{"id":82778,"date":"2022-02-07T09:18:33","date_gmt":"2022-02-07T08:18:33","guid":{"rendered":"https:\/\/www.hiig.de\/?p=82778"},"modified":"2024-01-31T15:41:53","modified_gmt":"2024-01-31T14:41:53","slug":"reclaiming-digital-autonomy","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/","title":{"rendered":"Reclaiming Digital Autonomy"},"content":{"rendered":"\n<p><strong>In today&#8217;s digital age, all of us depend on a number of large companies to mean well with us: to guard our data, or at least to not abuse it too much without asking. Even if we wanted, we cannot take things into our own hands and reclaim our digital autonomy because too much depends on too many system operators. To help small-time users and sysadmins to fight this dependence, Jan G\u00f6tte and Bj\u00f6rn Scheuermann from HIIG have developed Inertial Hardware Security Modules, or IHSMs. IHSM-equipped low-budget servers provide high security even outside of well-protected data centers and enable us to regain our Digital Autonomy.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Digital Dependencies<\/strong><\/h2>\n\n\n\n<p>The rise of networked computers has revolutionized many aspects of our modern lives. However, in lock-step with all the quality of life improvements that the internet brought us, today we can observe a worrying trend of increasing digital dependency. \u201dOpting out\u201d of the digital life on social media or e-commerce platforms becomes increasingly difficult to sustain. At the same time the power of these platforms over their users is steadily increasing. Anyone who has ever had their Twitter or Facebook account suspended for an alleged Terms of Service violation or who has been locked out of their Google or Amazon account will know how acute this dependency and lack of digital autonomy is. What the platform decides is law and therefore we have to accept complicated and frustrating \u201caccount verification\u201d processes for unnamed \u201csecurity reasons\u201d There is no way for us as users to meaningfully challenge its decisions because we are the platform&#8217;s product, not its customers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Do it Yourself<\/strong><\/h2>\n\n\n\n<p>With <a href=\"https:\/\/www.hiig.de\/sustainable-european-platform-economy\/\" target=\"_blank\" rel=\"noreferrer noopener\">policy solutions to this issue still being in the distant future<\/a>, the next-best approach would be technical, in order to take things into our own hands. On this premise, open-source projects such as <a href=\"https:\/\/nextcloud.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nextcloud<\/a> and <a href=\"https:\/\/joinmastodon.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mastodon<\/a> have created de-centralized alternatives to some of the big platforms. <a href=\"https:\/\/www.hiig.de\/mit-open-mind-und-open-source-das-demokratische-potenzial-gemeinwohlorientierter-ki\/\" target=\"_blank\" rel=\"noreferrer noopener\">Open-source software has great potential<\/a>, but DIY&#8217;ing has a drawback beyond the time spent on installing and maintaining these solutions. While open-source software has made great strides over the last decades and offers viable alternatives to many proprietary, centralized platforms today, this software still has to run on someone&#8217;s computer. This underlying physical infrastructure is where things get complicated. Today, the only real option to run one&#8217;s own digital infrastructure is to rent a server (or part of one) from one of a number of large cloud providers. And in this case, whoever runs the data center ultimately controls access to the data stored within.<\/p>\n\n\n\n<p>At first, this fact of life might not seem concerning. After all, a data center operator would risk a lot if it compromised its customers&#8217; security. However, in the past we have seen several physical attacks targeting high-value data (<a href=\"https:\/\/archive.md\/QpvHA\" target=\"_blank\" rel=\"noreferrer noopener\">Example<\/a>). Large companies can mitigate such attacks by tightly controlling their entire infrastructure, from the application software down to the data center&#8217;s access control systems. For smaller organizations and private individuals, this option does not exist. If we cannot even escape reliance on these large cloud providers if we run our own open-source software, the question becomes what we have really gained through our efforts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Inertial Hardware Security Modules \u2013 first steps towards digital autonomy<\/strong><\/h2>\n\n\n\n<p>At HIIG, Bj\u00f6rn and I have asked ourselves if there might be ways to claw back control over our hardware in order to build a solid foundation for a decentralized software ecosystem.