{"id":397,"date":"2017-04-25T16:57:49","date_gmt":"2017-04-25T16:57:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/machine-learning-and-math-cant-trump-smart-attackers\/"},"modified":"2019-05-29T12:17:41","modified_gmt":"2019-05-29T12:17:41","slug":"machine-learning-and-math-cant-trump-smart-attackers","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/","title":{"rendered":"Machine learning and math can\u2019t trump smart attackers"},"content":{"rendered":"<p class=\"wls-paragraph\">When you\u2019ve been fighting black-hat hackers for decades, you learn a thing or two about them. Obviously, they are bad, and they like to play with code. But most importantly, they\u2019re continually learning and you need to keep up if you want to protect your customers\u2019 businesses from their sticky fingers.<\/p>\n<p class=\"wls-paragraph\">Now, if we were a <a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/11\/fighting-post-truth-reality-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">post-truth security vendor<\/a>, we would talk a lot about how our machine learning makes us fit for the fight, or how mathematics can predict an attacker\u2019s every move. We would also try to downplay the fact that even advanced technologies can be fooled by adversaries.<\/p>\n<p><span class=\"block_quote_right\">\u201cNo matter how smart a machine learning algorithm is, it has a narrow focus and learns from a specific data set.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">But at ESET, we value the truth. No matter how smart a machine learning algorithm is, it has a narrow focus and learns from a specific data set. By contrast, attackers possess so-called general intelligence and are able to think outside of the box. They can learn from context and benefit from inspiration, which no machine or algorithm can predict.<\/p>\n<p class=\"wls-paragraph\">Take self-driving cars as an example. These smart machines learn how to drive in an environment with road signs and pre-set rules.<\/p>\n<p class=\"wls-paragraph\">But what if someone covers all the signs or <a href=\"https:\/\/creators.vice.com\/en_us\/article\/meet-the-artist-using-ritual-magic-to-trap-self-driving-cars\" target=\"_blank\" rel=\"noopener noreferrer\">manipulates them<\/a>? Without such a vital component, the cars start to make wrong decisions that can end in a fatal crash, or simply immobilize the vehicle.<\/p>\n<p class=\"wls-paragraph\">In cyberspace, malware writers specialize in such malicious behavior. They try to hide the true purpose of their code, by \u201ccovering\u201d it with obfuscation or encryption. If the algorithm cannot look behind this mask, it can make a wrong decision, labeling a malicious item as clean \u2013 causing a potentially dangerous miss.<\/p>\n<p class=\"wls-paragraph\">However, recognizing the mask doesn\u2019t always reveal the code\u2019s true nature, and without executing the sample there is no way of knowing what is under the hood. To do this ESET uses a simulated environment \u2013 known as sandboxing \u2013 deprecated by many of the post-truth vendors. They claim their technology can recognize malice simply by looking at a sample and doing the \u201cmath\u201d.<\/p>\n<p class=\"wls-paragraph\">How would that work in real life? Try and determine a house\u2019s price just by looking at a picture of it. You can use some features, such as the number of windows or floors to get a rough estimate. But without knowing where the house is located, what is inside, and other details, there is a high probability of error.<\/p>\n<p class=\"wls-paragraph\">On top of that, the mathematics itself contradicts these post-truth claims \u2013 by referring to what\u2019s known as an \u201cundecidable problem\u201d, i.e. determining whether a program will behave maliciously according to its external appearance \u2013 as demonstrated by the computer scientist who formulated the definition of computer virus, <a href=\"http:\/\/vxheaven.org\/lib\/afc01.html\" target=\"_blank\" rel=\"noopener noreferrer\">Fred Cohen<\/a>.<\/p>\n<p class=\"wls-paragraph\">Moreover, in cybersecurity, some problems require so much computational capacity \u2013 or are so time-consuming \u2013 that even a machine learning algorithm would be ineffective in solving them \u2013 making them practically undecidable.<\/p>\n<p class=\"wls-paragraph\">Now put all this information into an equation with a smart, dynamic opponent and your endpoints can end up infected.<\/p>\n<p class=\"wls-paragraph\">ESET has considerable experience with intelligent adversaries and knows that machine learning alone is not enough to protect endpoints. We have been using this technology for years and have fine-tuned it to work with a variety of other layers of protection that are under the hood of our security solutions.<\/p>\n<p class=\"wls-paragraph\">Moreover, our detection engineers and malware researchers constantly supervise \u201cthe machine\u201d to avoid unnecessary errors along the way, ensuring that detection runs smoothly without bothering ESET business customers with false positives.<\/p>\n<p class=\"wls-paragraph\">The whole series:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/11\/fighting-post-truth-reality-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: Fighting post-truth with reality in cybersecurity<\/a><\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/12\/dont-buy-elixir-youth-machine-learning-not-magic\/\" target=\"_blank\" rel=\"noopener noreferrer\">What is machine learning and artificial intelligence?