{"id":12201,"date":"2020-08-02T22:28:27","date_gmt":"2020-08-03T02:28:27","guid":{"rendered":"https:\/\/www.shortform.com\/blog\/?p=12201"},"modified":"2020-08-18T15:20:50","modified_gmt":"2020-08-18T19:20:50","slug":"edward-snowden-hacking","status":"publish","type":"post","link":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/","title":{"rendered":"Edward Snowden: Hacking Beginnings &#038; Teen Rebellion"},"content":{"rendered":"\n<p>How did Edward Snowden start hacking? What skills did the hacker Snowden develop? What is hacker culture like?<\/p>\n\n\n\n<p>For Edward Snowden, hacking was a way to assert his <a href=\"https:\/\/www.shortform.com\/blog\/maturity-continuum-7-habits\/\">independence<\/a>. As a hacker, Snowden was very skilled. Learn more about Edward Snowden, hacking, and hacker culture.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hack<\/strong>er Culture<\/h2>\n\n\n\n<p>Hacking doesn\u2019t only happen in the tech world.<strong> Hacking is simply finding a way to exploit the weakness of a system<\/strong>. As a hacker, Snowden looked for these opportunities as well. When people build systems, they rely on assumptions they haven\u2019t necessarily thought through and sometimes don\u2019t even test their systems. They only consider how their system is supposed to work. A hacker discovers how it actually works, or how they could make it work differently.&nbsp;<\/p>\n\n\n\n<p>Hacker culture is based in playfulness and cleverness, and it generally comes with antiauthoritarian politics. Many hackers believe more things should be free and publicly accessible.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Edward Snowden: Hacking Begins<\/h3>\n\n\n\n<p>As Ed entered his teenage years, he encountered the same struggle all teenagers have to deal with\u2014feeling like they\u2019re adults but being treated like children. This was where he really started questioning the rules\u2014if there wasn\u2019t a good justification for a rule to be followed, it was just a power trip. At this time in his life, Ed thought in terms of black and white\u2014binary is only 0 or 1, false or true. He hadn\u2019t developed nuance.<br><\/p>\n\n\n\n<p>For Edward Snowden, hacking was the main part of his teenage rebellion. To Edward Snowden, hacking was the most educational, healthiest, and sanest way to establish independence. <strong>Hacking is a great way to put yourself on equal footing with an adult because all you have to do is reason, which doesn\u2019t have anything to do with your age.<\/strong><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Edward Snowden: Hacking School<\/strong><\/h3>\n\n\n\n<p>For Edward Snowden, hacking wasn&#8217;t just about breaking into systems. It was also about developing tricks and shortcuts. On Ed\u2019s first day of school when he was 13, his teachers gave out their grading policies and syllabi. <strong>For the first time, Ed knew how grades were calculated. And once he knew how the system worked, he could see how to hack it.<\/strong><br><\/p>\n\n\n\n<p>Homework, papers, class participation, tests, and quizzes were all worth a percentage of his history grade. Homework took Ed a long time, he didn\u2019t need to do it to do well on quizzes and tests, and it was only 10 percent of his grade. If he stopped doing it and just forfeited the 10 percent, he\u2019d still easily pass the class. Other classes had similar percentage breakdowns, and he stopped doing homework.&nbsp;<br><\/p>\n\n\n\n<p>This gave him a lot of free time\u2014until he explained his calculations to his math teacher when asked why he never did homework. His teacher smiled, but the next day, he gave out a new syllabus that stated anyone who missed more than six homework assignments would automatically fail.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Edward Snowden: Hacking in the Traditional Sense<\/strong><\/h3>\n\n\n\n<p>Ed also did some computer hacking. As a hacker, Snowden wasn&#8217;t stealing anyone\u2019s identity\u2014even if that had occurred to him and he\u2019d wanted to, the Internet wasn\u2019t yet monetized and the only theft he\u2019d heard of was \u201cphreaking,\u201d getting free phone calls. Instead, <strong>he hacked games to give himself extra lives or special abilities.&nbsp;<\/strong><br><\/p>\n\n\n\n<p><strong>Ed also hacked the website of the US\u2019s nuclear research facility,<\/strong> Los Alamos National Laboratory. Ed was worried about nuclear war and found himself researching the US nuclear program. He ended up on the Los Alamos National Laboratory website and quickly discovered a security problem.<br><\/p>\n\n\n\n<p>The lab used an open directory structure on their website. This means that the website\u2019s URL showed where and how the site\u2019s files were organized. For example, a URL in an open directory structure might look like this: site.com\/sitefiles\/docs\/publicfile.doc. Publicfile.doc is the document the website intended to show you, but you can access all of the documents in the file tree by typing site.com\/sitefiles.&nbsp;<br><\/p>\n\n\n\n<p>Using this knowledge, <strong>Ed was able to access some documents that only employees with security clearances should have been able to. <\/strong>It was personal info rather than blueprints of the plant, but it still scared him. He emailed the lab\u2019s webmaster, who never responded. Next, Ed tried calling the lab. He left a voicemail for the IT department and waited, checking the site regularly to see if the structure was fixed. Weeks later, the lab called to tell him they\u2019d fixed it and thanked him. They realized he was a teenager and told him to get in touch when he was 18.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How did Edward Snowden start hacking? What skills did the hacker Snowden develop? What is hacker culture like? For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Edward Snowden, hacking, and hacker culture.