{"id":1641,"date":"2020-10-04T07:39:05","date_gmt":"2020-10-04T14:39:05","guid":{"rendered":"https:\/\/betterdefend.com\/?p=1641"},"modified":"2020-10-04T07:40:06","modified_gmt":"2020-10-04T14:40:06","slug":"protecting-your-privacy-with-secure-browsers","status":"publish","type":"post","link":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/","title":{"rendered":"Protecting Your Privacy with Secure Browsers"},"content":{"rendered":"

Imagine that your browser is the surfboard that you use to surf the World Wide Web. Just like how a surfboard allows you to cruise and glide from one point to another, your web browser also ferries you around to different websites you want to visit.
\nBecause of this, your web browser has precise knowledge on what sites you have visited, what content you usually search for, and how long you usually stay browsing a particular website. It also retains sensitive personal information like login credentials, auto-fill information, bank accounts, and even your political leanings and sexual preferences.
\nIt only makes sense that you\u2019d want to keep your personal browser as secure as it can be with all the information it has stored. But how exactly do you make sure that the browser you\u2019re using is secure? What security features and privacy policies should you consider when looking for the safest browser to use? In this guide, we will take a closer look at why it is important to use a secure browser, and why \u201cprivate\u201d or \u201cincognito\u201d just doesn\u2019t cut it when it comes to security and privacy.<\/p>\n

Online Tracking<\/h2>\n

Browsers, advertising agencies, and third-party trackers use two tools to monitor you when you\u2019re surfing the web \u2013 cookies and device fingerprinting.<\/p>\n

Cookies (a.k.a HTTP cookies) are used by websites or services to differentiate your browser from others, much like how a nametag works. They are tiny data packets planted on your browser while you\u2019re browsing a particular site.<\/p>\n

Digital Fingerprinting, on the other hand, is when websites take a peek at your device\u2019s characteristics until they have enough data to identify and follow you. This includes the make and model of your device, your browser, plugins you have installed, and even the time zone you are currently in. This method can be surprisingly accurate, so you may want to check if your device\u2019s fingerprint can be easily identified.<\/p>\n

Unsafe Browsers<\/h3>\n

Now that you\u2019re aware of how you can be tracked online, what are the other factors you should think about before you choose a browser to use?<\/p>\n

\u2022 Online activity logging \u2013 In 2019, A Washington Post article reported that Google Chrome, the most popular web browser that handles over 60 percent of web traffic, gathers an estimate of 11, 000 trackers in an average week. That\u2019s 11,000 pairs of eyes peeking at your activities every time you\u2019re on the net. Online activity recording is usually done to create targeted ads, and although this isn\u2019t really considered a threat it can be considered a breach of your privacy.
\n\u2022 Sensitive data vulnerability \u2013 Have you given your browser special permission to store sensitive data (i.e. login credentials, auto-fill information, bank accounts, etc.)? If you did, like most Internet users, you\u2019re at risk of having your data stolen when your browser becomes compromised. Hackers will have access to sensitive personal information and the risk of falling prey to fraudulent activities significantly doubles.
\n\u2022 Software weak spots \u2013 A poorly configured browser and some programming errors are weak spots that may eventually become access points for hackers to steal your data.<\/p>\n

\u2022 Risky browser extensions \u2013 Browser extensions are notorious for sometimes being tools of cybercriminals to gain access and compromise your device. In one incident, hackers were able to infiltrate the Google Chrome Web Store after getting hold of a developer\u2019s credentials via a phishing email. Cybercriminals were able to hijack various extension programs and cause harm to thousands of users even before the developers realized what has happened to their program.<\/p>\n

Secure Browsers for Your Privacy and Safety<\/h2>\n

There are two main factors you should always look at when choosing a secure browser to use \u2013 Security and Privacy.<\/p>\n

When talking about privacy, always consider how much data the browser is collecting about you and who or where they share this data with. For security, make sure that your browser gives solid protection from online exploits, vulnerabilities, and hackers.<\/p>\n

Best Secure and Privacy-first Browsers<\/h3>\n

Please keep in mind that opinions about browser privacy and security will always differ. Although this article discusses and touts some browsers as the best when it comes to security and privacy, they are, by no means, the be-all and end-all of secure browsers. Instead, think of this as a guide to help you choose which browser is the best fit for your unique needs.<\/p>\n

1) Firefox (Newest version modified and tweaked for privacy)<\/strong><\/p>\n

Let\u2019s start the list with a browser that we\u2019re all familiar with. Mozilla Firefox is one of the top three popular browsers on the net, just behind Chrome and Safari.<\/p>\n

