{"id":1263,"date":"2021-08-11T14:58:30","date_gmt":"2021-08-11T11:58:30","guid":{"rendered":"https:\/\/airome.tech\/?p=1263"},"modified":"2023-09-19T18:04:30","modified_gmt":"2023-09-19T15:04:30","slug":"passwords-authentication","status":"publish","type":"post","link":"https:\/\/airome.tech\/id\/passwords-authentication\/","title":{"rendered":"Death of passwords: Will password fatigue usher in biometrics?"},"content":{"rendered":"<p>An estimated 300 billion passwords are used by humans and machines worldwide. That\u2019s far too many passwords \u2014 40 times more than the number of people walking on planet Earth. The more the number of passwords, the higher the number of breaches: In the first half of 2020, data breaches exposed 36 billion records, according to RiskBased Security, a US-based cybersecurity firm specialising in vulnerability intelligence, data breaches and risk ratings.<\/p>\n<p>What\u2019s the salvation for a password-weary world? There are no quick answers. It&#8217;s a frustrating fact: Many people have grown weary of passwords; yet until now, there\u2019s not much left in terms of choice. The world has become so accustomed to the necessity of passwords. They\u2019re the entry point to the digital world, which gives every user a semblance of ownership.<\/p>\n<h3>Why do we mess up with passwords?<\/h3>\n<p>The whole of humanity is familiar with passwords. As a rule, no two passwords should be the same. Our dependence on them is intertwined with digital technology use, like we need nappies for babies. We use passwords to check our email, log in to our social networks and browse our mobile phones, watch movies, transact with our bank, etc. A password helps tell the system that we are who it &#8220;thinks&#8221; we really are. Yet, we all know that passwords, like nappies, aren&#8217;t always foolproof. &#8220;Human factor&#8221; kicks in. And we all know that in every adult hides a &#8220;child within&#8221;. Then it&#8217;s a big mess.<\/p>\n<h3>So are passwords really &#8216;dying&#8217;?<\/h3>\n<p>Instead of being a cause of comfort, however, passwords had caused despair. Don\u2019t even start asking about desperate parents who forget the password of their children\u2019s iPad, linked to an iCloud account. When that happens, the iPad becomes as good as a doorstop.<\/p>\n<p>And we all know that in establishing security, passwords are not perfect either. Cyber hacks and ransomware attacks have increased, despite the increasing sophistication of passwords. Such attacks are only bound to increase, say experts. Is man\u2019s love-hate affair with passwords about to be disrupted?<\/p>\n<p>\u201cI think password is dying simply because organisations find it more difficult to maintain passwords, as it has a lot of administrative overhead, both for IT (department) and end-users,\u201d said Anoop Kumar Paudval, Information Security Manager of\u00a0<em>Gulf News<\/em>.<\/p>\n<p>Passwords are seen as belonging to one\u2019s unique \u2014 and personal \u2014 space. We\u2019re supposed to keep them and remember them by heart. Most of the time, we do (or don\u2019t), depending on our amnesia level. But as our digital technology\/media use increases, panic attacks driven by I-forgot-my-password episodes have also increased.<\/p>\n<h3>What is &#8216;password fatigue&#8217;?<\/h3>\n<p>Passwords are a very personal, secret-agent kind of thing. When you forget them, you can\u2019t just ask an officemate, a neighbour or even an IT support guy \u201cWhat\u2019s my password?\u201d It sounds absurd at the very least, and irresponsible at the very most.<\/p>\n<p>When you try \u2014 and repeatedly fail \u2014 to log in to your account for the nth time, &#8216;password fatigue&#8217; becomes a catchphrase of despair. And don\u2019t even dare to ask your spouse. Whether s\/he knows it or not, it\u2019s bound to cause frustration to either side \u2014 or both.<\/p>\n<p>Consider this: It\u2019s become a standard practice for most organisations to force a password change among users every so often. For some, it\u2019s once every three months, or 4 passwords to note down in one year \u2014 equivalent to 40 passwords in 10 years and 160 passwords during one\u2019s working lifetime (considering the average working life of 40 years).<\/p>\n<p>As the number of passwords end-users must have keeps piling up, password pain only intensifies. That\u2019s part of the reasons why password management software has grown so much. According to SecureAuth&#8217;s survey, 1 in 3 IT security professionals report that their users inundate help desk due to frequently forgetting passwords.<\/p>\n<h3>Is it a good practice to keep a log of your passwords?<\/h3>\n<p>It is. Many people keep a written log of passwords on a separate notepad, to help them remember access to apps or sites. While this works for many, it\u2019s not 100% perfect. Most people, in order to avoid password anxiety or fatigue, simply just use \u2014 and reuse\u2014 the password they\u2019ve been given by IT.<\/p>\n<h3>What if I re-use a password?<\/h3>\n<p>Here\u2019s one problem: with too many unique passwords to handle \u2014 which is more than human nature allows us to possibly remember \u2014 people do get lazy, and reuse password all the time. The result: easy-to-guess credentials being employed. In 2019, the most commonly hacked password was \u201c123456\u201d, according to the UK\u2019s National Cyber Security Centre. Ergo: as much as 81% of company data breaches is due to having poor password practices, according to cybersecurity firm TraceSecurity.