{"id":13043,"date":"2024-06-19T08:47:07","date_gmt":"2024-06-19T12:47:07","guid":{"rendered":"https:\/\/coincentral.com\/?p=13043"},"modified":"2024-06-20T13:52:04","modified_gmt":"2024-06-20T17:52:04","slug":"sybil-attack-blockchain","status":"publish","type":"post","link":"https:\/\/coincentral.com\/sybil-attack-blockchain\/","title":{"rendered":"What\u2019s a Sybil Attack &#038; How Do Blockchains Prevent Them?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A Sybil attack is an attempt to control a peer network by creating multiple fake identities. To outside observers, these fake identities appear to be unique users. However, behind the scenes, a single entity controls many identities at once. As a result, that entity can influence the network through additional voting power in a democratic network, or echo chamber messaging in a social network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The United States\u2019 trouble with Russian election influence via fake accounts on social media is an easy-to-understand example of a pseudo-Sybil attack. Although the fake accounts and bots didn\u2019t hack into Facebook or Twitter, they still used multiple identities to influence the entire network. Because Sybil attacks are so subversive and easy to conceal, it can be difficult to tell when a single entity controls many accounts. Indeed, Facebook didn\u2019t even realize the extent of fake accounts on their platform until internal investigations months after much of the damage was already done.<\/span><\/p>\n<figure id=\"attachment_13050\" aria-describedby=\"caption-attachment-13050\" style=\"width: 553px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-13050\" src=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/fakenews.png\" alt=\"fake news\" width=\"553\" height=\"343\" srcset=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/fakenews.png 553w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/fakenews-300x186.png 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><figcaption id=\"caption-attachment-13050\" class=\"wp-caption-text\">Fake news.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The name \u201cSybil attack\u201d comes from a book, <\/span><i><span style=\"font-weight: 400;\">Sybil<\/span><\/i><span style=\"font-weight: 400;\">, about a woman with dissociative identity disorder. Microsoft researchers first investigated and wrote about the implications of Sybil attacks on peer networks in the early 2000s. In this brief guide, we\u2019ll look at the implications of Sybil attacks and how networks can prevent such attacks. If you\u2019re considering using a blockchain platform, it\u2019s important to understand their approach to Sybil threats and undue influence through identity creation on the network.<\/span><\/p>\n<h2><b>What Is a Sybil Attack in Crypto: Disproportionate Control<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A Sybil attack grants undue influence to a single entity simply because that entity controls many pseudonyms. We hear all the time about fake Reddit accounts that upvote posts on behalf of a given company or cause. Amazon sellers can buy fake reviews from accounts around the world. These pseudonyms are hard to detect and remove.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While election meddling on Facebook and fake reviews on Amazon are bad enough, a successful Sybil attack against a blockchain or file transfer network would allow bad actors disproportionate control over the network. If these fake identities receive recognition from the network, they might be able to vote on behalf of various proposals or interrupt the flow of information across the network.<\/span><\/p>\n<figure id=\"attachment_13048\" aria-describedby=\"caption-attachment-13048\" style=\"width: 874px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-13048 size-large\" src=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-874x395.png\" alt=\"sybil diagram\" width=\"874\" height=\"395\" srcset=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-874x395.png 874w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-591x267.png 591w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-621x281.png 621w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-300x136.png 300w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-768x347.png 768w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56-600x271.png 600w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/Screenshot-2018-08-30-at-15.21.56.png 1140w\" sizes=\"(max-width: 874px) 100vw, 874px\" \/><figcaption id=\"caption-attachment-13048\" class=\"wp-caption-text\">Sybil nodes try to influence information flow across a network<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Sybil nodes might also surround and try to influence the information reaching other nodes on the network, gradually influencing the ledger or database through censorship.<\/span><\/p>\n<h2><b>How to Prevent a Sybil Attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Blockchains and peer networks have various options when it comes to preventing Sybil attacks. Each option comes with its own benefits and drawbacks. Hybrid approaches to Sybil prevention, incorporating each of three key elements, are common to address concerns.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Cost to Create an Identity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The first way to mitigate a Sybil attack is to raise the cost of creating a new identity. Since identities can map to entities on a many-to-one ratio, we need a way to make it resource-intensive to create too many identities. The challenge here, though, is there are many legitimate reasons why you might want to operate multiple identities. Redundancy, resource sharing, reliability, and anonymity are all good reasons to create multiple identities on a peer network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ideal cost of identity creation shouldn\u2019t restrict people from joining the network or even creating a handful of identities. Instead, it should be just enough to make it unfeasible to create many identities in a short period of time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Blockchains use the cost of creation as a Sybil protection feature through <\/span><a href=\"https:\/\/coincentral.com\/asic-gpu-cpu-mining\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">mining<\/span><\/a><span style=\"font-weight: 400;\">. In <\/span><a href=\"https:\/\/coincentral.com\/making-sense-of-proof-of-work-vs-proof-of-stake\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">proof of work<\/span><\/a><span style=\"font-weight: 400;\"> algorithms, in order to create a new identity on the mining network, you\u2019ll need another computer with processing power to contribute. This attaches a significant cost to adding hundreds or thousands of pseudonymous nodes that might be able to influence the adoption of a fork or other blockchain vote.