{"id":8443,"date":"2018-04-19T06:55:45","date_gmt":"2018-04-19T10:55:45","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=8443"},"modified":"2022-06-22T00:09:47","modified_gmt":"2022-06-22T04:09:47","slug":"smartphones-breaking-the-traditional-way-of-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/","title":{"rendered":"Smartphones: Breaking the Traditional Way of Security"},"content":{"rendered":"<figure id=\"attachment_8444\" aria-describedby=\"caption-attachment-8444\" style=\"width: 350px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8444\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/04\/smartphones-breaking-the-traditional-way-of-security-500x278.png\" alt=\"smartphones-breaking-the-traditional-way-of-security\" width=\"350\" height=\"195\" \/><figcaption id=\"caption-attachment-8444\" class=\"wp-caption-text\"><a href=\"https:\/\/pixabay.com\/en\/smartphone-cellphone-apple-i-phone-1894723\/\">Source<\/a><\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The advent of smartphones changed the way we communicate with each other. Smartphones changed our lifestyle and became a part of our normal daily life. Because of this technology, the purchasing behavior of customers is drastically changing with the use of electronic wallets and biometric technology made available in modern smartphones. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users. A research firm eMarketer predicted that just mobile transactions will value for 52% of the total online e-commerce transactions by 2021, which was about 43% back in 2017.<\/span><\/p>\n<div class=\"caseWrapper\">\n<h6 style=\"text-align: center; font-size: 18px; padding-bottom: 0; font-weight: 600; background: #f2f2f2; padding: 5px 0;\">Free Case Study<\/h6>\n<div class=\"caseLogo\"><a href=\"https:\/\/blog.m2sys.com\/case-study-biometric-authentication-system-for-customer-identification-in-arig-bank-identification\/?utm_source=blog&amp;utm_medium=case%20study&amp;utm_campaign=arig%20bank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6096 size-thumbnail\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/08\/arig-bank-150x150.png\" sizes=\"(max-width: 150px) 100vw, 150px\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/08\/arig-bank-150x150.png 150w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/08\/arig-bank-300x300.png 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/08\/arig-bank.png 512w\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/div>\n<div class=\"caseInfo\">\n<h3>Biometric Authentication System for Customer Identification in Arig Bank Identification<\/h3>\n<p><a class=\"caseLink\" href=\"https:\/\/blog.m2sys.com\/case-study-biometric-authentication-system-for-customer-identification-in-arig-bank-identification\/?utm_source=blog&amp;utm_medium=case%20study&amp;utm_campaign=arig%20bank\">Download<\/a><\/p>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Many online retail stores now let the users use the services of Apple Pay or Android Pay. These apps allow the users to maintain and keep a record of their cards as an e-card. With this, payments are made much easier and secure. Also, this technology can be used in a physical store to authenticate the actual transaction through the built-in feature, near \u2013 field communication technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Android Pay is secure because the app uses a different virtual number to represent the original card. No information is shared on the card itself. Some retailers restrict the payment price ceiling to $30 to make it more secure. If the transaction goes over the amount of $30, then the user will have to authenticate the transaction using one of the biometric measures through <\/span><b><a href=\"https:\/\/www.m2sys.com\/easyscan-pro-fingerprint-device\/?utm_source=Blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=M2-EasyScan%20Pro\">fingerprint scanner<\/a><\/b><span style=\"font-weight: 400;\">, facial recognition, voice recognition, or <\/span><b><a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/?utm_source=blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=autotilt%20iris\">iris scanner<\/a><\/b><span style=\"font-weight: 400;\">. Similarly, the Apple Pay does not work with the actual card itself. Rather it also uses a different account unique number to represent the card. Also with every transaction, it generates a unique code to authenticate the transaction. In addition to this, the user has to authenticate the transaction with biometrics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All these security tools and applications combined with the <\/span><b>biometrics<\/b><span style=\"font-weight: 400;\"> is leading the consumer into more and more online transactions. Security concerns will soon be gone for the customers and a day will arrive when almost all the transactions will be made online, from anywhere.The only real risks to this technology are humans themselves says an expert independent industrial analyst, Rob Bamforth. The only risk factor here is the user themselves and no other thing can cause any harm or infiltrate the security system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Source:<\/span><a href=\"https:\/\/www.computerweekly.com\/feature\/Smart-security-Go-beyond-the-basics-with-biometrics\"> <span style=\"font-weight: 