{"id":24767,"date":"2022-10-31T08:12:38","date_gmt":"2022-10-31T02:42:38","guid":{"rendered":"https:\/\/technonguide.com\/?p=24767"},"modified":"2022-10-31T08:12:38","modified_gmt":"2022-10-31T02:42:38","slug":"2fa-and-how-is-it-better-for-your-smartphone","status":"publish","type":"post","link":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/","title":{"rendered":"What is 2FA and how is it better for your smartphone?"},"content":{"rendered":"<p>Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity didn\u2019t really exist! Post that, cybersecurity was only associated with PC and its users. But today, one needs to protect their PC and mobile phones from data breaches and cyber-attacks.<\/p>\n<p>Given that phones before didn\u2019t run on the internet, a cyber threat wasn\u2019t possible. We all have seen in movies how smart spies always use an old keypad phone to \u2018stay off the grid.\u2019 Because smart phones are well, prone to breaches for data or other malicious elements.<\/p>\n<p>Doesn\u2019t matter if you are using a postpaid sim or a prepaid one, your sim stores a lot of your personal data. Additionally, your smartphone might have saved card data along with CVV, your passwords, and other confidential information. Therefore, you need to secure your phone using every possible cybersecurity practice. 2FA or Two-Factor Authentication is one such effective method.<\/p>\n<p>Today, we will learn more about what is 2FA and how it can protect your smartphones, your online transactions, and more from a potential cyber threat or attack. So, let\u2019s dive into it!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_57_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\" role=\"button\"><label for=\"item-655dedf744f55\" ><span class=\"\"><span style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input aria-label=\"Toggle\" aria-label=\"item-655dedf744f55\"  type=\"checkbox\" id=\"item-655dedf744f55\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#What_is_2FA\" title=\"What is 2FA?\">What is 2FA?<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Methods_involved_in_authenticating_a_user\" title=\"Methods involved in authenticating a user\">Methods involved in authenticating a user<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Knowledge\" title=\"Knowledge\">Knowledge<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Possession\" title=\"Possession\">Possession<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Inherence\" title=\"Inherence\">Inherence<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Benefits_of_2FA\" title=\"Benefits of 2FA\">Benefits of 2FA<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Better_security\" title=\"Better security\">Better security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#Work_securely_on_the_go\" title=\"Work securely on the go\">Work securely on the go<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_2FA\"><\/span>What is 2FA?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We have all heard stories of people getting their social media accounts hacked or phone data breached! Although we set a password for all our login activity, it can sometimes be the weakest link. Most of the passwords are either easily guessed or can be obtained using any malicious code or virus. Sometimes, users can go for days or months without knowing that their password has been compromised.<\/p>\n<p>Therefore, one needs to add multiple layers of security along with username\/password combo.<\/p>\n<p>We will discuss how <a href=\"https:\/\/technonguide.com\/two-factor-authentication-enhance-the-security-of-your-business\/\">2FA<\/a> works further in the article. But before moving on, you need to understand the process used in authenticating a user.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Methods_involved_in_authenticating_a_user\"><\/span>Methods involved in authenticating a user<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>There are 2 primary methods involved for authenticating a user. They are mentioned as follows:<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Knowledge\"><\/span>Knowledge<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Here, knowledge refers to knowing your credentials: username and password. This is something the user knows. Anyone who knows the username and password is given the pass to login and view personal details.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Possession\"><\/span>Possession<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>This method uses a tool which user possesses. The possession of the tool can help in the login. It can be the user\u2019s mobile phone, a security token, etc.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Inherence\"><\/span>Inherence<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Inherence is rather an expensive or less used way of authenticating a person. It involves usage of biometrics or fingerprints.<\/p>\n<p>To explain with an example, if you have an account with a unique username and password which nobody else knows, only you can login into your account. All you need to do is enter your username and password to authenticate yourself. The \u2018knowledge\u2019 of the username and password helps you to authenticate.