<\/p>\n<h3>Besides passwords, what are the ways of authenticating people digitally?<\/h3>\n<p>While it\u2019s a fact that easy-to-guess passwords are the root cause of a number of cyberattacks, businesses have not removed them from the authentication process \u2013 instead, what is known as \u201ctwo-factor authentication\u201d has been introduced.<\/p>\n<p>Companies are trying to find ways of authenticating employees using the following:<\/p>\n<p><strong>USE 2-FACTOR AUTHENTICATION:<\/strong> In most companies, this approach involves an individual needing two of the following pieces of information before their identity is verified: something they know, something they have, and something they are.<\/p>\n<p><strong>SOMETHING PEOPLE KNOW:<\/strong> In the case of something people know, a password remains the most commonly-used piece of data. Something they have might be a device, like a smartphone, and something they are might include biometric data. This extra layer of security makes it much harder for hackers to access digital or business assets.<\/p>\n<p><strong>USE A PASSWORD MANAGER:<\/strong> Password managers are applications that store information for multiple digital solutions and log in users automatically. They hold a database of passwords that is encrypted and can only be accessed via a master password. This works for many, as it leaves users with much less to remember. This also indicates that less likely to use 123456 and more likely to choose a stronger password overall.<\/p>\n<p>Even two-factor authentication is not air-right, as they can be breached. One is through what is known as the widely reported \u201cSIM card swap\u201d, where the one-time password sent via SMS can be stolen.<\/p>\n<h3>How does 2-factor authentication work?<\/h3>\n<p>It\u2019s an identification system that always requires an added security &#8220;layer\u201d. The first factor (when logging in to an account): enter your username and password. Second factor (if 2FA is enabled): You provide a second form of proof that you are the owner of the account before you can access it (such as fingerprint, face or iris scan, or one-time password).<\/p>\n<h3>Why do you need 2-factor authentication?<\/h3>\n<p>The idea is that, if by some accident or unguarded moment, you gave away your password (say, to a \u2018phishing&#8217; attacker), hackers would need to get access to the second form of identification before they could enter your account. Experts recommend that as much as possible, you must turn on two-factor authentication essential accounts. This extra layer of security doesn\u2019t hurt, and keeps you secure \u2014 for the most part. Unless, of course, you fall victim to <a href=\"https:\/\/gulfnews.com\/special-reports\/online-security-in-uae-beware-cybercriminals-are-on-the-prowl-1.1617639288324\">social engineering<\/a>, and you give away the two-factor authentication code yourself.<\/p>\n<h3>Is two-factor authentication safe?<\/h3>\n<p>Any layer of security is always better than just a single layer (password). 2FA is one of the best ways to add a secruity layer. But if you think that since you have enabled or implemented two-factor authentication (2FA), you\u2019re hack-safe \u2014 think again. The website hoxhunt.com has listed five ways this layer can be breached\/bypassed:<\/p>\n<ol>\n<li>Via conventional session management<\/li>\n<li>Using OAuth<\/li>\n<li>Using brute force<\/li>\n<li>Using earlier-generated tokens<\/li>\n<li>Using social engineering<\/li>\n<\/ol>\n<h3>How easy would it be to switch over to biometrics?<\/h3>\n<p>While many experts say the era of passwords seems to head towards the same destiny as the dinos, getting people to switch to something else (biometrics) might not be a walk in the park. The\u00a0world\u2019s experience with passwords is undergoing a major challenge. Some say it is likely to be a \u201cslow death\u201d for passwords.<\/p>\n<h3>Are biometrics the way to go?<\/h3>\n<p>The answer to this is another question: Which one is better \u2014 remembering 20 different passwords or transitioning to a better, more robust system of authentication? The answer is pretty obvious. But the solution and reality is always more complex and not so straightforward.<\/p>\n<p>Most IT professionals believe passwords won&#8217;t exist in 10 years. This prognostication, however, has been on for well over a decade already. For example, in 2004, Microsoft founder Bill Gates said said passwords are on the way out. Many IT professionals, too, believe the same way. And while we\u2019ve seen the risk with passwords, deciding what to replace them with is a huge challenge. And while it\u2019s true that biometric identification \u2013 like a fingerprint or an iris scan \u2013 is harder to hack, the consequences of being able to do so are much greater.<\/p>\n<h3>Why do hackers aim at biometrics?<\/h3>\n<p>It&#8217;s simply because they\u2019re high-value targets \u2014 getting a hold of not just passwords, but also fingerprint, iris scan and facial scan data of people is valuable to the Dark Web hacking community. For one, copies of biometric information stored and used by organisations and companies to verify each individual makes them attractive targets for ransomware attackers looking to \u201charvest\u201d credentials. When a password is compromised, they can be changed. A fingerprint, or iris scan, cannot.