{"id":3459,"date":"2014-01-14T11:50:22","date_gmt":"2014-01-14T16:50:22","guid":{"rendered":"http:\/\/www.gazelle.com\/thehorn\/?p=3459"},"modified":"2024-03-06T11:07:58","modified_gmt":"2024-03-06T19:07:58","slug":"knox-mobile-security-software-vulnerability-not-a-design-flaw","status":"publish","type":"post","link":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/","title":{"rendered":"KNOX Mobile Security Software Vulnerability Not a Design Flaw"},"content":{"rendered":"<p>In an unusual move, Google and Samsung have released a joint statement claiming that reported flaws in the KNOX mobile security software used in Galaxy S4 Android phones are not really flaws at all. Rather, the vulnerability revealed is a man-in-the-middle (MitM) attack, the companies said. In a technology context, a MitM attack is one in which a malicious party gains access to private communication for the purpose of stealing sensitive information. These attacks can occur\u00a0at any point in the network, and Samsung and Google assert that this does not necessarily reflect a flaw in either KNOX or Android.\u00a0<\/p>\n<p><strong>The Flaw That Wasn&#8217;t<\/strong><\/p>\n<p>Ben-Gurion University Researcher Mordechai Guri reported in late December that he had discovered a hole in the Samsung enterprise mobile security software KNOX, claiming that he had found a way by which an attacker could bypass protected and encrypted data by installing an app into an unsecured compartment of the mobile device. Google and Samsung counter that Guri&#8217;s discovery simply &#8220;demonstrated a classic man-in-the-middle (MitM) attack, which is possible at any point on the network to see unencrypted application data. This research did not identify a flaw or bug in Samsung KNOX or Android.&#8221;<\/p>\n<p>Furthermore, the joint statement\u00a0says that while Guri uses &#8220;legitimate Android network functions in an unintended way to intercept unencrypted network connection,&#8221; no patch is called for, nor will one be forthcoming from either Google or Samsung.<\/p>\n<p><strong>Proper Configuration Can Protect Against MitM Attacks<\/strong><\/p>\n<p>While KNOX may not be the problem, the weakness still exists and Android users sending sensitive data over encrypted networks should ensure their devices are properly configured and that their mobile security software is always up-to-date. Samsung offers three ways to secure devices against MitM attacks, including Mobile Device Management, FIPS 140-2 VPN, and Per-App VPN.<\/p>\n<p>Mobile Device Management is an Android feature designed to ensure that any device containing sensitive data will adhere to an enterprise-specified policy, including a lock on device settings, so that if an attacker attempts to change settings, the Mobile Device Manager can block the attack. KNOX also uses an FIPS 140-2 Level 1 VPN client, a standard which employs cryptographically strong security protocols to protect devices storing or transferring sensitive data. In addition, KNOX employs a Per-App VPN, which only allows traffic from secure applications to be sent through the VPN; the selectivity of this feature gives fine-grained control over device security.<\/p>\n<p>Samsung and Google further assert that the findings from Ben-Gurion University reaffirm the importance of proper device configuration via standard security technologies when sending encrypted data over the Internet.<\/p>\n<p>Will the news of this vulnerability make you think twice about the safety of the KNOX platform?<\/p>\n<p>Image courtesy of <a target=\"_blank\" href=\"http:\/\/commons.wikimedia.org\/wiki\/File:Samsung_Phone_with_Android_Robot_icon.jpg?uselang=en-gb\" rel=\"noopener\">Wikimedia Commons<\/a>\u00a0<\/p>\n<p>[cf]skyword_tracking_tag[\/cf]<\/p>\n","protected":false},"excerpt":{"rendered":"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.","protected":false},"author":4841,"featured_media":3458,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[12,23],"tags":[],"class_list":{"0":"post-3459","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-android-news","8":"category-gazelle-news","9":"cs-entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Knox Mobile Security Software Not Flawed: Google, Samsung<\/title>\n<meta name=\"description\" content=\"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Knox Mobile Security Software Not Flawed: Google, Samsung\" \/>\n<meta property=\"og:description\" content=\"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/\" \/>\n<meta property=\"og:site_name\" content=\"Gazelle The Horn\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-14T16:50:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-06T19:07:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/01\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"547\" \/>\n\t<meta property=\"og:image:height\" content=\"349\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ian C. Paul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gazelle\" \/>\n<meta name=\"twitter:site\" content=\"@gazelle\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian C. Paul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/\"},\"author\":{\"name\":\"Ian C. Paul\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#\\\/schema\\\/person\\\/4dec0a870990cd5ae3524e7654284333\"},\"headline\":\"KNOX Mobile Security Software Vulnerability Not a Design Flaw\",\"datePublished\":\"2014-01-14T16:50:22+00:00\",\"dateModified\":\"2024-03-06T19:07:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/\"},\"wordCount\":464,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg\",\"articleSection\":[\"Android News\",\"Gazelle News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/\",\"name\":\"Knox Mobile Security Software Not Flawed: Google, Samsung\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg\",\"datePublished\":\"2014-01-14T16:50:22+00:00\",\"dateModified\":\"2024-03-06T19:07:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#\\\/schema\\\/person\\\/4dec0a870990cd5ae3524e7654284333\"},\"description\":\"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg\",\"contentUrl\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg\",\"width\":547,\"height\":349,\"caption\":\"Samsung denies flaw in KNOX mobile security software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/2014\\\/01\\\/14\\\/knox-mobile-security-software-vulnerability-not-a-design-flaw\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KNOX Mobile Security Software Vulnerability Not a Design Flaw\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#website\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/\",\"name\":\"Gazelle The Horn\",\"description\":\"Gazelle&#039;s Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/#\\\/schema\\\/person\\\/4dec0a870990cd5ae3524e7654284333\",\"name\":\"Ian C. Paul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5eaf31eed3b9684ed97b827dbeff5095a774280142451efe89b8624464845a94?