Recently, Firefox developers have improved their browser\u2019s privacy protection features. Some of these improvements include an upgraded version of anti- digital fingerprinting and an enhanced version of online tracking protection features. Both these recent improvements make it a lot harder for trackers to keep tabs on your movement on the net. With the not-for-profit Mozilla Foundation, you can be sure that your data is not sold to third parties (unlike other corporate giants), in fact, the developers of Firefox go beyond their way to protect you and your activities from said third parties.<\/p>\n

One feature you\u2019ll really enjoy with Firefox is that almost everything can be customized according to your needs \u2013 from blocking trackers to hiding your location. You can rest easy knowing that Firefox will never share your location without your consent.<\/p>\n

When you use Firefox\u2019s \u201cincognito\u201d mode, your login information, cookies, and browsing history are erased as soon as you log off. It also blocks all online trackers that try to latch on to your connection, and it goes one step further by cleaning up data-hungry sites such as Facebook.<\/p>\n

Keep in mind, however, that the only way to truly protect yourself is to use a VPN with Firefox (or any browser for that matter) whenever you surf the net.<\/p>\n

2) Tor (The Onion Router) Browser<\/strong><\/p>\n

If privacy and anonymity are your top priorities, then Tor is your best bet. A Firefox based browser, Tor has basically the same source but has been tweaked to be utilized on the Tor network.<\/p>\n

On the Tor browser, your (encrypted) traffic is routed through at least three nodes before landing on the website you want to go to. Each node can only access one part of the encryption, meaning not one of the three servers have direct access to your originating IP address and the site you want to visit. With this setup, the browser has no way of keeping track of your online activities. Your cookie cache and browsing history are deleted every time you close your browser, and the browser is specially formatted to block trackers and prevent digital fingerprinting.<\/p>\n

Of course, where there’s good, there is also bad. One downside of this very strict privacy policy is that the browser also blocks many plugins that most websites depend on. While it is true that some plugins can expose your information, blocking them also renders some websites unusable. Also, you may be forced to perform endless verification processes when you try to access some websites.<\/p>\n

Another factor to consider before using the Tor browser is the way it affects your connection speed. Because it runs through the Tor network and your encrypted traffic goes through three different nodes before it reaches the site you want to access, Tor can significantly slow down your connection speed. If you stream video or music files heavily or play online games most of the time then perhaps Tor is not the best option for you.<\/p>\n

3) Brave Browser<\/strong><\/p>\n

If you rely heavily on Google Chrome but are looking to switch to a more secure version then you might want to consider Brave. Brave is an open-source browser based on Chromium \u2013 an open-source version of the Google Chrome browser.<\/p>\n

Don\u2019t be alarmed, though! Just because it is based on Google Chrome doesn\u2019t mean it also stores data about your online activities. You also don\u2019t have to worry about blocking trackers as Brave has made this process easy. With other browsers, users are asked to choose which plugins and extensions they should download. Brave, however, comes fully equipped with its own set. It can automatically block all advertising and third-party cookies and ensures all your connections are HTTPS encrypted since HTTPS everywhere is already built-in. You also get fingerprinting protection when you use this browser.<\/p>\n

One notable thing about Brave is how it encourages websites not to rely on advertisements based on tracking users on the Internet. Brave has developed a system that allows users to reward creators and websites they visit often.
\nRecently, however, Brave has received online criticism due to the launch of its own ad program despite offering \u201cad blocking\u201d features. Some users have called this move hypocritical for a browser marketing itself as a \u201cprivacy\u201d browser.<\/p>\n

4) Iridium Browser<\/strong><\/p>\n

Like Brave, Iridium is also a secure browser based on Chromium. If you are looking for a secure browser that supports Chrome extensions, then you might want to give Iridium a try. This browser supports Windows, macOS, and Linux, but not Android and iOS.<\/p>\n

According to Iridium\u2019s official website, the browser prevents the automatic transmission of partial queries, metrics to central services, and keywords unless given permission by the user. The browser claims that it offers several privacy and security upgrades over Google Chrome, as well as regular updates and releases.<\/p>\n

5) DuckDuckGo Browser<\/strong><\/p>\n

DuckDuckGo is a little different from all the other browsers we have previously mentioned. How so? There is no available desktop browser for DuckDuckGo, meaning you can only utilize this particular browser on your mobile phone or your tablet. Thankfully, it supports both iOS and Android.<\/p>\n