<\/p>\n<p><strong>Reference: <\/strong><a href=\"https:\/\/gulfnews.com\/special-reports\/death-of-passwords-will-password-fatigue-usher-in-biometrics-1.1621847405586\">https:\/\/gulfnews.com\/special-reports\/death-of-passwords-will-password-fatigue-usher-in-biometrics-1.1621847405586<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The more the number of passwords, the higher the number of breaches: In the first half of 2020, data breaches exposed 36 billion records, according to RiskBased Security, a US-based cybersecurity firm specialising in vulnerability intelligence, data breaches and risk ratings.<\/p>\n","protected":false},"author":5,"featured_media":1264,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[58,11,56,47,59,57],"class_list":["post-1263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-criminal_cases","tag-2fa","tag-authentication","tag-biometrics","tag-mfa-adalah","tag-online-banking","tag-passwords"],"translation":{"provider":"WPGlobus","version":"3.0.0","language":"id","enabled_languages":["en","id"],"languages":{"en":{"title":true,"content":true,"excerpt":true},"id":{"title":false,"content":false,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Death of passwords: Will password fatigue usher in biometrics? - Airome<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/airome.tech\/passwords-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Death of passwords: Will password fatigue usher in biometrics? - Airome\" \/>\n<meta property=\"og:url\" content=\"https:\/\/airome.tech\/passwords-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Airome\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/airometech\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-11T11:58:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T15:04:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"361\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Airome Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@airome_tech\" \/>\n<meta name=\"twitter:site\" content=\"@airome_tech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Airome Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/\"},\"author\":{\"name\":\"Airome Technologies\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/person\/4305f9424f28ed17c089815d871cf0fa\"},\"headline\":\"Death of passwords: Will password fatigue usher in biometrics?\",\"datePublished\":\"2021-08-11T11:58:30+00:00\",\"dateModified\":\"2023-09-19T15:04:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/\"},\"wordCount\":1581,\"publisher\":{\"@id\":\"https:\/\/airome.tech\/#organization\"},\"image\":{\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg\",\"keywords\":[\"2FA\",\"authentication\",\"biometrics\",\"mfa adalah\",\"online banking\",\"passwords\"],\"articleSection\":[\"Industrial &amp; Criminal cases\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/\",\"url\":\"https:\/\/airome.tech\/passwords-authentication\/\",\"name\":\"Death of passwords: Will password fatigue usher in biometrics? - Airome\",\"isPartOf\":{\"@id\":\"https:\/\/airome.tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg\",\"datePublished\":\"2021-08-11T11:58:30+00:00\",\"dateModified\":\"2023-09-19T15:04:30+00:00\",\"description\":\"what is 2FA and why is it affects to security; mfa adalah\",\"breadcrumb\":{\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/airome.tech\/passwords-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#primaryimage\",\"url\":\"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg\",\"contentUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg\",\"width\":640,\"height\":361},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/airome.tech\/passwords-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430\",\"item\":\"https:\/\/airome.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Death of passwords: Will password fatigue usher in biometrics?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/airome.tech\/#website\",\"url\":\"https:\/\/airome.tech\/\",\"name\":\"Airome\",\"description\":\"Simple. Mobile. Secure. Your mTAS.\",\"publisher\":{\"@id\":\"https:\/\/airome.tech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/airome.tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/airome.tech\/#organization\",\"name\":\"Airome\",\"url\":\"https:\/\/airome.tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png\",\"contentUrl\":\"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png\",\"width\":206,\"height\":64,\"caption\":\"Airome\"},\"image\":{\"@id\":\"https:\/\/airome.tech\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/airometech\",\"https:\/\/x.com\/airome_tech\",\"https:\/\/www.linkedin.com\/company\/airome\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/person\/4305f9424f28ed17c089815d871cf0fa\",\"name\":\"Airome Technologies\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/airome.tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf1864c9ce26e9439ecfb0b95c8af0d14ba56239900be8267722a9e1193e0c98?