400;\">computerweekly.com<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The advent of smartphones changed the way we communicate with each other. Smartphones changed our lifestyle and became a part<\/p>\n","protected":false},"author":396,"featured_media":16296,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"Smartphones: Breaking the Traditional Way of Security","_yoast_wpseo_metadesc":"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[747,40,752],"class_list":["post-8443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-finance","tag-security","tag-smartphone"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smartphones: Breaking the Traditional Way of Security<\/title>\n<meta name=\"description\" content=\"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smartphones: Breaking the Traditional Way of Security\" \/>\n<meta property=\"og:description\" content=\"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-19T10:55:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-22T04:09:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/04\/smartphones-breaking-the-traditional-way-of-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masum Shibli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/masum_shibli\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masum Shibli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\"},\"author\":{\"name\":\"Masum Shibli\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca8b3141ba64b34fcbba00d36aed4e47\"},\"headline\":\"Smartphones: Breaking the Traditional Way of Security\",\"datePublished\":\"2018-04-19T10:55:45+00:00\",\"dateModified\":\"2022-06-22T04:09:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\"},\"wordCount\":402,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Finance\",\"Security\",\"Smartphone\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\",\"name\":\"Smartphones: Breaking the Traditional Way of Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2018-04-19T10:55:45+00:00\",\"dateModified\":\"2022-06-22T04:09:47+00:00\",\"description\":\"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Smartphones: Breaking the Traditional Way of Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca8b3141ba64b34fcbba00d36aed4e47\",\"name\":\"Masum Shibli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g\",\"caption\":\"Masum Shibli\"},\"description\":\"Business Development Analyst, M2SYS Technology\",\"sameAs\":[\"https:\/\/twitter.com\/https:\/\/twitter.com\/masum_shibli\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shibli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smartphones: Breaking the Traditional Way of Security","description":"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/","og_locale":"en_US","og_type":"article","og_title":"Smartphones: Breaking the Traditional Way of Security","og_description":"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2018-04-19T10:55:45+00:00","article_modified_time":"2022-06-22T04:09:47+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/04\/smartphones-breaking-the-traditional-way-of-security.jpg","type":"image\/jpeg"}],"author":"Masum Shibli","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/masum_shibli","twitter_site":"@m2sys","twitter_misc":{"Written by":"Masum Shibli","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/"},"author":{"name":"Masum Shibli","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca8b3141ba64b34fcbba00d36aed4e47"},"headline":"Smartphones: Breaking the Traditional Way of Security","datePublished":"2018-04-19T10:55:45+00:00","dateModified":"2022-06-22T04:09:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/"},"wordCount":402,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Finance","Security","Smartphone"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/","name":"Smartphones: Breaking the Traditional Way of Security","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2018-04-19T10:55:45+00:00","dateModified":"2022-06-22T04:09:47+00:00","description":"Smartphones changed our lifestyle and became a part of our normal daily life. By adding biometrics into the transaction it adds more value to the transaction and a better sense of security for the users.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/smartphones-breaking-the-traditional-way-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Smartphones: Breaking the Traditional Way of Security"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca8b3141ba64b34fcbba00d36aed4e47","name":"Masum Shibli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g","caption":"Masum Shibli"},"description":"Business Development Analyst, M2SYS Technology","sameAs":["https:\/\/twitter.com\/https:\/\/twitter.com\/masum_shibli"],"url":"https:\/\/www.m2sys.com\/blog\/author\/shibli\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8443"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=8443"}],"version-history":[{"count":8,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8443\/revisions"}],"predecessor-version":[{"id":17945,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8443\/revisions\/17945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16296"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=8443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=8443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=8443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}