{"id":653,"date":"2018-08-18T19:01:27","date_gmt":"2018-08-18T23:01:27","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?p=653"},"modified":"2018-09-02T19:30:29","modified_gmt":"2018-09-02T23:30:29","slug":"new-tech-drives-autonomous-cars","status":"publish","type":"post","link":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/","title":{"rendered":"New Tech Drives Autonomous Cars"},"content":{"rendered":"<p>Manufacturers are racing to advance autonomous cars while also dealing with technical flaws in automotive systems. The reliability of independent, decision-making systems in vehicles will depend on their data and security. In addition, the development of the new technologies needed for self-driving cars will require significant investment capital.\u00a0To meet\u00a0the demand, investors willing to\u00a0invest capital must accept the risks\u00a0that goes along with\u00a0developing cutting-edge technologies.<\/p>\n<h3><img decoding=\"async\" loading=\"lazy\" class=\"alignleft wp-image-655 size-medium\" style=\"float: left; padding-right: 1em;\" src=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-300x255.jpg\" alt=\"Photo by Moose Photos from Pexels\" width=\"300\" height=\"255\" srcset=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-300x255.jpg 300w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-768x653.jpg 768w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-700x595.jpg 700w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-520x442.jpg 520w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-360x306.jpg 360w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-250x213.jpg 250w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design-100x85.jpg 100w, https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/IOTA-design.jpg 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>IOTA\u00a0Connects Cars<\/h3>\n<p>As reported by <a href=\"https:\/\/www.mintdice.com\/blog\/iota-and-volkswagen-build-autonomous-system-cars\" target=\"_blank\" rel=\"noopener noreferrer\">MintDice<\/a>, Volkswagen is joining forces with <a href=\"https:\/\/www.iota.org\/get-started\/what-is-iota\" target=\"_blank\" rel=\"noopener noreferrer\">IOTA<\/a> to develop autonomous cars. IOTA is an open-source distributed ledger using the Internet of Things to make feeless microtransactions. IOTA&#8217;s platform promises to solve the inefficiencies of the blockchain. Using IOTA\u2019s Tangle architecture, Volkswagen can securely transfer software updates \u201cover-the-air\u201d in their systems of connected cars. As a result, the technology allows autonomous cars to have enough data available to choose the most favorable course of action in unique situations.<\/p>\n<p>While\u00a0offering a promising new technology for car manufacturers, IOTA also has critics. Richard Heart, an <a href=\"https:\/\/bitcoinexchangeguide.com\/prominent-blockchain-youtuber-richard-heart-crushes-iotas-soul-wishes-for-its-death\/\" target=\"_blank\" rel=\"noopener noreferrer\">IOTA critic<\/a>, referred to it as a \u201ctestnet\u201d after seeing his money appear and disappear in his account. Heart believes IOTA is not a secure platform. Additionally, Heart\u00a0describes\u00a0IOTA as being a poorly designed \u201cpiece of node software.\u201d<\/p>\n<h3>Hacking Vulnerabilities<\/h3>\n<p>Flaws\u00a0that exist in vehicles allow hackers to access and manipulate control systems. In 2012, a team of <a href=\"https:\/\/www.reuters.com\/article\/us-autos-cyber-volkswagen\/keyless-systems-of-many-vw-group-cars-can-be-hacked-researchers-idUSKCN10M1JN\" target=\"_blank\" rel=\"noopener noreferrer\">researchers<\/a>, led by Flavio Garcia, uncovered a hacking vulnerability in thousands of vehicle models. The researchers discovered an ignition flaw in keys containing the <a href=\"https:\/\/www.computerworld.com\/article\/2971826\/cybercrime-hacking\/hack-to-steal-cars-with-keyless-ignition-volkswagen-spent-2-years-hiding-flaw.html\" target=\"_blank\" rel=\"noopener noreferrer\">RFID Megamos Crypto transponder<\/a>. The next year, <a href=\"https:\/\/www.thetruthaboutcars.com\/2015\/08\/volkswagen-sued-researchers-hide-key-hacking-flaw\/\" target=\"_blank\" rel=\"noopener noreferrer\">Volkswagen sued the researchers<\/a> to prevent them from publishing their <a href=\"https:\/\/www.usenix.org\/sites\/default\/files\/sec15_supplement.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">research paper<\/a>.\u00a0Volkswagen feared that the paper would increase the risk of car theft.<\/p>\n<p>The United Kingdom High Court issued an injunction to block the release of the research for two years. Finally, Volkswagen allowed the researchers to publish their paper after they removed a sentence containing some calculations on the chip.<\/p>\n<p>In 2016, the <a href=\"https:\/\/www.ic3.gov\/media\/2016\/160317.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">FBI issued a warning<\/a> that cars were vulnerable to hacking. The same year, <a href=\"https:\/\/www.wired.com\/2016\/08\/oh-good-new-hack-can-unlock-100-million-volkswagens\/\" target=\"_blank\" rel=\"noopener noreferrer\">Garcia released more research<\/a> that described a vulnerability that can unlock 100 million Volkswagens.<\/p>\n<h3>Future of Tech Investments<\/h3>\n<p>New\u00a0innovations,\u00a0such as the\u00a0technologies that power autonomous cars, are getting the attention of investors.\u00a0Futuristic technologies, such as\u00a0AI (artificial intelligence) and cryptocurrencies, are attractive to investors, but they also carry a high amount of risk.<\/p>\n<p>To be competitive, <a href=\"https:\/\/www.cnbc.com\/2017\/10\/02\/fintech-everything-youve-always-wanted-to-know-about-financial-technology.html\" target=\"_blank\" rel=\"noopener noreferrer\">FinTech<\/a> (financial technology) aims to disrupt traditional markets to develop complex technologies. An article from CoinCentral,\u00a0<a href=\"https:\/\/coincentral.com\/billionaire-building-ai-blockchain-hub-us\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Billionaire Building a $300 Million AI, Blockchain and Crypto Hub in the U.S<\/em><\/a>, by Elizabeth Gail, discusses how China is leading the U.S. in AI and blockchain technology patents. To attract more tech projects in the U.S., the Connecticut state government granted $10 million to Seven Stars Cloud (SSC). Owner of SSC, Bruno Wu, is planning to build a \u201cFinTech Village\u201d in Hartford. The center will serve as a hub to collaborate on projects involving cryptocurrencies, robotics, and machine learning.