<\/p>\n<p>Secondly, your mobile phone receives a notification with a unique number or character for logging in. Only you can use your phone to use the unique number or accept\/deny a login request.<\/p>\n<p>Thirdly, your fingerprints and biometrics trait are unique to you. No one can duplicate it. Therefore, by using your unique traits, you are authenticating to access personal data.<\/p>\n<p>2FA is basically adding a second level of authentication or security above these primary authentication methods. Most of the companies these days offer 2FA for Knowledge and Possession authentication methods because they are easier to implement than any inherence method.<\/p>\n<p>With 2FA, a unique passcode or OTP is generated after entering the username\/password or authentication of a security code\/phone. This passcode is sent to the user via mail, SMS, or voice. Users can obtain this passcode using the following token methods:<\/p>\n<ul>\n<li>SMS<\/li>\n<li>Mail<\/li>\n<li>Voice<\/li>\n<li>PC<\/li>\n<li>Phone<\/li>\n<\/ul>\n<p>We hope now you know how 2FA works. Many apps also offer 3FA level of security to protect you and your phone online better.<\/p>\n<p>Now, let\u2019s see some advantages of 2FA or Two-Factor authentication.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_2FA\"><\/span>Benefits of 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two levels of security can help you as an individual and employee both.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Better_security\"><\/span>Better security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>As we have mentioned before, 2FA gives better security for your smartphone and apps. By asking a second form of identification, it is difficult for a hacker to pretend to be the user and gain access to personal data. Even if the hacker has somehow got the access to the password, they can\u2019t get access to SMS sent code on the original user\u2019s phone.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Work_securely_on_the_go\"><\/span>Work securely on the go<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>With 2FA level of security in place, employees can access confidential data without any fear of compromising corporate\u2019s confidential information.<\/p>\n<p>Well, you can now upgrade to <a href=\"https:\/\/www.airtel.in\/5g-network\/\">Airtel 5G network<\/a> or any other 5G network soon. With better speed, your tasks will become heavily dependent on internet and smartphone. Therefore, you need to create a secure online and offline environment for yourself to protect your personal and confidential data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can you imagine the olden era without cellphones?! The communication was not instant, and the<\/p>\n","protected":false},"author":1,"featured_media":24768,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1171],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is 2FA and how is it better for your smartphone?<\/title>\n<meta name=\"description\" content=\"Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is 2FA and how is it better for your smartphone?\" \/>\n<meta property=\"og:description\" content=\"Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\" \/>\n<meta property=\"og:site_name\" content=\"Technonguide\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-31T02:42:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/technonguide.com\/wp-content\/uploads\/2022\/10\/smartphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"437\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Technonguide\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Technonguide\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\"},\"author\":{\"name\":\"Technonguide\",\"@id\":\"https:\/\/technonguide.com\/#\/schema\/person\/e45f50900658e974034d2b6f1c2e2c34\"},\"headline\":\"What is 2FA and how is it better for your smartphone?\",\"datePublished\":\"2022-10-31T02:42:38+00:00\",\"dateModified\":\"2022-10-31T02:42:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\"},\"wordCount\":814,\"publisher\":{\"@id\":\"https:\/\/technonguide.com\/#organization\"},\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\",\"url\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\",\"name\":\"What is 2FA and how is it better for your smartphone?\",\"isPartOf\":{\"@id\":\"https:\/\/technonguide.com\/#website\"},\"datePublished\":\"2022-10-31T02:42:38+00:00\",\"dateModified\":\"2022-10-31T02:42:38+00:00\",\"description\":\"Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity\",\"breadcrumb\":{\"@id\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/technonguide.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is 2FA and how is it better for your smartphone?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/technonguide.com\/#website\",\"url\":\"https:\/\/technonguide.com\/\",\"name\":\"Technonguide\",\"description\":\"Informative Technology Guide\",\"publisher\":{\"@id\":\"https:\/\/technonguide.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/technonguide.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/technonguide.com\/#organization\",\"name\":\"Technonguide\",\"url\":\"https:\/\/technonguide.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/technonguide.