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf1864c9ce26e9439ecfb0b95c8af0d14ba56239900be8267722a9e1193e0c98?s=96&d=mm&r=g\",\"caption\":\"Airome Technologies\"},\"url\":\"https:\/\/airome.tech\/id\/author\/s-dvukhzhennov\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Death of passwords: Will password fatigue usher in biometrics? - Airome","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/airome.tech\/passwords-authentication\/","og_locale":"id_ID","og_type":"article","og_title":"Death of passwords: Will password fatigue usher in biometrics? - Airome","og_url":"https:\/\/airome.tech\/passwords-authentication\/","og_site_name":"Airome","article_publisher":"https:\/\/www.facebook.com\/airometech","article_published_time":"2021-08-11T11:58:30+00:00","article_modified_time":"2023-09-19T15:04:30+00:00","og_image":[{"width":640,"height":361,"url":"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg","type":"image\/jpeg"}],"author":"Airome Technologies","twitter_card":"summary_large_image","twitter_creator":"@airome_tech","twitter_site":"@airome_tech","twitter_misc":{"Written by":"Airome Technologies","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/airome.tech\/passwords-authentication\/#article","isPartOf":{"@id":"https:\/\/airome.tech\/passwords-authentication\/"},"author":{"name":"Airome Technologies","@id":"https:\/\/airome.tech\/#\/schema\/person\/4305f9424f28ed17c089815d871cf0fa"},"headline":"Death of passwords: Will password fatigue usher in biometrics?","datePublished":"2021-08-11T11:58:30+00:00","dateModified":"2023-09-19T15:04:30+00:00","mainEntityOfPage":{"@id":"https:\/\/airome.tech\/passwords-authentication\/"},"wordCount":1581,"publisher":{"@id":"https:\/\/airome.tech\/#organization"},"image":{"@id":"https:\/\/airome.tech\/passwords-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg","keywords":["2FA","authentication","biometrics","mfa adalah","online banking","passwords"],"articleSection":["Industrial &amp; Criminal cases"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/airome.tech\/passwords-authentication\/","url":"https:\/\/airome.tech\/passwords-authentication\/","name":"Death of passwords: Will password fatigue usher in biometrics? - Airome","isPartOf":{"@id":"https:\/\/airome.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/airome.tech\/passwords-authentication\/#primaryimage"},"image":{"@id":"https:\/\/airome.tech\/passwords-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg","datePublished":"2021-08-11T11:58:30+00:00","dateModified":"2023-09-19T15:04:30+00:00","description":"what is 2FA and why is it affects to security; mfa adalah","breadcrumb":{"@id":"https:\/\/airome.tech\/passwords-authentication\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/airome.tech\/passwords-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/airome.tech\/passwords-authentication\/#primaryimage","url":"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg","contentUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2021\/08\/11-08-2021-mini.jpg","width":640,"height":361},{"@type":"BreadcrumbList","@id":"https:\/\/airome.tech\/passwords-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0430","item":"https:\/\/airome.tech\/"},{"@type":"ListItem","position":2,"name":"Death of passwords: Will password fatigue usher in biometrics?"}]},{"@type":"WebSite","@id":"https:\/\/airome.tech\/#website","url":"https:\/\/airome.tech\/","name":"Airome","description":"Simple. Mobile. Secure. Your mTAS.","publisher":{"@id":"https:\/\/airome.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/airome.tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/airome.tech\/#organization","name":"Airome","url":"https:\/\/airome.tech\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/airome.tech\/#\/schema\/logo\/image\/","url":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png","contentUrl":"https:\/\/airome.tech\/wp-content\/uploads\/2020\/02\/logo-206.png","width":206,"height":64,"caption":"Airome"},"image":{"@id":"https:\/\/airome.tech\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/airometech","https:\/\/x.com\/airome_tech","https:\/\/www.linkedin.com\/company\/airome\/"]},{"@type":"Person","@id":"https:\/\/airome.tech\/#\/schema\/person\/4305f9424f28ed17c089815d871cf0fa","name":"Airome Technologies","image":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/airome.tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf1864c9ce26e9439ecfb0b95c8af0d14ba56239900be8267722a9e1193e0c98?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf1864c9ce26e9439ecfb0b95c8af0d14ba56239900be8267722a9e1193e0c98?s=96&d=mm&r=g","caption":"Airome Technologies"},"url":"https:\/\/airome.tech\/id\/author\/s-dvukhzhennov\/"}]}},"_links":{"self":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts\/1263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/comments?post=1263"}],"version-history":[{"count":4,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts\/1263\/revisions"}],"predecessor-version":[{"id":1778,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/posts\/1263\/revisions\/1778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/media\/1264"}],"wp:attachment":[{"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/media?parent=1263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/categories?post=1263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/airome.tech\/id\/wp-json\/wp\/v2\/tags?post=1263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}