{"id":3596,"date":"2023-06-07T06:32:06","date_gmt":"2023-06-07T06:32:06","guid":{"rendered":"https:\/\/mpelembe.net\/?p=3596"},"modified":"2023-06-07T08:22:36","modified_gmt":"2023-06-07T08:22:36","slug":"how-secure-are-ring-doorbells","status":"publish","type":"post","link":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/","title":{"rendered":"How secure are ring doorbells?"},"content":{"rendered":"<div class=\"chat-history-scroll-container ng-tns-c3030796456-1 show-bottom-shadow ng-trigger ng-trigger-resetChat\">\n<div class=\"chat-history ng-tns-c3030796456-1 ng-star-inserted\" data-test-id=\"chat-history-container\">\n<div class=\"conversation-container ng-tns-c3030796456-1 ng-star-inserted\">\n<div class=\"ng-tns-c4020060676-5 ng-trigger ng-trigger-responsePopulation ng-animate-disabled\">\n<div class=\"response-container response-container-has-multiple-responses ng-star-inserted response-container-small-bottom\">\n<div class=\"presented-response-container\">\n<div class=\"response-container-content\">\n<div class=\"markdown\" dir=\"ltr\">\n<p>June 7, 2023 \/Technology\/ &#8212; Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols. Cybercriminals can use those issues to hack a Ring doorbell or camera. In fact, there were dozens of incidents when someone gained unauthorized access to Ring gadgets. Mozilla&#8217;s Privacy Not Included project found that Ring doorbells have a number of privacy and security concerns, including:<!--more--><\/p>\n<ul>\n<li><strong>Data collection:<\/strong>\u00a0Ring collects a wide range of data about users, including their location, video recordings, and contact information. This data is stored on Amazon&#8217;s servers and can be accessed by Ring employees and law enforcement.<\/li>\n<li><strong>Security vulnerabilities:<\/strong>\u00a0Mozilla found a number of security vulnerabilities in the Ring app and doorbell hardware. These vulnerabilities could allow hackers to access user data or take control of the doorbell.<\/li>\n<li><strong>Lack of transparency:<\/strong>\u00a0Ring has been criticized for its lack of transparency about its data collection practices. The company has not published a privacy policy that clearly explains how it collects and uses user data.<\/li>\n<\/ul>\n<p>In response to Mozilla&#8217;s findings, Amazon said that it is committed to protecting user privacy and security. The company said that it has fixed the security vulnerabilities that Mozilla found and that it is working to improve its privacy policy.<\/p>\n<p>However, privacy advocates remain concerned about Ring&#8217;s data collection practices. They argue that Ring is collecting too much data about users and that the company is not doing enough to protect this data from unauthorized access.<\/p>\n<p>In 2022, Amazon was fined $5.8 million by the Federal Trade Commission (FTC) for violating user privacy. The FTC found that Ring had failed to adequately protect user data and that it had misled users about how their data was being used.<\/p>\n<p>Despite these concerns, Ring doorbells remain popular with consumers. The company has sold over 10 million doorbells since it was launched in 2015.<\/p>\n<p>Here are some tips for protecting your privacy when using a Ring doorbell:<\/p>\n<ul>\n<li><strong>Read the privacy policy:<\/strong>\u00a0Before you purchase a Ring doorbell, read the company&#8217;s privacy policy to understand how your data will be collected and used.<\/li>\n<li><strong>Use strong passwords:<\/strong>\u00a0When creating an account for Ring, use a strong password that is unique to this account.<\/li>\n<li><strong>Enable two-factor authentication:<\/strong>\u00a0Two-factor authentication adds an extra layer of security to your account.<\/li>\n<li><strong>Be aware of the privacy settings:<\/strong>\u00a0Ring offers a number of privacy settings that you can use to control how your data is shared.<\/li>\n<li><strong>Be careful about what you share:<\/strong>\u00a0Only share videos and photos that you are comfortable sharing with others.<\/li>\n<\/ul>\n<p>By following these tips, you can help to protect your privacy when using a Ring doorbell.<\/p>\n<p>Mozilla&#8217;s Privacy Not Included project is a website that helps consumers make informed decisions about the privacy and security of connected devices. The project evaluates a wide range of products, including smart home devices, fitness trackers, and voice assistants. The project\u00a0uses a scoring system to rate the privacy and security of each product. The project also provides information about the company&#8217;s data collection practices, security measures, and privacy policy.<\/p>\n<p>Mozilla&#8217;s Privacy Not Included project is a valuable resource for consumers who are concerned about their privacy. The project helps consumers to understand the privacy and security risks of connected devices and to make informed choices about the products they use. The project is a great way to learn more about the privacy and security of connected devices. If you are considering buying a connected device, be sure to check the project&#8217;s ratings before you make your purchase.