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/technonguide.com\/wp-content\/uploads\/2021\/06\/cropped-cropped-onlinelogomaker-061221-1840-1603-500.jpg\",\"contentUrl\":\"https:\/\/technonguide.com\/wp-content\/uploads\/2021\/06\/cropped-cropped-onlinelogomaker-061221-1840-1603-500.jpg\",\"width\":524,\"height\":103,\"caption\":\"Technonguide\"},\"image\":{\"@id\":\"https:\/\/technonguide.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/technonguide.com\/#\/schema\/person\/e45f50900658e974034d2b6f1c2e2c34\",\"name\":\"Technonguide\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/technonguide.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fa8e57347460adf98b4c72c2631aa627?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fa8e57347460adf98b4c72c2631aa627?s=96&d=mm&r=g\",\"caption\":\"Technonguide\"},\"description\":\"Technonguide is an IOT guide for Latest technology News, Trends, and Updates for professionals in digital marketing, social media, web analytics, content marketing, digital strategy.\",\"sameAs\":[\"https:\/\/technonguide.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is 2FA and how is it better for your smartphone?","description":"Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/","og_locale":"en_US","og_type":"article","og_title":"What is 2FA and how is it better for your smartphone?","og_description":"Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity","og_url":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/","og_site_name":"Technonguide","article_published_time":"2022-10-31T02:42:38+00:00","og_image":[{"width":612,"height":437,"url":"https:\/\/technonguide.com\/wp-content\/uploads\/2022\/10\/smartphone.jpg","type":"image\/jpeg"}],"author":"Technonguide","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Technonguide","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#article","isPartOf":{"@id":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/"},"author":{"name":"Technonguide","@id":"https:\/\/technonguide.com\/#\/schema\/person\/e45f50900658e974034d2b6f1c2e2c34"},"headline":"What is 2FA and how is it better for your smartphone?","datePublished":"2022-10-31T02:42:38+00:00","dateModified":"2022-10-31T02:42:38+00:00","mainEntityOfPage":{"@id":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/"},"wordCount":814,"publisher":{"@id":"https:\/\/technonguide.com\/#organization"},"articleSection":["Mobile"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/","url":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/","name":"What is 2FA and how is it better for your smartphone?","isPartOf":{"@id":"https:\/\/technonguide.com\/#website"},"datePublished":"2022-10-31T02:42:38+00:00","dateModified":"2022-10-31T02:42:38+00:00","description":"Can you imagine the olden era without cellphones?! The communication was not instant, and the word cybersecurity","breadcrumb":{"@id":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/technonguide.com\/2fa-and-how-is-it-better-for-your-smartphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/technonguide.com\/"},{"@type":"ListItem","position":2,"name":"What is 2FA and how is it better for your smartphone?"}]},{"@type":"WebSite","@id":"https:\/\/technonguide.com\/#website","url":"https:\/\/technonguide.com\/","name":"Technonguide","description":"Informative Technology Guide","publisher":{"@id":"https:\/\/technonguide.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/technonguide.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/technonguide.com\/#organization","name":"Technonguide","url":"https:\/\/technonguide.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/technonguide.com\/#\/schema\/logo\/image\/","url":"https:\/\/technonguide.com\/wp-content\/uploads\/2021\/06\/cropped-cropped-onlinelogomaker-061221-1840-1603-500.jpg","contentUrl":"https:\/\/technonguide.com\/wp-content\/uploads\/2021\/06\/cropped-cropped-onlinelogomaker-061221-1840-1603-500.jpg","width":524,"height":103,"caption":"Technonguide"},"image":{"@id":"https:\/\/technonguide.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/technonguide.com\/#\/schema\/person\/e45f50900658e974034d2b6f1c2e2c34","name":"Technonguide","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/technonguide.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fa8e57347460adf98b4c72c2631aa627?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa8e57347460adf98b4c72c2631aa627?s=96&d=mm&r=g","caption":"Technonguide"},"description":"Technonguide is an IOT guide for Latest technology News, Trends, and Updates for professionals in digital marketing, social media, web analytics, content marketing, digital strategy.","sameAs":["https:\/\/technonguide.com"]}]}},"_links":{"self":[{"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/posts\/24767"}],"collection":[{"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/comments?post=24767"}],"version-history":[{"count":1,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/posts\/24767\/revisions"}],"predecessor-version":[{"id":24769,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/posts\/24767\/revisions\/24769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/media\/24768"}],"wp:attachment":[{"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/media?parent=24767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/categories?post=24767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technonguide.com\/wp-json\/wp\/v2\/tags?post=24767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}