{"id":778,"date":"2022-09-02T09:07:33","date_gmt":"2022-09-02T09:07:33","guid":{"rendered":"https:\/\/guardarian.com\/blog\/?p=778"},"modified":"2026-02-06T11:13:53","modified_gmt":"2026-02-06T11:13:53","slug":"safest-way-to-buy-crypto","status":"publish","type":"post","link":"https:\/\/guardarian.com\/blog\/safest-way-to-buy-crypto","title":{"rendered":"What Is The Safest Way To Buy Crypto?"},"content":{"rendered":"<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">Crypto crime has been around since the invention of blockchain. And it\u2019s no wonder that as the crypto industry grows, so does the crime rate. Which means there is never a bad time to ask yourself &#8211; <\/span><b>what is the safest way to buy crypto?<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">This article will explain why keeping your transactions secure is crucial &#8211; with some very real examples. And of course, we will give you practical advice on how to keep your money safe from unwanted hands.<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Read on to get crypto-secured! \ud83d\udd12\ud83d\udc47<\/span><\/p>\n<h2><b>How much crime really is there?<\/b><\/h2>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">2022 has been a rough year for crypto &#8211; most currencies experienced significant price drops in spring \ud83d\udcc9. One may think that since the market declines, so does the crime rate. But this couldn\u2019t be further from the truth! Take a look at the statistics:<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-782\" src=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year.png\" alt=\"Safest way to buy crypto - cumulative crypto value reeieved by criminals by year\" width=\"600\" height=\"392\" srcset=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year.png 1536w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year-300x196.png 300w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year-768x502.png 768w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year-1080x706.png 1080w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year-1280x837.png 1280w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year-980x641.png 980w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/ilicit-entities-by-year-480x314.png 480w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">According to the Chainalysis <a href=\"https:\/\/blog.chainalysis.com\/reports\/crypto-crime-midyear-update-2022\/\" rel=\"nofollow noopener\" target=\"_blank\">mid-year report<\/a>, the monthly value received by illicit entities has expectedly slowed down. The bear market is to thank for that, of course \ud83d\udc3b. But despite that, the actual<\/span><b> illicit crypto value<\/b> <b>is still among the highest<\/b><span style=\"font-weight: 400;\"> in recent years, with an enormous potential for growth \ud83d\udd3c!\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">And since our main focus today is securing your online transactions, we must address hacking. Check out this graph showing how much crypto is being hacked every month:<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-783\" src=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen.png\" alt=\"Safest way to buy crypto - cumulative monthly crypto stolen in hacks in 2021 &amp; 2022\" width=\"600\" height=\"404\" srcset=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen.png 1536w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen-300x202.png 300w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen-768x517.png 768w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen-1080x727.png 1080w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen-1280x862.png 1280w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen-980x660.png 980w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/cumulative-crypto-stolen-480x323.png 480w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">As you can see as of July 2022 hackers steal almost 2 million dollars per month. Compared to ~8 million dollars received by elicit entities monthly, hacking makes up almost a quarter of all elicit crypto activities.\u00a0<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">So what can we conclude from this data? <\/span><b>Two things:<\/b><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">Despite headlines talking about decrease in crypto crime, the volumes are still high and will definitely grow in the future\ud83d\udcc8<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">Keeping your crypto assets secure is still a major concern\u2757<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Now we know how much crime is really happening, but how can criminals actually steal your crypto? Let\u2019s keep growing our awareness by looking at some real examples!\ud83d\udc47<\/span><\/p>\n<h2><b>How do they do it?<\/b><\/h2>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">There is no shortage of tried and true methods to gain access to someone\u2019s crypto assets. For instance, public Wi-Fi networks are everywhere now, but they are not as safe as most of us tend to believe.<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">Take this case for example: a couple years back, <\/span><b>a man in Austria lost<\/b> <b>over 100,000 EUR ($117,000) worth of Bitcoin<\/b><span style=\"font-weight: 400;\"> simply <\/span><b>by being connected to a restaurant&#8217;s public Wi-Fi <\/b><span style=\"font-weight: 400;\">network \ud83d\udcb8. The crypto was moved to an \u201cunknown, untraceable account\u201d.<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Imagine checking your crypto balance while having lunch, only to see that your wallet has been completely drained later on.<\/span><\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" class=\"giphy-embed\" src=\"https:\/\/giphy.com\/embed\/58FqDYgcQhrdSj5oUJ\" width=\"auto\" height=\"180\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Let\u2019s look at a more recent example. Just last month three men were arrested and charged with running a scheme involving fake ID\u2019s and deceiving banks. The scheme worked like so:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">The thieves used fake ID\u2019s to register accounts on crypto exchanges.