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same goes for proof of stake, where purchasing computing power is replaced by staking currency. There\u2019s a cost to join the network and have a vote. That resource requirement limits the number of accounts a bad actor can create.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Chain of Trust<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A second way to fight Sybil attacks is to require some type of trust before allowing a new identity to join the network. This usually takes the form of a reputation system, where only established, long-term users can invite or vouch for new entrants to the network. Other variations rely on a probationary system where new accounts are possible, but they must remain active and unique for a certain period before they receive voting privileges.<\/span><\/p>\n<figure id=\"attachment_13047\" aria-describedby=\"caption-attachment-13047\" style=\"width: 306px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-13047\" src=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/2fa.png\" alt=\"2fa\" width=\"306\" height=\"164\" srcset=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/2fa.png 306w, https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/2fa-300x161.png 300w\" sizes=\"(max-width: 306px) 100vw, 306px\" \/><figcaption id=\"caption-attachment-13047\" class=\"wp-caption-text\">Two-factor authentication is one tactic for Sybil prevention<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The chain of trust also extends to outright identity verification. Some peer networks require you to submit identification before joining. Others allow you to join if you can answer a <\/span><a href=\"https:\/\/coincentral.com\/why-2fa-matters-the-best-types-of-2fa\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">two-factor authenticated<\/span><\/a><span style=\"font-weight: 400;\"> security code. Still others restrict account creation based on IP address.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of these require some level of identity verification or trust building before an account receives voting privileges, making the creation of pseudonyms more challenging.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Unequal Reputation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The final way to mitigate the threat of Sybil attacks is by weighting user power based on reputation. Users who have been around the longest and proven themselves receive more voting power on communal decisions. This makes the system a meritocracy instead of a pure democracy, and it lowers the power of new users. As a result, many new or less-active accounts don\u2019t grant a Sybil attacker any advantage against reputable older, more active accounts.<\/span><\/p>\n<h2><b>Sybil Attacks Are Hard, but Not Impossible, to Prevent<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Sybil attacks involve false identities and hidden motives. As such, they can be difficult to detect and prevent until they\u2019re already ongoing and apparent. Still, networks that implement a combination of these prevention measures see increased protection from Sybil attacks, mitigating the potential severity of the attack if and when it comes.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Sybil attack is an attempt to gain disproportionate control over a peer network by creating many fake identities. Learn how blockchains prevent them.<\/p>\n","protected":false},"author":24,"featured_media":13049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"iawp_total_views":102,"footnotes":""},"categories":[5714],"tags":[5747,12226,17744,5935,7530,17743],"class_list":{"0":"post-13043","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-articles","8":"tag-blockchain","9":"tag-mining","10":"tag-proof-of-work","11":"tag-proof-of-stake","12":"tag-security","13":"tag-sybil-attack"},"wppr_data":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What\u2019s a Sybil Attack &amp; How Do Blockchains Prevent Them? - CoinCentral<\/title>\n<meta name=\"description\" content=\"A Sybil attack is an attempt to gain disproportionate control over a peer network by creating many fake identities. Learn how blockchains prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/coincentral.com\/sybil-attack-blockchain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s a Sybil Attack &amp; How Do Blockchains Mitigate Them?\" \/>\n<meta property=\"og:description\" content=\"A lethal potential attack vector against blockchains, learn about them and keep yourself Sybil sharp.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/coincentral.com\/sybil-attack-blockchain\/\" \/>\n<meta property=\"og:site_name\" content=\"CoinCentral\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-19T12:47:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T17:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1005\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bennett Garner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What\u2019s a Sybil Attack &amp; How Do Blockchains Mitigate Them?\" \/>\n<meta name=\"twitter:description\" content=\"A lethal potential attack vector against blockchains, learn about them and keep yourself Sybil sharp.\" \/>\n<meta name=\"twitter:creator\" content=\"@bennettgarner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bennett Garner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/\",\"url\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/\",\"name\":\"What\u2019s a Sybil Attack & How Do Blockchains Prevent Them? - CoinCentral\",\"isPartOf\":{\"@id\":\"https:\/\/coincentral.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png\",\"datePublished\":\"2024-06-19T12:47:07+00:00\",\"dateModified\":\"2024-06-20T17:52:04+00:00\",\"author\":{\"@id\":\"https:\/\/coincentral.com\/#\/schema\/person\/f25f619861434a4978e9331821e31fd5\"},\"description\":\"A Sybil attack is an attempt to gain disproportionate control over a peer network by creating many fake identities. Learn how blockchains prevent them.