{"id":163,"date":"2013-06-28T14:17:00","date_gmt":"2013-06-28T14:17:00","guid":{"rendered":"http:\/\/www.arhixe.com\/?p=163"},"modified":"2013-06-28T14:17:00","modified_gmt":"2013-06-28T14:17:00","slug":"how-to-secure-wireless-wi-fi-home-network","status":"publish","type":"post","link":"https:\/\/thefaddism.com\/?p=163","title":{"rendered":"How to Secure Wireless (Wi-Fi) Home Network"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\">This article describes how you can secure your Wireless Network from  hackers and you\u2019ll also learn about free tools that people generally use  to intercept your Wi-Fi signals.<br \/> <img loading=\"lazy\" decoding=\"async\" align=\"right\" alt=\"Wireless networks (wi-fi)\" height=\"110\" src=\"https:\/\/thefaddism.com\/wp-content\/uploads\/2013\/06\/wifi1.png\" width=\"160\" \/>Wireless  Networking (Wi-Fi) has made it so easy for you to use the computer,  portable media player, mobile phones, video game consoles, and other  wireless devices anywhere in the house without the clutter of cables.<br \/> With  traditional wired networks, it is extremely difficult for someone to  steal your bandwidth but the big problem with wireless signals is that  others can access the Internet using your broadband connection even  while they are in a neighboring building or sitting in a car that\u2019s  parked outside your apartment.<br \/> This practice, also known as piggybacking, is bad for three reasons: <\/p>\n<ul>\n<li>It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.<\/li>\n<li>It will decrease your Internet access speed since you are now sharing the same internet connection with other users.<\/li>\n<li>It  can create a security hazard* as others may hack your computers and  access your personal files through your own wireless network.<\/li>\n<\/ul>\n<p><strong>[*] What do the bad guys use <\/strong>&#8211;  There have been quite a few instances where innocent Internet users  have been arrested for sending hate emails when in reality, their email  accounts where hacked though the unsecured Wi-Fi networks that they had  at home. <a href=\"http:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noopener\">Wireshark<\/a> is a free packet sniffing tool for Linux, Mac and Windows that can scan  traffic flowing though a wireless network including cookies, forms and  other HTTP requests. <\/p>\n<h2>How to Secure Your Wireless Network<\/h2>\n<p>The  good news is that it is not very hard to make your wireless network  secure, which will both prevent others from stealing your internet and  will also prevent hackers from taking control of your computers through  your own wireless network.<br \/> Here a few simple things that you should to secure your wireless network<\/p>\n<h3>Step 1. Open your router settings page<\/h3>\n<p>First, you need to  know how to access your wireless router\u2019s settings. Usually you can do  this by typing in \u201c192.168.1.1\u201d into your web browser, and then enter  the correct user name and password for the router. This is different for  each router, so first check your router\u2019s user manual.<br \/> You can  also use Google to find the manuals for most routers online in case you  lost the printed manual that came with your router purchase. For your  reference, here are direct links to the manufacturer\u2019s site of some  popular router brands \u2013 <a href=\"http:\/\/www.linksysbycisco.com\/US\/en\/support\" target=\"_blank\" rel=\"noopener\">Linksys<\/a>, <a href=\"http:\/\/www.cisco.com\/cisco\/web\/support\/index.html\" target=\"_blank\" rel=\"noopener\">Cisco<\/a>, <a href=\"http:\/\/www.netgear.com\/support.aspx\" target=\"_blank\" rel=\"noopener\">Netgear<\/a>, <a href=\"http:\/\/www.apple.com\/support\/airport\/\" target=\"_blank\" rel=\"noopener\">Apple AirPort<\/a>, <a href=\"http:\/\/www.smc.com\/index.cfm?event=support&amp;localeCode=EN_USA\" target=\"_blank\" rel=\"noopener\">SMC<\/a>, <a href=\"http:\/\/www.dlink.com\/support\/\" target=\"_blank\" rel=\"noopener\">D-Link<\/a>, <a href=\"http:\/\/www.buffalotech.com\/support\/downloads\/\" target=\"_blank\" rel=\"noopener\">Buffalo<\/a>, <a href=\"http:\/\/www.tp-link.com\/support\/download.asp\" target=\"_blank\" rel=\"noopener\">TP-LINK<\/a>, <a href=\"http:\/\/www.3com.com\/swd\/jsp\/user\/downloadsindex.jsp\" target=\"_blank\" rel=\"noopener\">3Com<\/a>, <a href=\"http:\/\/en-us-support.belkin.com\/\" target=\"_blank\" rel=\"noopener\">Belkin<\/a>. <\/p>\n<h3>Step 2. Create a unique password on your router<\/h3>\n<p>Once  you have logged into your router, the first thing you should do to  secure your network is to change the default password* of the router to  something more secure.<br \/> This will prevent others from accessing  the router and you can easily maintain the security settings that you  want. You can change the password from the Administration settings on  your router\u2019s settings page. The default values are generally admin \/  password.