<\/p>\n<\/div>\n<div class=\"actions-container ng-star-inserted\">\n<div class=\"buttons-container ng-star-inserted\"><span style=\"font-family: Bitter, Georgia, serif; font-size: 22px;\">Search related topics<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"factuality-form-0\" class=\"ng-tns-c4020060676-5\">\n<div class=\"factuality-container\">\n<div class=\"factuality-content\"><a class=\"factuality-link mdc-button mat-mdc-button mat-primary gmat-mdc-button-with-prefix mat-mdc-button-base gmat-mdc-button ng-star-inserted\" href=\"https:\/\/cse.google.com\/cse?cx=904a948de889c47dc#gsc.tab=0&amp;gsc.q=Mozilla%20Ring%20doorbells%20privacy%20and%20security\" target=\"_blank\" rel=\"noopener noreferrer\" aria-disabled=\"false\"><span class=\"mdc-button__label\">Mozilla Ring doorbells privacy and security<\/span><\/a><br \/>\n<a class=\"factuality-link mdc-button mat-mdc-button mat-primary gmat-mdc-button-with-prefix mat-mdc-button-base gmat-mdc-button ng-star-inserted\" href=\"https:\/\/cse.google.com\/cse?cx=904a948de889c47dc#gsc.tab=0&amp;gsc.q=How%20secure%20are%20ring%20doorbells%3F\" target=\"_blank\" rel=\"noopener noreferrer\" aria-disabled=\"false\"><span class=\"mdc-button__label\">How secure are ring doorbells?<\/span><\/a><br \/>\n<a class=\"factuality-link mdc-button mat-mdc-button mat-primary gmat-mdc-button-with-prefix mat-mdc-button-base gmat-mdc-button ng-star-inserted cdk-focused cdk-mouse-focused\" href=\"https:\/\/cse.google.com\/cse?cx=904a948de889c47dc#gsc.tab=0&amp;gsc.q=Mozilla%27s%20Privacy%20Not%20Included%20project\" target=\"_blank\" rel=\"noopener noreferrer\" aria-disabled=\"false\"><span class=\"mdc-button__label\">Mozilla&#8217;s Privacy Not Included project<\/span><\/a><\/p>\n<div class=\"chat-history-scroll-container ng-tns-c3030796456-1 show-bottom-shadow ng-trigger ng-trigger-resetChat\">\n<div class=\"chat-history ng-tns-c3030796456-1 ng-star-inserted\" data-test-id=\"chat-history-container\">\n<div class=\"conversation-container ng-tns-c3030796456-1 ng-star-inserted\">\n<div class=\"ng-tns-c4020060676-13 ng-trigger ng-trigger-responsePopulation ng-animate-disabled\">\n<div id=\"factuality-form-1\" class=\"ng-tns-c4020060676-13\">\n<div class=\"factuality-container\">\n<div class=\"factuality-content\">\n<div class=\"mat-ripple-element\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"input-area-container ng-tns-c3030796456-1\">\n<div class=\"input-area\">\n<div class=\"mat-mdc-text-field-wrapper mdc-text-field ng-tns-c2119496066-2 mdc-text-field--outlined mdc-text-field--no-label\">\n<div class=\"mat-mdc-form-field-flex ng-tns-c2119496066-2\">\n<div class=\"mdc-notched-outline ng-tns-c2119496066-2 mdc-notched-outline--no-label ng-star-inserted\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"input-area-container ng-tns-c3030796456-1\">\n<div class=\"input-area\">\n<div class=\"mat-mdc-text-field-wrapper mdc-text-field ng-tns-c2119496066-2 mdc-text-field--outlined mdc-text-field--no-label\">\n<div class=\"mat-mdc-form-field-flex ng-tns-c2119496066-2\">\n<div class=\"mdc-notched-outline ng-tns-c2119496066-2 mdc-notched-outline--no-label ng-star-inserted\">\n<div class=\"mdc-notched-outline__leading\"><\/div>\n<div class=\"mdc-notched-outline__trailing\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>June 7, 2023 \/Technology\/ &#8212; Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols. Cybercriminals<a class=\"moretag\" href=\"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":3597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAowu7GVCw:productID":"","_crdt_document":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[43],"tags":[574,224,1546,359,491,1547,687,8099,1550,1548,6070,451,1545],"class_list":["post-3596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-amazon","tag-computing","tag-digital-rights","tag-digital-technology","tag-human-rights","tag-identity-management","tag-internet-privacy","tag-mozilla","tag-privacy","tag-privacy-law","tag-privacy-policy","tag-software","tag-terms-of-service"],"featured_image_src":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png","blog_images":{"medium":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells-300x200.png","large":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png"},"ams_acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How secure are ring doorbells? - Mpelembe Network<\/title>\n<meta name=\"description\" content=\"Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How secure are ring doorbells? - Mpelembe Network\" \/>\n<meta property=\"og:description\" content=\"Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/\" \/>\n<meta property=\"og:site_name\" content=\"Mpelembe Network\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-07T06:32:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T08:22:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1022\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"headline\":\"How secure are ring doorbells?