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5eaf31eed3b9684ed97b827dbeff5095a774280142451efe89b8624464845a94?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5eaf31eed3b9684ed97b827dbeff5095a774280142451efe89b8624464845a94?s=96&d=mm&r=g\",\"caption\":\"Ian C. Paul\"},\"description\":\"Ian C. Paul is a tech analyst and writer that enjoys among other things, travel and electronics. He has contributed to major tech publications and his interests are in smartphones, tablets, web applications, and tech trends. When he is not writing, he is reading or working on one of his latest gadgets.\",\"url\":\"https:\\\/\\\/www.gazelle.com\\\/thehorn\\\/author\\\/sw-34757\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Knox Mobile Security Software Not Flawed: Google, Samsung","description":"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/","og_locale":"en_US","og_type":"article","og_title":"Knox Mobile Security Software Not Flawed: Google, Samsung","og_description":"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.","og_url":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/","og_site_name":"Gazelle The Horn","article_published_time":"2014-01-14T16:50:22+00:00","article_modified_time":"2024-03-06T19:07:58+00:00","og_image":[{"width":547,"height":349,"url":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/01\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg","type":"image\/jpeg"}],"author":"Ian C. Paul","twitter_card":"summary_large_image","twitter_creator":"@gazelle","twitter_site":"@gazelle","twitter_misc":{"Written by":"Ian C. Paul","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#article","isPartOf":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/"},"author":{"name":"Ian C. Paul","@id":"https:\/\/www.gazelle.com\/thehorn\/#\/schema\/person\/4dec0a870990cd5ae3524e7654284333"},"headline":"KNOX Mobile Security Software Vulnerability Not a Design Flaw","datePublished":"2014-01-14T16:50:22+00:00","dateModified":"2024-03-06T19:07:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/"},"wordCount":464,"commentCount":0,"image":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/01\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg","articleSection":["Android News","Gazelle News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/","url":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/","name":"Knox Mobile Security Software Not Flawed: Google, Samsung","isPartOf":{"@id":"https:\/\/www.gazelle.com\/thehorn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#primaryimage"},"image":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/01\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg","datePublished":"2014-01-14T16:50:22+00:00","dateModified":"2024-03-06T19:07:58+00:00","author":{"@id":"https:\/\/www.gazelle.com\/thehorn\/#\/schema\/person\/4dec0a870990cd5ae3524e7654284333"},"description":"Google and Samsung released a joint statement claiming that reported flaws in the KNOX mobile security software are a MitM attack, not a flaw.","breadcrumb":{"@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#primaryimage","url":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/01\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg","contentUrl":"https:\/\/www.gazelle.com\/thehorn\/wp-content\/uploads\/2014\/01\/1024px-Samsung_Phone_with_Android_Robot_icon.jpg","width":547,"height":349,"caption":"Samsung denies flaw in KNOX mobile security software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.gazelle.com\/thehorn\/2014\/01\/14\/knox-mobile-security-software-vulnerability-not-a-design-flaw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gazelle.com\/thehorn\/"},{"@type":"ListItem","position":2,"name":"KNOX Mobile Security Software Vulnerability Not a Design Flaw"}]},{"@type":"WebSite","@id":"https:\/\/www.gazelle.com\/thehorn\/#website","url":"https:\/\/www.gazelle.com\/thehorn\/","name":"Gazelle The Horn","description":"Gazelle&#039;s Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gazelle.com\/thehorn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gazelle.com\/thehorn\/#\/schema\/person\/4dec0a870990cd5ae3524e7654284333","name":"Ian C. Paul","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5eaf31eed3b9684ed97b827dbeff5095a774280142451efe89b8624464845a94?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5eaf31eed3b9684ed97b827dbeff5095a774280142451efe89b8624464845a94?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5eaf31eed3b9684ed97b827dbeff5095a774280142451efe89b8624464845a94?s=96&d=mm&r=g","caption":"Ian C. Paul"},"description":"Ian C. Paul is a tech analyst and writer that enjoys among other things, travel and electronics. He has contributed to major tech publications and his interests are in smartphones, tablets, web applications, and tech trends. When he is not writing, he is reading or working on one of his latest gadgets.","url":"https:\/\/www.gazelle.com\/thehorn\/author\/sw-34757\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts\/3459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/users\/4841"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/comments?post=3459"}],"version-history":[{"count":2,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts\/3459\/revisions"}],"predecessor-version":[{"id":11464,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/posts\/3459\/revisions\/11464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/media\/3458"}],"wp:attachment":[{"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/media?parent=3459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/categories?post=3459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gazelle.com\/thehorn\/wp-json\/wp\/v2\/tags?post=3459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}