&nbsp; If we can find a way thatsomeone much smaller than an Amazon or Google can build a special physically secure server that is invulnerable to physical attacks, this server can be put into any commercial data center. At the same time it is completely decoupling the security of the data stored in it from the operator of the data center around it.<\/p>\n\n\n\n<p>With Inertial Hardware Security Modules (short, IHSMs) we believe we have developed a promising approach towards this problem. <a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9290)\" target=\"_blank\" rel=\"noreferrer noopener\">You can read the full paper here<\/a>. The gist of our solution is that we are able to build an enclosure that physically protects a server from any attempt at siphoning off its secrets, no matter who tries to attack it. IHSMs are similar to a type of device used in payment processing applications called Hardware Security Modules. Both provide a similar level of security. The main difference is that IHSMs allow much larger systems to be protected and bump both size and computing power from that of a smartphone to that of a server. This is a difference of about factor 100 in space, processing power and cooling capacity. IHSMs are simple to construct and can be built with basic tools that can be found in most electronic labs.<\/p>\n\n\n\n<p>IHSMs work by putting the server&#8217;s mainboard, CPU, and memory inside of a tamper detection \u201cmesh\u201d. This mesh is a very delicate component that will sense when someone tries to cut, drill or poke through it. When tampering is detected, an alarm is activated and all sensitive data inside the server is securely deleted. To make the tamper detection mesh itself hard to tamper with, this mesh is spinning at around the speed of a washing machine during its spin cycle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Trusting and Un-trusting<\/strong><\/h2>\n\n\n\n<p>In computer security terms, what we are doing with IHSMs is that we are \u201cuntrusting\u201d the server&#8217;s physical environment. Computer security has a rather remarkable definition of trust that is pretty much the opposite of all the others. In computer security, trust is a de-facto property of something that we rely on as being good. In computer security, something trusted should be trustworthy (but does not have to be). Contrast that to the common-sense meaning, where something trustworthy should be trusted (but does not have to be).<\/p>\n\n\n\n<p>Untrusting the data center gives us the chance to decouple software security from physical security. Using an IHSM, a comparably small organization such as the HIIG, the Chaos Computer Club, or a small company can operate software on a physical foundation that is as secure as that of the large cloud companies. With the benefit that no one but themselves holds the keys to the data.<\/p>\n\n\n\n<p>Examples for applications where this increased security matters are group chats, cloud photo storages, and calendar and contact synchronization systems. All of these already encrypt the network connection between their user&#8217;s phone or laptop and the server, but only rarely encrypt the actual data stored on these servers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Digital autonomy through your own secure servers<\/strong><\/h2>\n\n\n\n<p>We envision a world where small organizations can gain digital autonomy by building their own secure servers that even a hostile secret service will not be able to compromise physically. As a first step towards this world, our paper is open access, and we have applied <a href=\"https:\/\/www.hiig.de\/freie-technologien-fuer-die-ganze-welt-warum-open-source-hardware-von-oeffentlichem-interesse-ist\/\" target=\"_blank\" rel=\"noreferrer noopener\">the principles of open-source<\/a> <a href=\"https:\/\/www.hiig.de\/freie-technologien-fuer-die-ganze-welt-warum-open-source-hardware-von-oeffentlichem-interesse-ist\/\">hardware<\/a>. All of our code and CAD models are available <a href=\"https:\/\/git.jaseg.de\/ihsm.git\" target=\"_blank\" rel=\"noreferrer noopener\">through git<\/a>.<\/p>\n\n\n\n<p><br>Our full paper introducing Inertial Hardware security Modules has been published at TCHES 22&#8217;1. You can download it for free <a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9290\" target=\"_blank\" rel=\"noreferrer noopener\">here at the publisher&#8217;s website<\/a>.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Freclaiming-digital-autonomy%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Reclaiming%20Digital%20Autonomy https%3A%2F%2Fwww.hiig.de%2Fen%2Freclaiming-digital-autonomy%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Freclaiming-digital-autonomy%2F&subject=Reclaiming%20Digital%20Autonomy\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>We depend on large companies to mean well with us and our data. Jan G\u00f6tte and Bj\u00f6rn Scheuermann developed Inertial Hardware Security Modules, enabeling small-time users and sysadmins to regain digital autonomy.