\",\"breadcrumb\":{\"@id\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/coincentral.com\/sybil-attack-blockchain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/#primaryimage\",\"url\":\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png\",\"contentUrl\":\"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png\",\"width\":2000,\"height\":1005},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/coincentral.com\/sybil-attack-blockchain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/coincentral.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s a Sybil Attack &#038; How Do Blockchains Prevent Them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/coincentral.com\/#website\",\"url\":\"https:\/\/coincentral.com\/\",\"name\":\"CoinCentral\",\"description\":\"Your Bitcoin, Ethereum, and other Cryptocurrency HQ\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/coincentral.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/coincentral.com\/#\/schema\/person\/f25f619861434a4978e9331821e31fd5\",\"name\":\"Bennett Garner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/coincentral.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/74c436bc232818e77dcd4eb94547fdf8de07bb1d1aeb26787fb41ba3e54efaff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/74c436bc232818e77dcd4eb94547fdf8de07bb1d1aeb26787fb41ba3e54efaff?s=96&r=g\",\"caption\":\"Bennett Garner\"},\"description\":\"Bennett is an editor at Coin Central and freelance technology writer specializing in blockchain, software development, and AI writing. Visit Bennett's personal website to learn more about him and read more of his writing.\",\"sameAs\":[\"https:\/\/www.bennettgarner.com\",\"https:\/\/x.com\/bennettgarner\"],\"url\":\"https:\/\/coincentral.com\/author\/bennett-garner\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s a Sybil Attack & How Do Blockchains Prevent Them? - CoinCentral","description":"A Sybil attack is an attempt to gain disproportionate control over a peer network by creating many fake identities. Learn how blockchains prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/coincentral.com\/sybil-attack-blockchain\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s a Sybil Attack & How Do Blockchains Mitigate Them?","og_description":"A lethal potential attack vector against blockchains, learn about them and keep yourself Sybil sharp.","og_url":"https:\/\/coincentral.com\/sybil-attack-blockchain\/","og_site_name":"CoinCentral","article_published_time":"2024-06-19T12:47:07+00:00","article_modified_time":"2024-06-20T17:52:04+00:00","og_image":[{"width":2000,"height":1005,"url":"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png","type":"image\/png"}],"author":"Bennett Garner","twitter_card":"summary_large_image","twitter_title":"What\u2019s a Sybil Attack & How Do Blockchains Mitigate Them?","twitter_description":"A lethal potential attack vector against blockchains, learn about them and keep yourself Sybil sharp.","twitter_creator":"@bennettgarner","twitter_misc":{"Written by":"Bennett Garner","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/coincentral.com\/sybil-attack-blockchain\/","url":"https:\/\/coincentral.com\/sybil-attack-blockchain\/","name":"What\u2019s a Sybil Attack & How Do Blockchains Prevent Them? - CoinCentral","isPartOf":{"@id":"https:\/\/coincentral.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/coincentral.com\/sybil-attack-blockchain\/#primaryimage"},"image":{"@id":"https:\/\/coincentral.com\/sybil-attack-blockchain\/#primaryimage"},"thumbnailUrl":"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png","datePublished":"2024-06-19T12:47:07+00:00","dateModified":"2024-06-20T17:52:04+00:00","author":{"@id":"https:\/\/coincentral.com\/#\/schema\/person\/f25f619861434a4978e9331821e31fd5"},"description":"A Sybil attack is an attempt to gain disproportionate control over a peer network by creating many fake identities. Learn how blockchains prevent them.","breadcrumb":{"@id":"https:\/\/coincentral.com\/sybil-attack-blockchain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/coincentral.com\/sybil-attack-blockchain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coincentral.com\/sybil-attack-blockchain\/#primaryimage","url":"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png","contentUrl":"https:\/\/coincentral.com\/wp-content\/uploads\/2018\/08\/sybilattackfeat.png","width":2000,"height":1005},{"@type":"BreadcrumbList","@id":"https:\/\/coincentral.com\/sybil-attack-blockchain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/coincentral.com\/"},{"@type":"ListItem","position":2,"name":"What\u2019s a Sybil Attack &#038; How Do Blockchains Prevent Them?"}]},{"@type":"WebSite","@id":"https:\/\/coincentral.com\/#website","url":"https:\/\/coincentral.com\/","name":"CoinCentral","description":"Your Bitcoin, Ethereum, and other Cryptocurrency HQ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/coincentral.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/coincentral.com\/#\/schema\/person\/f25f619861434a4978e9331821e31fd5","name":"Bennett Garner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coincentral.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/74c436bc232818e77dcd4eb94547fdf8de07bb1d1aeb26787fb41ba3e54efaff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/74c436bc232818e77dcd4eb94547fdf8de07bb1d1aeb26787fb41ba3e54efaff?s=96&r=g","caption":"Bennett Garner"},"description":"Bennett is an editor at Coin Central and freelance technology writer specializing in blockchain, software development, and AI writing. Visit Bennett's personal website to learn more about him and read more of his writing.","sameAs":["https:\/\/www.bennettgarner.com","https:\/\/x.com\/bennettgarner"],"url":"https:\/\/coincentral.com\/author\/bennett-garner\/"}]}},"_links":{"self":[{"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/posts\/13043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/comments?post=13043"}],"version-history":[{"count":0,"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/posts\/13043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/media\/13049"}],"wp:attachment":[{"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/media?parent=13043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/categories?post=13043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coincentral.com\/wp-json\/wp\/v2\/tags?post=13043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}