{"id":22249,"date":"2020-12-17T16:02:03","date_gmt":"2020-12-17T16:02:03","guid":{"rendered":"http:\/\/user_generated_content_part_4_security"},"modified":"2024-10-03T15:17:40","modified_gmt":"2024-10-03T22:17:40","slug":"user_generated_content_part_4_security","status":"publish","type":"post","link":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security","title":{"rendered":"User-Generated Content, Part 4: Security"},"content":{"rendered":"<div class=\"wp-block-cloudinary-markdown \"><p><a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_1_the_basics\">Part 1<\/a> of this series highlights the basics of user-generated content (UGC) and its benefits for e-commerce. <a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_2_images_and_their_transformations\">Part 2<\/a> describes how to leverage UGC images in <a href=\"https:\/\/cloudinary.com\/building-ecommerce-websites\/ecommerce-platform\">e-commerce<\/a> and efficiently upload, transform, and deliver them with Cloudinary. <a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_3_videos_and_their_transformations\">Part 3<\/a> focuses on videos in UGC and the many related management capabilities offered by Cloudinary.<\/p>\n<p>Part 4 here suggests ways of rendering UGC media securely and free of harmful or inappropriate material, in particular by leveraging two configurations and an add-on in Cloudinary.<\/p>\n<h2>Why is Important to Render UGC Media Safely<\/h2>\n<p>Site owners rightly assume that all UGC uploaded to their system originates from their users. Inevitably, however, with the ability for anyone to upload content to a site, others might want to see how much they can get away with, like large amounts of assets that overwhelm your system, files with embedded code, or, even worse, assets that contain malicious content. Regardless, you must take precautions against those misdeeds.<\/p>\n<p>You can set up your system in many ways to handle your unique UGC workflow. In this case, a wise practice is to <strong>never<\/strong> serve on your site or app the original\u2014that is, unprocessed\u2014assets uploaded as UGC to avoid unknowingly delivering malicious content, which could have serious ramifications, typically leading to unwanted, adverse publicity.<\/p>\n<p>What should you serve instead? A dynamic media platform like <a href=\"https:\/\/cloudinary.com\/pricing\">Cloudinary<\/a> can help because it automatically processes all your non-original images and <a href=\"https:\/\/cloudinary.com\/video_api\">videos<\/a> (aka transformed assets), ensuring that they are optimized and malware free. To apply this set of actions, all you have to do is simply apply any type of transformation through Cloudinary. Whether it be setting a crop mode, width, format, etc. all will lead to the processing of your asset.<\/p>\n<h2>How to Do It with Cloudinary<\/h2>\n<p>Avoid serving original assets and set up more stringent security settings with Cloudinary, by doing the following:<\/p>\n<ol>\n<li>\n<p>Set the asset\u2019s <code>type<\/code> parameter to <a href=\"https:\/\/cloudinary.com\/documentation\/upload_images#private_assets\"><code>private<\/code><\/a> in the upload to make the original asset private, i.e., invisible, to the public, allowing them to view the asset\u2019s derivatives only. To view the original asset, one must have a signature-generated URL. (If you\u2019ve already uploaded the asset, you can update it; see the <a href=\"https:\/\/cloudinary.com\/documentation\/managing_assets#updating_already_uploaded_assets\">related documentation<\/a> for the procedure)<\/p>\n<p>Additionally, you can gain even more granular access to private asset-security measures with the following step:<\/p>\n<\/li>\n<li>\n<p>Enable the <a href=\"https:\/\/cloudinary.com\/documentation\/control_access_to_media#strict_transformations\">Strict Transformations setting<\/a> to specify which derivatives (e.g., thumbnails) are viewable or allowed to be generated by anyone without the signature-generated URL.<\/p>\n<\/li>\n<\/ol>\n<p>Bear in mind it\u2019s best to ensure security of your UGC not only for your business, but also for others. Inevitably, users might accidentally upload assets that expose private information about themselves or that include visuals of people who would balk at a public posting of their pictures. To alleviate those situations, here are some workflows to keep in mind:<\/p>\n<ul>\n<li>\n<p>Reject assets that are irrelevant to your e-business. For example, through automation, Cloudinary can detect if a face is present in the UGC images uploaded of people supposedly wearing the clothes that you sell, enabling you to set up the logic to automatically delete the rogue images. Such a workflow not only reduces storage cost, but also avoids collecting potentially malicious assets.<\/p>\n<\/li>\n<li>\n<p>Pay attention to all the content that is displayed in your UGC images. For example, see if users have accidentally included private information displayed as text in the background.