<\/p>\n","protected":false},"author":356,"featured_media":82780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[227,1658],"tags":[1078,1444,1446,1447,992,1087,1445],"class_list":["post-82778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-everyday-life","category-ftif-data-governance-en","tag-autonomy-2","tag-digital-autonomy","tag-diy","tag-ihsm","tag-open-access-2","tag-open-source-3","tag-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Reclaiming Digital Autonomy &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"Jan G\u00f6tte and Bj\u00f6rn Scheuermann have developed Inertial Hardware Security Modules (IHSM), enabeling us to regain our digital autonomy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reclaiming Digital Autonomy &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Jan G\u00f6tte and Bj\u00f6rn Scheuermann have developed Inertial Hardware Security Modules (IHSM), enabeling us to regain our digital autonomy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-07T08:18:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-31T14:41:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/01\/Website_banner_blogpost_digital_autonomy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hauke Odendahl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hauke Odendahl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reclaiming Digital Autonomy &#8211; Digital Society Blog","description":"Jan G\u00f6tte and Bj\u00f6rn Scheuermann have developed Inertial Hardware Security Modules (IHSM), enabeling us to regain our digital autonomy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/","og_locale":"en_US","og_type":"article","og_title":"Reclaiming Digital Autonomy &#8211; Digital Society Blog","og_description":"Jan G\u00f6tte and Bj\u00f6rn Scheuermann have developed Inertial Hardware Security Modules (IHSM), enabeling us to regain our digital autonomy.","og_url":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/","og_site_name":"HIIG","article_published_time":"2022-02-07T08:18:33+00:00","article_modified_time":"2024-01-31T14:41:53+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/01\/Website_banner_blogpost_digital_autonomy.png","type":"image\/png"}],"author":"Hauke Odendahl","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hauke Odendahl","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/"},"author":{"name":"Hauke Odendahl","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/91b3ac6e9a08e6cc5c739126166f02da"},"headline":"Reclaiming Digital Autonomy","datePublished":"2022-02-07T08:18:33+00:00","dateModified":"2024-01-31T14:41:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/"},"wordCount":1168,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/01\/Website_banner_blogpost_digital_autonomy.png","keywords":["autonomy","digital autonomy","DIY","IHSM","open access","open source","server"],"articleSection":["Everyday Life","ftif Data Governance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/","url":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/","name":"Reclaiming Digital Autonomy &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/01\/Website_banner_blogpost_digital_autonomy.png","datePublished":"2022-02-07T08:18:33+00:00","dateModified":"2024-01-31T14:41:53+00:00","description":"Jan G\u00f6tte and Bj\u00f6rn Scheuermann have developed Inertial Hardware Security Modules (IHSM), enabeling us to regain our digital autonomy.","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/01\/Website_banner_blogpost_digital_autonomy.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/01\/Website_banner_blogpost_digital_autonomy.png","width":800,"height":450,"caption":"Banner Blogpost: Reclaim Digital Autonomy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/reclaiming-digital-autonomy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Reclaiming Digital Autonomy"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/91b3ac6e9a08e6cc5c739126166f02da","name":"Hauke Odendahl"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/82778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/356"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=82778"}],"version-history":[{"count":9,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/82778\/revisions"}],"predecessor-version":[{"id":89951,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/82778\/revisions\/89951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/82780"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=82778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=82778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=82778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}