<\/p>\n<p>The <a href=\"https:\/\/www.amp.legal\/blog\/icos-help-companies-raise-capital\/\">cryptocurrency market<\/a> continues to be volatile, and the regulations are in their infancy. To learn more about blockchain and cryptocurrency investments,\u00a0see: <a href=\"https:\/\/www.upcounsel.com\/blog\/everything-need-know-cryptocurrency-regulation-right-now\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Everything You Need to Know About Cryptocurrency Regulation (Right Now)<\/em><\/a> by Gary Ross at <a href=\"https:\/\/www.upcounsel.com\/business-attorneys\" target=\"_blank\" rel=\"noopener noreferrer\">UpCounsel<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Manufacturers are racing to advance autonomous cars while also dealing with technical flaws in automotive systems. The reliability of independent, decision-making systems in vehicles will depend on their data and security. In addition, the development [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":658,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[68],"tags":[91,34,84,52],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Tech Drives Autonomous Cars - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Tech Drives Autonomous Cars - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-18T23:01:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-02T23:30:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/racing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\"},\"author\":{\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\"},\"headline\":\"New Tech Drives Autonomous Cars\",\"datePublished\":\"2018-08-18T23:01:27+00:00\",\"dateModified\":\"2018-09-02T23:30:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\"},\"wordCount\":532,\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"keywords\":[\"artificial intelligence\",\"blockchain\",\"cryptocurrency\",\"hackers\"],\"articleSection\":[\"Artificial Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\",\"name\":\"New Tech Drives Autonomous Cars - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2018-08-18T23:01:27+00:00\",\"dateModified\":\"2018-09-02T23:30:29+00:00\",\"description\":\"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Tech Drives Autonomous Cars\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f\",\"name\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g\",\"caption\":\"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+\"},\"description\":\"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.\",\"sameAs\":[\"https:\/\/www.aliceporch.com\",\"https:\/\/www.linkedin.com\/in\/alice-m-porch\/\"],\"url\":\"https:\/\/www.amp.legal\/blog\/author\/amplegal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Tech Drives Autonomous Cars - Cyber Law Blog","description":"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/","og_locale":"en_US","og_type":"article","og_title":"New Tech Drives Autonomous Cars - Cyber Law Blog","og_description":"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.","og_url":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/","og_site_name":"Cyber Law Blog","article_published_time":"2018-08-18T23:01:27+00:00","article_modified_time":"2018-09-02T23:30:29+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2018\/08\/racing.jpg","type":"image\/jpeg"}],"author":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/#article","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/"},"author":{"name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f"},"headline":"New Tech Drives Autonomous Cars","datePublished":"2018-08-18T23:01:27+00:00","dateModified":"2018-09-02T23:30:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/"},"wordCount":532,"publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"keywords":["artificial intelligence","blockchain","cryptocurrency","hackers"],"articleSection":["Artificial Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/","url":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/","name":"New Tech Drives Autonomous Cars - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2018-08-18T23:01:27+00:00","dateModified":"2018-09-02T23:30:29+00:00","description":"Cyber Law Blog explores legal topics with technology including privacy law and cybersecurity.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/new-tech-drives-autonomous-cars\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"New Tech Drives Autonomous Cars"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/2abed582dc9fbf067a8aa30d3e21453f","name":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0913e4ef042f9c502b709824db43e8f?s=96&d=mm&r=g","caption":"Alice M. Porch, Esq., CIPP\/US, C|EH, Security+"},"description":"Alice is a member of the Florida Bar, and she focuses on data privacy and cybersecurity compliance. She attended the Warrington College of Business at the University of Florida and earned a Bachelor of Science in Business Administration. After graduating, she earned a Juris Doctor at the Stetson University College of Law. During law school, she served as an Assistant Executive Editor for Stetson Law Review and also as a Staff Editor for Stetson Journal of Advocacy and the Law. She also served as a member of The Florida Bar Journal\/News Editorial Board from 2018-2024. She is currently a member of the Florida Bar Cybersecurity and Privacy Law Substantive Law Committee.","sameAs":["https:\/\/www.aliceporch.com","https:\/\/www.linkedin.com\/in\/alice-m-porch\/"],"url":"https:\/\/www.amp.legal\/blog\/author\/amplegal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/653"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=653"}],"version-history":[{"count":23,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/653\/revisions"}],"predecessor-version":[{"id":684,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/posts\/653\/revisions\/684"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media\/658"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/categories?post=653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/tags?post=653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}