{"id":1168,"date":"2021-03-03T10:11:09","date_gmt":"2021-03-03T04:41:09","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1168"},"modified":"2021-06-07T10:46:50","modified_gmt":"2021-06-07T05:16:50","slug":"what-are-google-gvt1-com-urls-read-this-to-know","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/","title":{"rendered":"What are Google GVT1.com URLs? Read this to know!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Google has multiple domains that caused several malicious problems that may infect the users. These domains include redirector.gvy.1.com and gvt1\/gvt2 subdomains that may cause some malicious problems and raises several questions on the Internet.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, after receiving various queries over the years, cyber experts have investigated and examined these domains to check there is something to worried about or something which is not acceptable.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is gvt1.com?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">After the research, the experts said that the domains that include *gvt1.com and *gvt2.com are the subdomains that were owned by Google and uses to furnishing the Chrome Update, Extension, and other related content.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">As we run Google Chrome now, it just tried to connect the following domains that deal with;<\/p><\/p>\n\n\n\n<ul><li><a href=\"http:\/\/redirectorgvt1.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/redirectorgvt1.com\/<\/a><\/li><li><a href=\"http:\/\/r5---sn-8xgp1vo-ab5z.gvt1.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/r5&#8212;sn-8xgp1vo-ab5z.gvt1.com\/<\/a><\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, these multiple URLs, caused repeatedly confusion among the researchers and developers who are working on the malicious-structure.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"820\" height=\"1024\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-820x1024.jpg\" alt=\"What are Google GVT1.com URLs? Read this to know!\" class=\"wp-image-1169\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-820x1024.jpg 820w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-240x300.jpg 240w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-768x960.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link.jpg 1066w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"688\" height=\"307\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image.jpg\" alt=\"What are Google GVT1.com URLs? Read this to know!\" class=\"wp-image-1170\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image.jpg 688w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image-300x134.jpg 300w\" sizes=\"(max-width: 688px) 100vw, 688px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">However, these gvt.1com domains are already flagged by multiple antivirus products and they are also identified as Indicator of Compromise, and the redirector.gvt1.com are lined with the URL that holds the user\u2019s IP address and other crucial parameters that cause further problems.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Experts who are investigated and traced the link are redirects the larger URL with an arbitrary subdomain and obtained the parameters that are described below;<\/p><\/p>\n\n\n\n<p><a href=\"http:\/\/redirector.gvt1.com\/edgedl\/chromewebstore\/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNmRlQUFXU0o1UkNFTWx3aGRUUHBsWUJUZw\/7819.902.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx\">http:\/\/redirector.gvt1.com\/edgedl\/chromewebstore\/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNmRlQUFXU0o1UkNFTWx3aGRUUHBsWUJUZw\/7819.902.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"734\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image2-1024x734.jpg\" alt=\"What are Google GVT1.com URLs? Read this to know!\" class=\"wp-image-1171\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image2-1024x734.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image2-300x215.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image2-768x551.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image2.jpg 1528w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Should we need to worry about it?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">The simple answer is no because Google is working to fix them in a better way. The domains used gvt1.com works with Google Video Transcoding and further works on the cache server for content and downloads that were used by the Google services and its applications.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">*gvt1.com is simply used by Google for delivering the Official content, updates, and other data to the Chrome browser.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, redirector.gvt1.com is used while assisting multiple Google services that deal with the download of updates and many more. While examining the previous link we know that the URL is ended with .crx.<\/p><\/p>\n\n\n\n<p><a href=\"http:\/\/redirector.gvt1.com\/edgedl\/chromewebstore\/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNmRlQUFXU0o1UkNFTWx3aGRUUHBsWUJUZw\/7819.902.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx\">http:\/\/redirector.gvt1.com\/edgedl\/chromewebstore\/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNmRlQUFXU0o1UkNFTWx3aGRUUHBsWUJUZw\/7819.902.0.1_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx<\/a><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The experts also notified that the extension by Chrome Media Router is a component that was assisted by Chromecast.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The problem is that Google is still using the non-secure HTTP protocol in place of HTTPS while connecting with multiple URLs.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"95\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image3-1024x95.jpg\" alt=\"What are Google GVT1.com URLs? Read this to know!\" class=\"wp-image-1172\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image3-1024x95.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image3-300x28.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image3-768x72.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-image3.jpg 1084w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">However, connecting with HTTP attackers may conduct MITM attacks while executing the downloads differently. In case malware is installed into your PC that it intercepts with HTTP and your security is at risk.<\/p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Summering Up<\/strong><\/h3>\n\n\n\n<p><p style=\"text-align: justify\">While executing or watching *.gvt1.com or *.gvt2.com in the corporate network, Google doesn\u2019t hit the alarm but it starts to download the Chromium browser. Whereas for security and privacy issues Google should be moving towards the HTTPS while preventing the MiTM attacks and the admins also enhance best practices while analyzing the traffic from the URLs.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google has multiple domains that caused several malicious problems that may infect the users. These domains include redirector.gvy.1.com and gvt1\/gvt2 subdomains that may cause some malicious problems and raises several questions on the Internet. However, after receiving various queries over the years, cyber experts have investigated and examined these domains to check there is something [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are Google GVT1.com URLs? Read this to know! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are Google GVT1.com URLs? Read this to know! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Google has multiple domains that caused several malicious problems that may infect the users. These domains include redirector.gvy.1.com and gvt1\/gvt2 subdomains that may cause some malicious problems and raises several questions on the Internet. However, after receiving various queries over the years, cyber experts have investigated and examined these domains to check there is something [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-03T04:41:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:16:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"865\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"What are Google GVT1.com URLs? Read this to know!\",\"datePublished\":\"2021-03-03T04:41:09+00:00\",\"dateModified\":\"2021-06-07T05:16:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\"},\"wordCount\":509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Infosec News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\",\"url\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\",\"name\":\"What are Google GVT1.com URLs? Read this to know! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-03-03T04:41:09+00:00\",\"dateModified\":\"2021-06-07T05:16:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are Google GVT1.com URLs? Read this to know!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are Google GVT1.com URLs? Read this to know! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/","og_locale":"en_US","og_type":"article","og_title":"What are Google GVT1.com URLs? Read this to know! - Xiarch Solutions Private Limited","og_description":"Google has multiple domains that caused several malicious problems that may infect the users. These domains include redirector.gvy.1.com and gvt1\/gvt2 subdomains that may cause some malicious problems and raises several questions on the Internet. However, after receiving various queries over the years, cyber experts have investigated and examined these domains to check there is something [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-03-03T04:41:09+00:00","article_modified_time":"2021-06-07T05:16:50+00:00","og_image":[{"width":865,"height":454,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/google-gtv-1-malicious-link-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"What are Google GVT1.com URLs? Read this to know!","datePublished":"2021-03-03T04:41:09+00:00","dateModified":"2021-06-07T05:16:50+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/"},"wordCount":509,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Infosec News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/","url":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/","name":"What are Google GVT1.com URLs? Read this to know! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-03-03T04:41:09+00:00","dateModified":"2021-06-07T05:16:50+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/what-are-google-gvt1-com-urls-read-this-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What are Google GVT1.com URLs? Read this to know!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1168"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1168"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1168\/revisions"}],"predecessor-version":[{"id":1174,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1168\/revisions\/1174"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1173"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}