<\/p>\n<p>Better head off the iffy situations at the outset. Cloudinary\u2019s <a href=\"https:\/\/cloudinary.com\/addons#adv_ocr\">OCR Text Detection and Extraction add-on<\/a> scans images and detects any text there, which you can render unreadable by blurring or pixelating with a transformation setting. The images are then clean and usable. It\u2019s always great practice to instill a sense of trust between you and your users.<\/p>\n<\/li>\n<li>\n<p>Blur or pixelate faces in the background as well as the regions of your choice. Do be judicious and cautious about what you display; after all, many people are by no means thrilled about their photos being posted on the Internet.<\/p>\n<\/li>\n<\/ul>\n<p>In today\u2019s digital world in which information is constantly being sought, security is more important than ever, and companies with a weak security infrastructure are vulnerable to cyber attacks. Therefore, when choosing your asset-management solution, be sure to explore in detail how it handles security. The extent of possible damage can be so devastating that it definitely pays to be aware and prepared.<\/p>\n<h2>Want to Learn More About UGC?<\/h2>\n<ul>\n<li>Learn how retailers can benefit from UGC and get the <a href=\"https:\/\/cloudinary.com\/guides\/e-commerce-platform\/select-the-right-e-commerce-platform-for-your-needs\">Cloudinary e-commerce guide<\/a>\n<\/li>\n<li>UGC Infographic: See the <a href=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/image\/upload\/v1605739915\/Web_Assets\/blog\/ugc_infographic.pdf\">survey infographic<\/a>\n<\/li>\n<li>UGC Whitepaper: <a href=\"https:\/\/info.cloudinary.com\/Visual-Experiences-That-Connect.html\">Take a deeper look<\/a> and explore the power of UGC and the tech needed to support it.<\/li>\n<li>\n<a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_1_the_basics\">User-Generated Content, Part 1: The Basics<\/a>&#8211; Learn about the importance and benefits of user-generated content (UGC) and ways to leverage and deliver it for audience engagement and revenue growth.<\/li>\n<li>\n<a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_2_images_and_their_transformations\">User-Generated Content, Part 2: Images and Their Transformations<\/a>&#8211; Cloudinary offers numerous automated options for optimized uploads, transformations, and delivery of UGC images for e-commerce.<\/li>\n<li>\n<a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_3_videos_and_their_transformations\">User-Generated Content, Part 3: Videos and Their Transformations<\/a>&#8211; Learn how to automate in Cloudinary the crucial management tasks before posting UGC videos: moderation, transcription, transformations, thumbnail creation.<\/li>\n<li>\n<a href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\">User-Generated Content, Part 4: Security<\/a>&#8211; Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.<\/li>\n<li>\n<a href=\"https:\/\/youtu.be\/I-zsN0viEiA\">UGC fireside chat with 1-800-FLOWERS and Cloudinary.<\/a>\n<\/li>\n<\/ul>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":41,"featured_media":22250,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"tags":[25,98,264,300,303,305],"class_list":["post-22249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-asset-management","tag-e-commerce","tag-security","tag-user-generated-content","tag-video","tag-video-api"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ensuring the Security of Assets Uploaded as User-Generated Content<\/title>\n<meta name=\"description\" content=\"Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"User-Generated Content, Part 4: Security\" \/>\n<meta property=\"og:description\" content=\"Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\" \/>\n<meta property=\"og:site_name\" content=\"Cloudinary Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-17T16:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T22:17:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12-png?_i=AA\" \/>\n\t<meta property=\"og:image:width\" content=\"1540\" \/>\n\t<meta property=\"og:image:height\" content=\"847\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#article\",\"isPartOf\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"User-Generated Content, Part 4: Security\",\"datePublished\":\"2020-12-17T16:02:03+00:00\",\"dateModified\":\"2024-10-03T22:17:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA\",\"keywords\":[\"Asset Management\",\"E-commerce\",\"Security\",\"User-Generated Content\",\"Video\",\"Video API\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\/\/cloudinary.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\",\"url\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\",\"name\":\"Ensuring the Security of Assets Uploaded as User-Generated Content\",\"isPartOf\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA\",\"datePublished\":\"2020-12-17T16:02:03+00:00\",\"dateModified\":\"2024-10-03T22:17:40+00:00\",\"description\":\"Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.