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">They used these new accounts to \u201csteal\u201d crypto from themselves<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">\u201cStolen\u201d crypto was transferred to a cold wallet<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">The bank was contacted about this \u201ctheft\u201d and would give reimbursements to the thieves.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">Simple, isn\u2019t it? \ud83e\uddd0 By imitating crime and making the bank believe in it <\/span><b>they stole $4,000,000 worth of crypto<\/b><span style=\"font-weight: 400;\">. Of course, there is not much use for crypto while you are sitting in jail. But this case demonstrates, among other things, the importance of keeping your documents secure, since this could\u2019ve easily been done with your stolen ID. \ud83e\udeaa<\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">Another time-proven method to steal digital assets? Fake apps. In July, the FBI <\/span><a href=\"https:\/\/www.ic3.gov\/Media\/News\/2022\/220718.pdf\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">released a report<\/span><\/a><span style=\"font-weight: 400;\"> regarding the usage of fake apps to steal crypto, and it\u2019s pretty shocking. The report states that:<\/span><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">In November \u201821, criminals defrauded two victims operating under a fake company name &#8211; Supayos. The full amount stolen is not known, but <\/span><b>one of the victims lost<\/b> <b>$900,000\ud83d\udd3b<\/b><span style=\"font-weight: 400;\"> to this scam.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">Between Dec \u201821 and May \u201822, unidentified criminals stole approximately <\/span><b>$3.7 million\ud83d\udd3b<\/b><span style=\"font-weight: 400;\"> by <\/span><b>pretending to be a legit US financial institution.<\/b><span style=\"font-weight: 400;\"> They simply made an app that asked people to pay tax on behalf of that institution.\u00a0<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">Between Oct \u201821 and May \u201822, <\/span><b>criminals stole $5.5 million\ud83d\udd3b<\/b><span style=\"font-weight: 400;\"> operating under company name YiBit, which closed in 2018. Familiar scheme: fake company -&gt; dodgy app -&gt; stolen crypto.<\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400; font-size: 12pt;\">As you can see, criminals don\u2019t have to reinvent the wheel to steal a couple of millions worth of crypto. Most thefts happen because of the human factor.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400; font-size: 12pt;\"><iframe loading=\"lazy\" class=\"giphy-embed\" src=\"https:\/\/giphy.com\/embed\/o1i0XbXsqd4CALDbnj\" width=\"auto\" height=\"200\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">And this is both a problem and an opportunity. Of course, we can see a definite lack of awareness when it comes to online safety. With that said, if a person knows what measures to take to stay secure, they can easily avoid most of the scams going around. \ud83d\udcaa<\/span><\/p>\n<h2><span style=\"font-weight: 400; font-size: 12pt;\">Now let\u2019s discuss what measures you can actually take protect your crypto.\ud83d\udc47<\/span><\/h2>\n<h2><b>So, What Is the Safest Way to Buy Crypto?<\/b><\/h2>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">To answer this question, we compiled a set of simple, but effective measures to making your crypto transactions. Let\u2019s begin with\u2026\u00a0<\/span><\/p>\n<h3><b>1. Always Use a Secure Device<\/b><\/h3>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">As we discussed before, digital devices are not very secure. Here are 3 simple steps that you can use to change that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 12pt;\"><b>Use antivirus software on your PC.<\/b><span style=\"font-weight: 400;\"> This is often disregarded as unimportant or trivial, but a modern antivirus, such as Malwarebytes, will significantly increase not only your security, but also your privacy, and maybe even <\/span><a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/trojan-monero\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">save you electricity<\/span><\/a><span style=\"font-weight: 400;\">!\u00a0<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 12pt;\"><b>Avoid using public networks for anything personal<\/b><span style=\"font-weight: 400;\"> &#8211; it will blow over if you are lucky, but you never know who\u2019s sitting next to you in a cafe.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 12pt;\"><b>Use a stronger password<\/b><span style=\"font-weight: 400;\"> &#8211; probably everyone has heard of this by now, but don\u2019t use your maiden name as your password. Make it hard to crack!<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Having a secure device is good for overall online security. However if you are buying crypto, you might want to to\u2026<\/span><\/p>\n<h3><b>2. Choose a Platform That Uses KYC\/AML<\/b><\/h3>\n<p><span style=\"font-size: 12pt;\"><b>KYC<\/b><span style=\"font-weight: 400;\"> stands for \u201c<\/span><b>Know Your Custome<\/b><span style=\"font-weight: 400;\">r\u201d, and it\u2019s a process that a crypto exchange can use to ensure that the person that is supposed to be you &#8211;<\/span><b> is actually you \ud83e\udd28<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">You are probably already familiar with this, showing a proof of ID when making a crypto transaction is precisely that &#8211; a KYC step. It is used to check if you are actually who you are pretending to be.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Imagine &#8211; a criminal knows your bank card info and tries to make a transaction with it. If a crypto service provider has KYC implemented &#8211; they will fail. That\u2019s because they would have to verify the transaction with your personal ID or passport, which they can\u2019t.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">This doesn\u2019t mean, that KYC is 100% fail-proof, but it adds an additional layer of protection that can be hard for criminals to overcome. Pretty nifty, isn\u2019t it? \ud83d\udcaa<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><b>AML<\/b><span style=\"font-weight: 400;\">, on the other hand, stands for \u201c<\/span><b>Anti Money Laundering<\/b><span style=\"font-weight: 400;\">\u201d and involves any other measures that a company may take to keep their customers safe from theft. These can include risk assessments and transaction tracking among other measures of keeping malicious activities under control. \ud83d\udee1\ufe0f<\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><b>So the takeaway here is:<\/b><span style=\"font-weight: 400;\"> always check that the crypto service provider you choose has a solid KYC\/AML policy in place.