<br \/> <strong>[*] What do the bad guys use <\/strong>&#8211;<strong> <\/strong>This is a <a href=\"http:\/\/www.cirt.net\/passwords\" target=\"_blank\" title=\"http:\/\/www.cirt.net\/passwords\" rel=\"noopener\">public database<\/a> of default usernames and passwords of wireless routers, modems,  switches and other networking equipment. For instance, anyone can easily  make out from the database that the factory-default settings for  Linksys equipment can be accessed by using admin for both username and  password fields. <\/p>\n<h3>Step 3. Change your Network\u2019s SSID name<\/h3>\n<p>The  SSID (or Wireless Network Name) of your Wireless Router is usually  pre-defined as \u201cdefault\u201d or is set as the brand name of the router  (e.g., linksys). Although this will not make your network inherently*  more secure, changing the SSID name of your network is a good idea as it  will make it more obvious for others to know which network they are  connecting to.<br \/> This setting is usually under the basic wireless  settings in your router\u2019s settings page. Once this is set, you will  always be sure that you are connecting to the correct Wireless network  even if there are multiple wireless networks in your area. Don\u2019t use  your name, home address or other personal information in the SSID name.<br \/> Also see: <a href=\"http:\/\/www.labnol.org\/internet\/prevent-wifi-theft\/19919\/\">Change Network Name to Prevent Wi-Fi Theft<\/a><br \/> <strong>[*] What do the bad guys use <\/strong>&#8211;<strong> <\/strong>Wi-Fi scanning tools like <a href=\"http:\/\/www.metageek.net\/products\/inssider\" target=\"_blank\" rel=\"noopener\">inSSIDer<\/a> (Windows) and <a href=\"http:\/\/www.kismetwireless.net\/\" target=\"_blank\" rel=\"noopener\">Kismet<\/a> (Mac, Linux) are free and they will allow anyone to find all the  available Wireless Networks in an area even if the routers are not  broadcasting their SSID name. <\/p>\n<h3>Step 4. Enable Network Encryption<\/h3>\n<p>In order to prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.<br \/> There are several encryption methods for wireless settings, including <a href=\"http:\/\/en.wikipedia.org\/wiki\/Wired_Equivalent_Privacy\" target=\"_blank\" rel=\"noopener\">WEP<\/a>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Wi-Fi_Protected_Access\" target=\"_blank\" rel=\"noopener\">WPA<\/a> (WPA-Personal), and <a href=\"http:\/\/en.wikipedia.org\/wiki\/IEEE_802.11i-2004\" target=\"_blank\" rel=\"noopener\">WPA2<\/a> (Wi-Fi Protected Access version 2). WEP is basic encryption and  therefore least secure (i.e., it can be easily cracked*, but is  compatible with a wide range of devices including older hardware,  whereas WPA2 is the most secure but is only compatible with hardware  manufactured <a href=\"http:\/\/www.wi-fi.org\/pressroom_overview.php?newsid=16\" target=\"_blank\" rel=\"noopener\">since 2006<\/a>.<br \/> To  enable encryption on your Wireless network, open the wireless security  settings on your router\u2019s configuration page. This will usually let you  select which security method you wish to choose; if you have older  devices, choose WEP, otherwise go with WPA2. Enter a passphrase to  access the network; make sure to set this to something that would be  difficult for others to guess, and consider using a combination of  letters, numbers, and special characters in the passphrase.<br \/> <strong>[*] What do the bad guys use <\/strong>&#8211;<em> <\/em><a href=\"http:\/\/en.wikipedia.org\/wiki\/Aircrack-ng\" target=\"_blank\" rel=\"noopener\">AirCrack<\/a> and <a href=\"http:\/\/wirelessdefence.org\/Contents\/coWPAttyMain.htm\" target=\"_blank\" rel=\"noopener\">coWPAtty<\/a> are some free tools that allow even non-hackers to crack the WEP \/ WPA  (PSK) keys using dictionary or brute force techniques. A <a href=\"http:\/\/www.youtube.com\/watch?v=4R69KLYC7bg\" target=\"_blank\" rel=\"noopener\">video on YouTube<\/a> suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch. <\/p>\n<h3>Step 5. Filter MAC addresses<\/h3>\n<p>Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mac_address\" target=\"_blank\" rel=\"noopener\">MAC address<\/a> (this has nothing to do with an Apple Mac) just like every computer  connected to the Internet has a unique IP address. For an added layer of  protection, you can add the MAC addresses of all your devices to your  wireless router\u2019s settings so that only the specified devices can  connect to your Wi-Fi network.<br \/> MAC addresses are hard-coded into  your networking equipment, so one address will only let that one device  on the network. It is, unfortunately, <strong>possible to spoof a MAC address*<\/strong>,  but an attacker must first know one of the MAC addresses of the  computers that are connected to your Wireless network before he can  attempt spoofing.<br \/> To enable MAC address filtering, first make a  list of all your hardware devices that you want to connect to your  wireless network**. Find their MAC addresses, and then add them to the  MAC address filtering in your router\u2019s administrative settings. You can  find the MAC address for your computers by opening Command Prompt and  typing in \u201cipconfig \/all\u201d, which will show your MAC address beside the  name \u201cPhysical Address\u201d. You can find the MAC addresses of Wireless  mobile phones and other portable devices under their network settings,  though this will vary for each device.