\",\"breadcrumb\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage\",\"url\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA\",\"contentUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA\",\"width\":1540,\"height\":847},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudinary.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"User-Generated Content, Part 4: Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#website\",\"url\":\"https:\/\/cloudinary.com\/blog\/\",\"name\":\"Cloudinary Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudinary.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#organization\",\"name\":\"Cloudinary Blog\",\"url\":\"https:\/\/cloudinary.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA\",\"contentUrl\":\"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA\",\"width\":312,\"height\":60,\"caption\":\"Cloudinary Blog\"},\"image\":{\"@id\":\"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ensuring the Security of Assets Uploaded as User-Generated Content","description":"Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security","og_locale":"en_US","og_type":"article","og_title":"User-Generated Content, Part 4: Security","og_description":"Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.","og_url":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security","og_site_name":"Cloudinary Blog","article_published_time":"2020-12-17T16:02:03+00:00","article_modified_time":"2024-10-03T22:17:40+00:00","og_image":[{"width":1540,"height":847,"url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12-png?_i=AA","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#article","isPartOf":{"@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security"},"author":{"name":"","@id":""},"headline":"User-Generated Content, Part 4: Security","datePublished":"2020-12-17T16:02:03+00:00","dateModified":"2024-10-03T22:17:40+00:00","mainEntityOfPage":{"@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security"},"wordCount":4,"publisher":{"@id":"https:\/\/cloudinary.com\/blog\/#organization"},"image":{"@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA","keywords":["Asset Management","E-commerce","Security","User-Generated Content","Video","Video API"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/cloudinary.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security","url":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security","name":"Ensuring the Security of Assets Uploaded as User-Generated Content","isPartOf":{"@id":"https:\/\/cloudinary.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage"},"image":{"@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA","datePublished":"2020-12-17T16:02:03+00:00","dateModified":"2024-10-03T22:17:40+00:00","description":"Through automation, Cloudinary ensures that user-uploaded assets are secure and malware free, blurring irrelevant image background or text as you desire.","breadcrumb":{"@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#primaryimage","url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA","contentUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA","width":1540,"height":847},{"@type":"BreadcrumbList","@id":"https:\/\/cloudinary.com\/blog\/user_generated_content_part_4_security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudinary.com\/blog\/"},{"@type":"ListItem","position":2,"name":"User-Generated Content, Part 4: Security"}]},{"@type":"WebSite","@id":"https:\/\/cloudinary.com\/blog\/#website","url":"https:\/\/cloudinary.com\/blog\/","name":"Cloudinary Blog","description":"","publisher":{"@id":"https:\/\/cloudinary.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudinary.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudinary.com\/blog\/#organization","name":"Cloudinary Blog","url":"https:\/\/cloudinary.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA","contentUrl":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649718331\/Web_Assets\/blog\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877\/cloudinary_logo_for_white_bg_1937437aa7_19374666c7_193742f877.png?_i=AA","width":312,"height":60,"caption":"Cloudinary Blog"},"image":{"@id":"https:\/\/cloudinary.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":""}]}},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/cloudinary-marketing\/images\/f_auto,q_auto\/v1649724084\/Web_Assets\/blog\/ugc_security_22250a4b12\/ugc_security_22250a4b12.png?_i=AA","_links":{"self":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts\/22249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/comments?post=22249"}],"version-history":[{"count":10,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts\/22249\/revisions"}],"predecessor-version":[{"id":35853,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/posts\/22249\/revisions\/35853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/media\/22250"}],"wp:attachment":[{"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/media?parent=22249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/categories?post=22249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudinary.com\/blog\/wp-json\/wp\/v2\/tags?post=22249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}