\",\"datePublished\":\"2023-06-07T06:32:06+00:00\",\"dateModified\":\"2023-06-07T08:22:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/\"},\"wordCount\":606,\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ring-doorbells.png\",\"keywords\":[\"Amazon\",\"Computing\",\"Digital rights\",\"Digital technology\",\"Human rights\",\"Identity management\",\"Internet privacy\",\"Mozilla\",\"Privacy\",\"Privacy law\",\"Privacy policy\",\"Software\",\"Terms of service\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/\",\"name\":\"How secure are ring doorbells? - Mpelembe Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ring-doorbells.png\",\"datePublished\":\"2023-06-07T06:32:06+00:00\",\"dateModified\":\"2023-06-07T08:22:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"description\":\"Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ring-doorbells.png\",\"contentUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ring-doorbells.png\",\"width\":1022,\"height\":682},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/how-secure-are-ring-doorbells\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mpelembe.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How secure are ring doorbells?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/\",\"name\":\"Mpelembe Network\",\"description\":\"Collaboration Platform\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mpelembe.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/mpelembe.net\"],\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How secure are ring doorbells? - Mpelembe Network","description":"Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/","og_locale":"en_US","og_type":"article","og_title":"How secure are ring doorbells? - Mpelembe Network","og_description":"Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols","og_url":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/","og_site_name":"Mpelembe Network","article_published_time":"2023-06-07T06:32:06+00:00","article_modified_time":"2023-06-07T08:22:36+00:00","og_image":[{"width":1022,"height":682,"url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#article","isPartOf":{"@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/"},"author":{"name":"admin","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"headline":"How secure are ring doorbells?","datePublished":"2023-06-07T06:32:06+00:00","dateModified":"2023-06-07T08:22:36+00:00","mainEntityOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/"},"wordCount":606,"image":{"@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png","keywords":["Amazon","Computing","Digital rights","Digital technology","Human rights","Identity management","Internet privacy","Mozilla","Privacy","Privacy law","Privacy policy","Software","Terms of service"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/","url":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/","name":"How secure are ring doorbells? - Mpelembe Network","isPartOf":{"@id":"https:\/\/mpelembe.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#primaryimage"},"image":{"@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png","datePublished":"2023-06-07T06:32:06+00:00","dateModified":"2023-06-07T08:22:36+00:00","author":{"@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"description":"Ring devices have several cybersecurity vulnerabilities, such as a lack of encryption and absence of extra security protocols","breadcrumb":{"@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#primaryimage","url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png","contentUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/06\/Ring-doorbells.png","width":1022,"height":682},{"@type":"BreadcrumbList","@id":"https:\/\/mpelembe.net\/index.php\/how-secure-are-ring-doorbells\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mpelembe.net\/"},{"@type":"ListItem","position":2,"name":"How secure are ring doorbells?"}]},{"@type":"WebSite","@id":"https:\/\/mpelembe.net\/#website","url":"https:\/\/mpelembe.net\/","name":"Mpelembe Network","description":"Collaboration Platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mpelembe.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/mpelembe.net"],"url":"https:\/\/mpelembe.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/3596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/comments?post=3596"}],"version-history":[{"count":2,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/3596\/revisions"}],"predecessor-version":[{"id":3610,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/3596\/revisions\/3610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media\/3597"}],"wp:attachment":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media?parent=3596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/categories?post=3596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/tags?post=3596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}