<\/a><\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/18\/pr-reality-collide-truth-machine-learning-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Most frequent misconceptions about ML and AI<\/a><\/li>\n<li>Why ML-based security doesn\u2019t scare intelligent adversaries<\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/05\/02\/single-protective-technology-means-single-point-failure\/\">Why one line of cyberdefense is not enough, even if it\u2019s machine learning<\/a><\/li>\n<li>Chasing ghosts: The real costs of high false positive rates in cybersecurity<\/li>\n<li>How updates make your security solution stronger<\/li>\n<li>We know ML, we\u2019ve been using it for over a decade<\/li>\n<\/ol>\n<p class=\"wls-paragraph\"><strong><em>With contribution of Jakub Debski &amp; Peter Kosinar<\/em><\/strong><\/p>\n<p class=\"wls-paragraph\" style=\"text-align: left;\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/04\/25\/machine-learning-math-cant-trump-smart-attackers\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you\u2019ve been fighting black-hat hackers for decades, you learn a thing or two about them. Obviously, they are bad, and they like to play with code. But most importantly, they\u2019re continually learning and you need to keep up if you want to protect your customers\u2019 businesses from their sticky fingers. Now, if we were<\/p>\n","protected":false},"author":5,"featured_media":1796,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,153],"tags":[],"class_list":["post-397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-hacking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Machine learning and math can\u2019t trump smart attackers - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Machine learning and math can\u2019t trump smart attackers\" \/>\n<meta property=\"og:description\" content=\"When you\u2019ve been fighting black-hat hackers for decades, you learn a thing or two about them. Obviously, they are bad, and they like to play with code. But most importantly, they\u2019re continually learning and you need to keep up if you want to protect your customers\u2019 businesses from their sticky fingers. Now, if we were\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-25T16:57:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:17:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/4.-_WLS_intelligent_adversary-623x410.png\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Machine learning and math can\u2019t trump smart attackers\",\"datePublished\":\"2017-04-25T16:57:49+00:00\",\"dateModified\":\"2019-05-29T12:17:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/\"},\"wordCount\":695,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/4.-_WLS_intelligent_adversary-623x410.png\",\"articleSection\":[\"cybercrime\",\"hacking\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/\",\"name\":\"Machine learning and math can\u2019t trump smart attackers - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/4.-_WLS_intelligent_adversary-623x410.png\",\"datePublished\":\"2017-04-25T16:57:49+00:00\",\"dateModified\":\"2019-05-29T12:17:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/4.-_WLS_intelligent_adversary-623x410.png\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/4.-_WLS_intelligent_adversary-623x410.png\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Machine learning and math can\u2019t trump smart attackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/25\\\/machine-learning-and-math-cant-trump-smart-attackers\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Machine learning and math can\u2019t trump smart attackers - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/","og_locale":"en_US","og_type":"article","og_title":"Machine learning and math can\u2019t trump smart attackers","og_description":"When you\u2019ve been fighting black-hat hackers for decades, you learn a thing or two about them. Obviously, they are bad, and they like to play with code. But most importantly, they\u2019re continually learning and you need to keep up if you want to protect your customers\u2019 businesses from their sticky fingers. Now, if we were","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-04-25T16:57:49+00:00","article_modified_time":"2019-05-29T12:17:41+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/4.-_WLS_intelligent_adversary-623x410.png","type":"image\/png"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Machine learning and math can\u2019t trump smart attackers","datePublished":"2017-04-25T16:57:49+00:00","dateModified":"2019-05-29T12:17:41+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/"},"wordCount":695,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/4.-_WLS_intelligent_adversary-623x410.png","articleSection":["cybercrime","hacking"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/","name":"Machine learning and math can\u2019t trump smart attackers - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/4.-_WLS_intelligent_adversary-623x410.png","datePublished":"2017-04-25T16:57:49+00:00","dateModified":"2019-05-29T12:17:41+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/4.-_WLS_intelligent_adversary-623x410.png","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/4.-_WLS_intelligent_adversary-623x410.png","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Machine learning and math can\u2019t trump smart attackers"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/25\/machine-learning-and-math-cant-trump-smart-attackers\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1796"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}