<br \/> <strong>[*] What do the bad guys use <\/strong>&#8211;  Someone can change the MAC address of his or her own computer and can  easily connect to your network since your network allows connection from  devices that have that particular MAC address. Anyone can determine the  MAC address of your device wireless using a sniffing tool like <a href=\"http:\/\/en.wikipedia.org\/wiki\/Nmap\" target=\"_blank\" rel=\"noopener\">Nmap<\/a> and he can then change the MAC address of his own computer using another free tool like <a href=\"http:\/\/devices.natetrue.com\/macshift\/\" target=\"_blank\" rel=\"noopener\">MAC Shift<\/a>. <\/p>\n<h3>Step 6. Reduce the Range of the Wireless Signal<\/h3>\n<p>If  your wireless router has a high range but you are staying in a small  studio apartment, you can consider decreasing the signal range by either  changing the mode of your router to 802.11g (instead of 802.11n or  802.11b) or use a different wireless channel.<br \/> You can also try placing the router under the bed, inside a shoe box or <a href=\"http:\/\/www.labnol.org\/software\/increase-wifi-signal-strength-with-aluminum\/8064\/\">wrap a foil<\/a> around the router antennas so that you can somewhat restrict the direction of signals.<br \/> <strong>Apply the Anti-Wi-Fi Paint<\/strong> \u2013 Researchers <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/8279549.stm\" target=\"_blank\" title=\"Anti-wi-fi paint offers Wireless security\" rel=\"noopener\">have developed<\/a> a special Wi-Fi blocking paint that can help you stop neighbors from  accessing your home network without you having to set up encryption at  the router level. The paint contains chemicals that blocks radio signals  by absorbing them. \u201cBy coating an entire room, Wi-Fi signals can\u2019t get  in and, crucially, can\u2019t get out.\u201d <\/p>\n<h3>Step 7. Upgrade your Router\u2019s firmware<\/h3>\n<p>You  should check the manufacturer\u2019s site occasionally to make sure that  your router is running the latest firmware. You can find the existing  firmware version of your router using from the router\u2019s dashboard at  192.168.*. <\/p>\n<h3>Connect to your Secure Wireless Network<\/h3>\n<p>To  conclude, MAC Address filtering with WPA2 (AES) encryption (and a really  complex passphrase) is probably the best way to secure your wireless  network.<br \/> Once you have enabled the various security settings in  your wireless router, you need to add the new settings to your computers  and other wireless devices so that they all can connect to the Wi-Fi  network. You can select to have your computer automatically connect to  this network, so you won\u2019t have to enter the SSID, passphrase and &nbsp;  other information every time you connect to the Internet.<br \/> <strong>Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals. <\/strong> <\/p>\n<h2>Who is Connected to your Wireless Network<\/h2>\n<p>If you are worried that an outsider may be connecting to the Internet using your Wireless network, try <a href=\"http:\/\/home.comcast.net\/~jay.deboer\/airsnare\/index.html\" target=\"_blank\" rel=\"noopener\">AirSnare<\/a> \u2013 it\u2019s a free utility that will look for unexpected MAC addresses on  your Wireless network as well as to DHCP requests. Another option is  that you open your router\u2019s administration page (using the 192.168.*  address) and look for the DHCP Clients Table (it\u2019s under <strong>Status<\/strong> &gt; <strong>Local Network<\/strong> on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.<br \/> *It  is also a good idea to turn off the router completely when you are not  planning to use the computer for a longer period (like when you are out  shopping). You save on electricity and the door remains 100% shut for  wireless piggybackers.<br \/> **If you ever want to let a new device  connect to your network, you will have to find its MAC address and add  it to your router. If you simple want to let a friend connect to your  wireless network one time, you can remove his MAC address from the  router settings when he or she leaves your place.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This article describes how you can secure your Wireless Network from hackers and you\u2019ll also&#8230;<\/p>\n","protected":false},"author":1,"featured_media":735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-white-hat-help"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.2.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Secure Wireless (Wi-Fi) Home Network - The Faddism<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thefaddism.com\/?p=163\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure Wireless (Wi-Fi) Home Network - The Faddism\" \/>\n<meta property=\"og:description\" content=\"This article describes how you can secure your Wireless Network from hackers and you\u2019ll also...