\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">And the final advice for today is\u2026<\/span><\/p>\n<h3><b>3. Check Who You\u2019re Dealing With<\/b><\/h3>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">This last step is very often overlooked, but it can truly save you a lot of money and worry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">Think about it &#8211; if people would have simply searched for YiBit (from the scam described above), they would\u2019ve seen that the company closed down years ago. Millions of dollars could be saved with a tiny amount of research.<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">We would recommend using a trusted and popular review platform, such as Trustadvisor. Here are some tips to get the most value out of it:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\"><strong>Check the overall rating<\/strong> &#8211; optimally, you should choose a company with 4 stars or higher. That is not to say, that a million people can\u2019t be wrong sometimes. \ud83d\ude04<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\"><strong>Read the actual reviews<\/strong> &#8211; check what people actually have to say about a company. Make sure the reviews are real &#8211; if there are hundreds of similar one-liners, it\u2019s a point for suspicion.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\"><strong>Check if the company replies<\/strong> &#8211; addressing the issues reviewers mention and just talking back to customers is a sign of genuine care.<\/span><\/li>\n<\/ul>\n<h2><b>In Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">It can be daunting to worry about the security of your crypto with every transaction. Believe it, we know \ud83d\ude42. But awareness is the first step to keeping your money safe from malicious hands.<\/span><\/p>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">And to take some weight off your shoulders, let us recommend you a safe and responsible crypto exchange platform.<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><a href=\"https:\/\/guardarian.com\/\"><span style=\"font-weight: 400;\">Guardarian<\/span><\/a><span style=\"font-weight: 400;\"> is a place to buy and sell over 300 different cryptos. People all across the world choose us for our:<\/span><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">Fast and secure transactions \u26a1<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">Zero extra costs 0\ufe0f\u20e3<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">Over 5 different payment methods \ud83d\udcb3<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400; font-size: 12pt;\">Amazing customer service \ud83e\udd1d<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400; font-size: 12pt;\">And of course, we take our security very seriously. Our KYC verification is fast and friendly while offering the best protection. And yes, we have a top-notch AML policy too. You bet.<\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">So come check us out at <\/span><a href=\"https:\/\/guardarian.com\/\"><span style=\"font-weight: 400;\">www.guardarian.com<\/span><\/a><span style=\"font-weight: 400;\"> for a crypto exchange that takes security seriously. <\/span><\/span><\/p>\n<p><span style=\"font-size: 12pt;\"><span style=\"font-weight: 400;\">And remember &#8211; your crypto security lies in your own hands, so do your own research and stay safe! \ud83d\ude09<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crypto crime has been around since the invention of blockchain. And it\u2019s no wonder that as the crypto industry grows, so does the crime rate. Which means there is never a bad time to ask yourself &#8211; what is the safest way to buy crypto? This article will explain why keeping your transactions secure is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[109,159],"tags":[],"class_list":["post-778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-academy-and-crypto-guides","category-security-and-compliance"],"uagb_featured_image_src":{"full":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash.jpg",1920,1440,false],"thumbnail":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash-300x225.jpg",300,225,true],"medium":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash.jpg",1920,1440,false],"medium_large":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash-768x576.jpg",768,576,true],"large":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash-1600x1200.jpg",1600,1200,true],"1536x1536":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash-1536x1152.jpg",1536,1152,true],"2048x2048":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash.jpg",1920,1440,false],"rpwe-thumbnail":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/09\/franck-DoWZMPZ-M9s-unsplash-45x45.jpg",45,45,true]},"uagb_author_info":{"display_name":"guardarian_admin","author_link":"https:\/\/guardarian.com\/blog\/author\/guardarian_admin"},"uagb_comment_info":3,"uagb_excerpt":"Crypto crime has been around since the invention of blockchain. And it\u2019s no wonder that as the crypto industry grows, so does the crime rate. Which means there is never a bad time to ask yourself &#8211; what is the safest way to buy crypto? This article will explain why keeping your transactions secure is&hellip;","_links":{"self":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts\/778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/comments?post=778"}],"version-history":[{"count":20,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions"}],"predecessor-version":[{"id":4116,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions\/4116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/media\/779"}],"wp:attachment":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/media?parent=778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/categories?post=778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/tags?post=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}