">https:\/\/www.redstorm.io<\/a><\/td><\/tr><tr><td>17<\/td><td>Cyber Army<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.cyberarmy.id\/\" target=\"_blank\">https:\/\/www.cyberarmy.id<\/a><\/td><\/tr><tr><td>18<\/td><td>Yogosha<\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/yogosha.com\/\" target=\"_blank\">https:\/\/yogosha.com<\/a><\/td><\/tr><\/tbody><\/table><figcaption>Source: <a href=\"https:\/\/ethicalhackx.com\/list-of-bug-bounty-platforms\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ethicalhackx.com\/list-of-bug-bounty-platforms\/<\/a><\/figcaption><\/figure>\n\n\n\n<p>See you next bug \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now and then we can hear that some company has been hacked. People think it&#8217;s black magic or something. No, it&#8217;s not. It usually means some evil dude found a way to break the system&#8217;s security mechanisms to get into the system. It might be either innocent such as a company&#8217;s website defacement to show&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,31],"tags":[5],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-bez-kategorii","category-non-technical","tag-bug-bounty"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Breaking things legally for fun and profit - Bergee&#039;s Stories on Bug Hunting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breaking things legally for fun and profit - Bergee&#039;s Stories on Bug Hunting\" \/>\n<meta property=\"og:description\" content=\"Now and then we can hear that some company has been hacked. People think it&#8217;s black magic or something. No, it&#8217;s not. It usually means some evil dude found a way to break the system&#8217;s security mechanisms to get into the system. It might be either innocent such as a company&#8217;s website defacement to show...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\" \/>\n<meta property=\"og:site_name\" content=\"Bergee&#039;s Stories on Bug Hunting\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-12T21:18:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-07T07:10:08+00:00\" \/>\n<meta name=\"author\" content=\"bergee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/bergee\" \/>\n<meta name=\"twitter:site\" content=\"@bergee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bergee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\"},\"author\":{\"name\":\"bergee\",\"@id\":\"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73\"},\"headline\":\"Breaking things legally for fun and profit\",\"datePublished\":\"2022-08-12T21:18:30+00:00\",\"dateModified\":\"2022-09-07T07:10:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\"},\"wordCount\":767,\"publisher\":{\"@id\":\"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73\"},\"keywords\":[\"bug bounty\"],\"articleSection\":[\"Bez kategorii\",\"non technical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\",\"url\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\",\"name\":\"Breaking things legally for fun and profit - Bergee&#039;s Stories on Bug Hunting\",\"isPartOf\":{\"@id\":\"https:\/\/bergee.it\/blog\/#website\"},\"datePublished\":\"2022-08-12T21:18:30+00:00\",\"dateModified\":\"2022-09-07T07:10:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bergee.it\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Breaking things legally for fun and profit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bergee.it\/blog\/#website\",\"url\":\"https:\/\/bergee.it\/blog\/\",\"name\":\"Bergee&#039;s Stories on Bug Hunting\",\"description\":\"hacking, cyber security and programming\",\"publisher\":{\"@id\":\"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bergee.it\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73\",\"name\":\"bergee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\",\"url\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\",\"contentUrl\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\",\"width\":129,\"height\":150,\"caption\":\"bergee\"},\"logo\":{\"@id\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\",\"https:\/\/www.linkedin.com\/in\/bartlomiej-bergier\",\"https:\/\/x.com\/https:\/\/twitter.com\/bergee\"],\"url\":\"https:\/\/bergee.it\/blog\/author\/bergee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Breaking things legally for fun and profit - Bergee&#039;s Stories on Bug Hunting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/","og_locale":"en_US","og_type":"article","og_title":"Breaking things legally for fun and profit - Bergee&#039;s Stories on Bug Hunting","og_description":"Now and then we can hear that some company has been hacked. People think it&#8217;s black magic or something. No, it&#8217;s not. It usually means some evil dude found a way to break the system&#8217;s security mechanisms to get into the system. It might be either innocent such as a company&#8217;s website defacement to show...","og_url":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/","og_site_name":"Bergee&#039;s Stories on Bug Hunting","article_published_time":"2022-08-12T21:18:30+00:00","article_modified_time":"2022-09-07T07:10:08+00:00","author":"bergee","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/bergee","twitter_site":"@bergee","twitter_misc":{"Written by":"bergee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/#article","isPartOf":{"@id":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/"},"author":{"name":"bergee","@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"headline":"Breaking things legally for fun and profit","datePublished":"2022-08-12T21:18:30+00:00","dateModified":"2022-09-07T07:10:08+00:00","mainEntityOfPage":{"@id":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/"},"wordCount":767,"publisher":{"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"keywords":["bug bounty"],"articleSection":["Bez kategorii","non technical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/","url":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/","name":"Breaking things legally for fun and profit - Bergee&#039;s Stories on Bug Hunting","isPartOf":{"@id":"https:\/\/bergee.it\/blog\/#website"},"datePublished":"2022-08-12T21:18:30+00:00","dateModified":"2022-09-07T07:10:08+00:00","breadcrumb":{"@id":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bergee.it\/blog\/breaking-things-legally-for-fun-and-profit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bergee.it\/blog\/"},{"@type":"ListItem","position":2,"name":"Breaking things legally for fun and profit"}]},{"@type":"WebSite","@id":"https:\/\/bergee.it\/blog\/#website","url":"https:\/\/bergee.it\/blog\/","name":"Bergee&#039;s Stories on Bug Hunting","description":"hacking, cyber security and programming","publisher":{"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bergee.it\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73","name":"bergee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","url":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","contentUrl":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","width":129,"height":150,"caption":"bergee"},"logo":{"@id":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png"},"sameAs":["http:\/\/localhost\/wordpress","https:\/\/www.linkedin.com\/in\/bartlomiej-bergier","https:\/\/x.com\/https:\/\/twitter.com\/bergee"],"url":"https:\/\/bergee.it\/blog\/author\/bergee\/"}]}},"_links":{"self":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":14,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":124,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/posts\/1\/revisions\/124"}],"wp:attachment":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}