<\/p>\n","protected":false},"author":6,"featured_media":12578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34,20],"tags":[116],"class_list":["post-12201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication","category-ethics","tag-permanent-record","","tg-column-two"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Edward Snowden: Hacking Beginnings &amp; Teen Rebellion - Shortform Books<\/title>\n<meta name=\"description\" content=\"For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Ed and hacker culture here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Edward Snowden: Hacking Beginnings &amp; Teen Rebellion\" \/>\n<meta property=\"og:description\" content=\"For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Ed and hacker culture here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Shortform Books\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-03T02:28:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T19:20:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1710\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rina Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rina Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\"},\"author\":{\"name\":\"Rina Shah\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287\"},\"headline\":\"Edward Snowden: Hacking Beginnings &#038; Teen Rebellion\",\"datePublished\":\"2020-08-03T02:28:27+00:00\",\"dateModified\":\"2020-08-18T19:20:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\"},\"wordCount\":785,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg\",\"keywords\":[\"Permanent Record\"],\"articleSection\":[\"Communication\",\"Ethics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\",\"name\":\"Edward Snowden: Hacking Beginnings & Teen Rebellion - Shortform Books\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg\",\"datePublished\":\"2020-08-03T02:28:27+00:00\",\"dateModified\":\"2020-08-18T19:20:50+00:00\",\"description\":\"For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Ed and hacker culture here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg\",\"width\":2560,\"height\":1710},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.shortform.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Edward Snowden: Hacking Beginnings &#038; Teen Rebellion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"name\":\"Shortform Books\",\"description\":\"The World&#039;s Best Book Summaries\",\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.shortform.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\",\"name\":\"Shortform Books\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"width\":500,\"height\":74,\"caption\":\"Shortform Books\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287\",\"name\":\"Rina Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g\",\"caption\":\"Rina Shah\"},\"description\":\"An avid reader for as long as she can remember, Rina\u2019s love for books began with The Boxcar Children. Her penchant for always having a book nearby has never faded, though her reading tastes have since evolved. Rina reads around 100 books every year, with a fairly even split between fiction and non-fiction. Her favorite genres are memoirs, public health, and locked room mysteries. As an attorney, Rina can\u2019t help analyzing and deconstructing arguments in any book she reads.\",\"url\":\"https:\/\/www.shortform.com\/blog\/author\/rina\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Edward Snowden: Hacking Beginnings & Teen Rebellion - Shortform Books","description":"For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Ed and hacker culture here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Edward Snowden: Hacking Beginnings & Teen Rebellion","og_description":"For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Ed and hacker culture here.","og_url":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/","og_site_name":"Shortform Books","article_published_time":"2020-08-03T02:28:27+00:00","article_modified_time":"2020-08-18T19:20:50+00:00","og_image":[{"width":2560,"height":1710,"url":"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg","type":"image\/jpeg"}],"author":"Rina Shah","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rina Shah","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#article","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/"},"author":{"name":"Rina Shah","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287"},"headline":"Edward Snowden: Hacking Beginnings &#038; Teen Rebellion","datePublished":"2020-08-03T02:28:27+00:00","dateModified":"2020-08-18T19:20:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/"},"wordCount":785,"commentCount":0,"publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg","keywords":["Permanent Record"],"articleSection":["Communication","Ethics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/","url":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/","name":"Edward Snowden: Hacking Beginnings & Teen Rebellion - Shortform Books","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg","datePublished":"2020-08-03T02:28:27+00:00","dateModified":"2020-08-18T19:20:50+00:00","description":"For Edward Snowden, hacking was a way to assert his independence. As a hacker, Snowden was very skilled. Learn more about Ed and hacker culture here.","breadcrumb":{"@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#primaryimage","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg","width":2560,"height":1710},{"@type":"BreadcrumbList","@id":"https:\/\/www.shortform.com\/blog\/edward-snowden-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.shortform.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Edward Snowden: Hacking Beginnings &#038; Teen Rebellion"}]},{"@type":"WebSite","@id":"https:\/\/www.shortform.com\/blog\/#website","url":"https:\/\/www.shortform.com\/blog\/","name":"Shortform Books","description":"The World&#039;s Best Book Summaries","publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.shortform.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.shortform.com\/blog\/#organization","name":"Shortform Books","url":"https:\/\/www.shortform.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","width":500,"height":74,"caption":"Shortform Books"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/d07435826f13a8f422d5d333dceac287","name":"Rina Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/560b3bc3d51625f9becff4fded992607b156f274aa36bc07f8a4285a1d72cdc8?s=96&d=mm&r=g","caption":"Rina Shah"},"description":"An avid reader for as long as she can remember, Rina\u2019s love for books began with The Boxcar Children. Her penchant for always having a book nearby has never faded, though her reading tastes have since evolved. Rina reads around 100 books every year, with a fairly even split between fiction and non-fiction. Her favorite genres are memoirs, public health, and locked room mysteries. As an attorney, Rina can\u2019t help analyzing and deconstructing arguments in any book she reads.","url":"https:\/\/www.shortform.com\/blog\/author\/rina\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2020\/08\/permanent-record-hacking-scaled.jpg","_links":{"self":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/12201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/comments?post=12201"}],"version-history":[{"count":6,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/12201\/revisions"}],"predecessor-version":[{"id":12876,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/12201\/revisions\/12876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media\/12578"}],"wp:attachment":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media?parent=12201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/categories?post=12201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/tags?post=12201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}