With this browser, you can be sure that your browsing history is safe from prying eyes. If you want to delete your browsing history, simply tap a single button and voila! Your browsing history is… history! Much like the other browsers mentioned on this guide, DuckDuckGo also blocks trackers, provides HTTPS encryption for all sites, and automatically blocks ads.<\/p>\n

A very interesting feature of DuckDuckGo that you won\u2019t find on other browsers is the \u201cPrivacy Grade\u201d it awards every site you visit. This feature allows users to evaluate the amount of data the websites collect from them, whether or not they are under DuckDuckGo\u2019s protection.<\/p>\n

The Dangers of \u201cIncognito Browsing\u201d and Why Using a VPN is Still the Way to Go<\/h2>\n

A lot of people foster the false notion that \u201cprivate\u201d or \u201cincognito\u201d browsing is synonymous to secure browsing.<\/p>\n

What actually happens when you use \u201cincognito\u201d mode? You are simply stopping your browser from saving your browsing history, passwords, and cookies, but this doesn\u2019t really make anything \u201cprivate\u201d. Why, you ask? First, your ISP can still see whatever websites you visit. This poses a risk because ISPs have been given permission to keep track of their clients\u2019 online activities and hand over this information to third parties or authorities. Second, your originating IP address and location are still very much exposed to everyone (sites, trackers, and ads) online. Having your originating IP address and location exposed makes you a very easy target for tracking and identification. Remember that a unique IP address is assigned to your device, which links back to your identity through your ISP.<\/p>\n

So how do we solve this problem? As mentioned earlier, it isn\u2019t enough for you to simply rely on the protection afforded to you by a secure browser. Any expert would strongly recommend coupling your secure browser with a solid VPN service. Surfing the net with a secure browser and a VPN offers several benefits.<\/p>\n

\u2022 Aside from the encryption provided by your secure browser, a VPN also encrypts your Internet traffic making it next to impossible for your ISP to take a peep at what you\u2019re doing online. If they really wanted to see your online activities, your ISP would have to spend an extra amount of effort and resources to decrypt your internet traffic.<\/p>\n

\u2022 Connecting to a VPN server hides your originating IP address and location. Instead, the IP address and location of the server you choose to connect to will replace your original one making it appear that you are anywhere around the world except your original location.<\/p>\n

\u2022 VPN services allow you to bypass some censorships and access geo-restricted content, like streaming Netflix from anywhere around the globe.<\/p>\n","protected":false},"excerpt":{"rendered":"

Imagine that your browser is the surfboard that you use to surf the World Wide Web. Just like how a surfboard allows you to cruise and … <\/p>\n

Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":1643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[12],"tags":[],"yoast_head":"\nProtecting Your Privacy with Secure Browsers - BetterDefend<\/title>\n<meta name=\"description\" content=\"What's a secure browser? In this article we discuss the top 5 best browsers to protect your privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Your Privacy with Secure Browsers - BetterDefend\" \/>\n<meta property=\"og:description\" content=\"What's a secure browser? In this article we discuss the top 5 best browsers to protect your privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\" \/>\n<meta property=\"og:site_name\" content=\"BetterDefend\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T14:39:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-04T14:40:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/betterdefend.com\/wp-content\/uploads\/2020\/10\/1920px-Tor-logo-2011-flat.svg.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1161\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Robert Dale\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Dale\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\"},\"author\":{\"name\":\"Robert Dale\",\"@id\":\"https:\/\/betterdefend.com\/#\/schema\/person\/6e9743dbb1e3ee8fe6fbb2aa557267da\"},\"headline\":\"Protecting Your Privacy with Secure Browsers\",\"datePublished\":\"2020-10-04T14:39:05+00:00\",\"dateModified\":\"2020-10-04T14:40:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\"},\"wordCount\":2080,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/betterdefend.com\/#organization\"},\"articleSection\":[\"VPN News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\",\"url\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\",\"name\":\"Protecting Your Privacy with Secure Browsers - BetterDefend\",\"isPartOf\":{\"@id\":\"https:\/\/betterdefend.com\/#website\"},\"datePublished\":\"2020-10-04T14:39:05+00:00\",\"dateModified\":\"2020-10-04T14:40:06+00:00\",\"description\":\"What's a secure browser? In this article we discuss the top 5 best browsers to protect your privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/betterdefend.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Your Privacy with Secure Browsers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/betterdefend.com\/#website\",\"url\":\"https:\/\/betterdefend.com\/\",\"name\":\"BetterDefend\",\"description\":\"Security News, Tools, and Reviews\",\"publisher\":{\"@id\":\"https:\/\/betterdefend.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/betterdefend.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/betterdefend.com\/#organization\",\"name\":\"BetterDefend.com\",\"url\":\"https:\/\/betterdefend.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/betterdefend.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/betterdefend.com\/wp-content\/uploads\/2020\/08\/bd-logo-black.png\",\"contentUrl\":\"https:\/\/betterdefend.com\/wp-content\/uploads\/2020\/08\/bd-logo-black.png\",\"width\":700,\"height\":140,\"caption\":\"BetterDefend.com\"},\"image\":{\"@id\":\"https:\/\/betterdefend.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/betterdefend.com\/#\/schema\/person\/6e9743dbb1e3ee8fe6fbb2aa557267da\",\"name\":\"Robert Dale\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/betterdefend.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/42c056f392e75f0b4792161b767caa7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/42c056f392e75f0b4792161b767caa7e?s=96&d=mm&r=g\",\"caption\":\"Robert Dale\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Your Privacy with Secure Browsers - BetterDefend","description":"What's a secure browser? In this article we discuss the top 5 best browsers to protect your privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Your Privacy with Secure Browsers - BetterDefend","og_description":"What's a secure browser? In this article we discuss the top 5 best browsers to protect your privacy.","og_url":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/","og_site_name":"BetterDefend","article_published_time":"2020-10-04T14:39:05+00:00","article_modified_time":"2020-10-04T14:40:06+00:00","og_image":[{"width":1920,"height":1161,"url":"https:\/\/betterdefend.com\/wp-content\/uploads\/2020\/10\/1920px-Tor-logo-2011-flat.svg.png","type":"image\/png"}],"author":"Robert Dale","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Robert Dale","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#article","isPartOf":{"@id":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/"},"author":{"name":"Robert Dale","@id":"https:\/\/betterdefend.com\/#\/schema\/person\/6e9743dbb1e3ee8fe6fbb2aa557267da"},"headline":"Protecting Your Privacy with Secure Browsers","datePublished":"2020-10-04T14:39:05+00:00","dateModified":"2020-10-04T14:40:06+00:00","mainEntityOfPage":{"@id":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/"},"wordCount":2080,"commentCount":0,"publisher":{"@id":"https:\/\/betterdefend.com\/#organization"},"articleSection":["VPN News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/","url":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/","name":"Protecting Your Privacy with Secure Browsers - BetterDefend","isPartOf":{"@id":"https:\/\/betterdefend.com\/#website"},"datePublished":"2020-10-04T14:39:05+00:00","dateModified":"2020-10-04T14:40:06+00:00","description":"What's a secure browser? In this article we discuss the top 5 best browsers to protect your privacy.","breadcrumb":{"@id":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/betterdefend.com\/protecting-your-privacy-with-secure-browsers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/betterdefend.com\/"},{"@type":"ListItem","position":2,"name":"Protecting Your Privacy with Secure Browsers"}]},{"@type":"WebSite","@id":"https:\/\/betterdefend.com\/#website","url":"https:\/\/betterdefend.com\/","name":"BetterDefend","description":"Security News, Tools, and Reviews","publisher":{"@id":"https:\/\/betterdefend.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/betterdefend.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/betterdefend.com\/#organization","name":"BetterDefend.com","url":"https:\/\/betterdefend.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/betterdefend.com\/#\/schema\/logo\/image\/","url":"https:\/\/betterdefend.com\/wp-content\/uploads\/2020\/08\/bd-logo-black.png","contentUrl":"https:\/\/betterdefend.com\/wp-content\/uploads\/2020\/08\/bd-logo-black.png","width":700,"height":140,"caption":"BetterDefend.com"},"image":{"@id":"https:\/\/betterdefend.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/betterdefend.com\/#\/schema\/person\/6e9743dbb1e3ee8fe6fbb2aa557267da","name":"Robert Dale","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/betterdefend.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/42c056f392e75f0b4792161b767caa7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42c056f392e75f0b4792161b767caa7e?s=96&d=mm&r=g","caption":"Robert Dale"}}]}},"_links":{"self":[{"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/posts\/1641"}],"collection":[{"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/comments?post=1641"}],"version-history":[{"count":0,"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/posts\/1641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/media\/1643"}],"wp:attachment":[{"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/media?parent=1641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/categories?post=1641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/betterdefend.com\/wp-json\/wp\/v2\/tags?post=1641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}