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thefaddism.com\/?p=163\" \/>\n<meta property=\"og:site_name\" content=\"The Faddism\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-28T14:17:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thefaddism.com\/wp-content\/uploads\/2013\/06\/wifi1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"160\" \/>\n\t<meta property=\"og:image:height\" content=\"110\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thefaddism.com\/?p=163\",\"url\":\"https:\/\/thefaddism.com\/?p=163\",\"name\":\"How to Secure Wireless (Wi-Fi) Home Network - The Faddism\",\"isPartOf\":{\"@id\":\"https:\/\/thefaddism.com\/#website\"},\"datePublished\":\"2013-06-28T14:17:00+00:00\",\"dateModified\":\"2013-06-28T14:17:00+00:00\",\"author\":{\"@id\":\"https:\/\/thefaddism.com\/#\/schema\/person\/1b84fda14e3b82a80ecb9c9da1f25c44\"},\"breadcrumb\":{\"@id\":\"https:\/\/thefaddism.com\/?p=163#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thefaddism.com\/?p=163\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thefaddism.com\/?p=163#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thefaddism.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Secure Wireless (Wi-Fi) Home Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thefaddism.com\/#website\",\"url\":\"https:\/\/thefaddism.com\/\",\"name\":\"The Faddism\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thefaddism.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thefaddism.com\/#\/schema\/person\/1b84fda14e3b82a80ecb9c9da1f25c44\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thefaddism.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/597a6e8a8264cf7584d467c244a09bd9e6d1263b00a663bf0dd67049d64d97a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/597a6e8a8264cf7584d467c244a09bd9e6d1263b00a663bf0dd67049d64d97a8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/thefaddism.com\"],\"url\":\"https:\/\/thefaddism.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Secure Wireless (Wi-Fi) Home Network - The Faddism","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thefaddism.com\/?p=163","og_locale":"en_US","og_type":"article","og_title":"How to Secure Wireless (Wi-Fi) Home Network - The Faddism","og_description":"This article describes how you can secure your Wireless Network from hackers and you\u2019ll also...","og_url":"https:\/\/thefaddism.com\/?p=163","og_site_name":"The Faddism","article_published_time":"2013-06-28T14:17:00+00:00","og_image":[{"width":160,"height":110,"url":"https:\/\/thefaddism.com\/wp-content\/uploads\/2013\/06\/wifi1.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/thefaddism.com\/?p=163","url":"https:\/\/thefaddism.com\/?p=163","name":"How to Secure Wireless (Wi-Fi) Home Network - The Faddism","isPartOf":{"@id":"https:\/\/thefaddism.com\/#website"},"datePublished":"2013-06-28T14:17:00+00:00","dateModified":"2013-06-28T14:17:00+00:00","author":{"@id":"https:\/\/thefaddism.com\/#\/schema\/person\/1b84fda14e3b82a80ecb9c9da1f25c44"},"breadcrumb":{"@id":"https:\/\/thefaddism.com\/?p=163#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thefaddism.com\/?p=163"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/thefaddism.com\/?p=163#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thefaddism.com\/"},{"@type":"ListItem","position":2,"name":"How to Secure Wireless (Wi-Fi) Home Network"}]},{"@type":"WebSite","@id":"https:\/\/thefaddism.com\/#website","url":"https:\/\/thefaddism.com\/","name":"The Faddism","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thefaddism.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thefaddism.com\/#\/schema\/person\/1b84fda14e3b82a80ecb9c9da1f25c44","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thefaddism.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/597a6e8a8264cf7584d467c244a09bd9e6d1263b00a663bf0dd67049d64d97a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/597a6e8a8264cf7584d467c244a09bd9e6d1263b00a663bf0dd67049d64d97a8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/thefaddism.com"],"url":"https:\/\/thefaddism.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/thefaddism.com\/index.php?rest_route=\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thefaddism.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thefaddism.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thefaddism.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thefaddism.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=163"}],"version-history":[{"count":0,"href":"https:\/\/thefaddism.com\/index.php?rest_route=\/wp\/v2\/posts\/163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thefaddism.com\/index.php?rest_route=\/wp\/v2\/media\/735"}],"wp:attachment":[{"href":"https:\/\/thefaddism.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thefaddism.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thefaddism.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}