{"id":912,"date":"2019-10-21T09:42:17","date_gmt":"2019-10-21T09:42:17","guid":{"rendered":"https:\/\/sectigostore.com\/page\/?p=912"},"modified":"2020-06-10T09:41:02","modified_gmt":"2020-06-10T09:41:02","slug":"what-is-an-encrypted-email-and-how-does-encryption-work","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/","title":{"rendered":"What is an Encrypted Email and How Does Encryption Work?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Using Secure Email Ensures That Only Your Intended Recipients Can Read Your Messages<\/h2>\n\n\n\n<p>What is an encrypted email? Email encryption refers to the method of securing email messages by making them unreadable by an attacker who listens in over the network. So, what makes them so secure? An encrypted email is one that\u2019s sent out over an encrypted communication channel and is secured using standard encryption protocols. <\/p>\n\n\n\n<p>If you use an untrusted connection (like a\npublic Wi-Fi), details such as your email login credentials, or any messages\nsent or received can be captured by an attacker. Apart from sensitive information,\nattackers can also access your attachments, stored messages, and may also have\nthe ability to take control of your account. <\/p>\n\n\n\n<p>However, emails may also be vulnerable in a relatively protected setting such as a corporate network, which typically has security solutions to prevent data breaches. Encryption adds another layer of protection to ensure that your communication remains secure. With an email signing certificate, you not only ensure that the messages are encrypted but also help your recipients verify your identity to prevent spoofing.<\/p>\n\n\n\n<div class=\"graysection\"><h2>Buy Sectigo Email S\/MIME Certificate \u2013 Save 21%<\/h2>\n<p><strong>Save 21%<\/strong> on Sectigo Email S\/MIME Certificate. It ensures message integrity and helps you to set up DMARC.<\/p>\n<p><a class=\"greenbutton\" style=\"text-decoration: none;\" href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">Shop for Sectigo Email S\/MIME Certificate<\/a><\/p>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why You Should Encrypt Your Email<\/strong><\/h3>\n\n\n\n<p>It\u2019s pertinent we discuss the most common email security threats to understand why encrypting emails is the way forward. Let\u2019s look at some of them:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Eavesdropping.<\/strong> &nbsp;When an attacker uses a computer\nto intercept the radio signals between your computer and a wireless router. With\nencrypted email communication, the information can\u2019t be read by anyone unless\nthey have the private key.<\/li><li><strong>Spamming and Phishing.<\/strong> While unsolicited spam mails from advertisers are simply junk mails\nthat clutter your mailbox, phishing emails pose a serious security threat. Phish\noften imitate legitimate entities and are sent out with the intention of\nstealing your private information like banking information, credentials, etc. Storing\npasswords as hashes, implementing DMARC (Domain-based Message Authentication,\nReporting, and Conformance), encrypting sensitive information adds a layer of\nprotection.<\/li><li><strong>Spoofing.<\/strong> Just like with postal services, email services do not require an\naccurate return address to deliver a message. A cybercriminal can fake a return\naddress on an email to make it look as though the message came from a trusted\naccount (even though it didn\u2019t). You can take a look at the full email header\nto distinguish a spoofed email from a legitimate one. <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">Email signing\ncertificates<\/a> can be used to prevent this type of attack by ensuring that\nevery employee within your organization is signing their emails to indicate trust.\n<\/li><li><strong>Malicious Email Attachments.<\/strong> Cybercriminals might deliver harmful scripts as attachments that\nexecute right on your computer when you open them. Email signing certs are\nextremely useful when it comes to verifying sender\u2019s identity so you can be\nassured that the message is from a trusted source.<\/li><\/ol>\n\n\n\n<p>Keep in mind that it takes almost the same\namount of effort and time to send one malicious email to one person as it does\nto thousands of users. We\u2019re all susceptible to become victims of the attacks\nmentioned above. As such, it\u2019s imperative that we use encryption to secure our\ncommunications. <\/p>\n\n\n\n<p>What is secure email, you ask? Well, the three\nthings that need to be encrypted to secure your email communication effectively\nare as follows:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>The connection between your device and the email provider.<\/strong> SSL\/TLS certificates installed on your email servers ensure that the communication channel between your computer and the servers stays encrypted. Check if your email provider supports SSL\/TLS. An easy way to do that is to log in to your email using a web browser and see whether you get an HTTPS at the beginning of the URL. If you use a desktop client program, you can typically activate encryption under advanced settings in the email settings window.<\/li><li><strong>The email message itself that you want to send.<\/strong> You can encrypt individual messages either by using built-in services or by relying on trusted third-party solutions. OpenPGP and S\/MIME are the two most common email encryption protocols.<\/li><li><strong>The email messages that you have stored or archived.<\/strong> If you use an email client or an app in place of a web browser and are storing or saving emails to your local computer or phone, make sure that these messages are encrypted. For example, in the case of Windows, you can use the built-in Encrypted File System (EFS) feature to secure your data at rest.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Does Email Encryption Work?<\/strong><\/h2>\n\n\n\n<p>Email encryption works on the principles of public-key cryptography, or what\u2019s known as asymmetric encryption. Every email address will have a pair of keys \u2014 public and private \u2014 associated with it. The public key is accessible to everyone and is used to encrypt messages while sending. The private key is only accessible to the owner of the email address. The public key is used to encrypt the messages into an indecipherable scramble, and only the corresponding private key can decrypt the messages. <\/p>\n\n\n\n<p>It\u2019s crucial that we encrypt all of our emails and not just the ones\nthat have sensitive information to prevent them from being specifically\ntargeted by an attacker. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"255\" src=\"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png\" alt=\"Publick Key and Private Key Mechanism in Email Certificate\" class=\"wp-image-913\" srcset=\"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png 663w, https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key-300x115.png 300w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>It\u2019s easy to see why using an email signing certificate is beneficial for both you and your email recipients. An email signing certificate encrypts your messages (both in transit and at rest), asserts the identity of the sender, and ensures that the email has not been tampered or modified. This is a win-win for everyone except the cybercriminals who want access to your email messages. <\/p>\n\n\n\n<p>Protect the integrity of your communications and your organization as a whole with a cost-effective solution: <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encryption Resources<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/sectigostore.com\/blog\/hashing-vs-encryption-the-big-players-of-the-cyber-security-world\/\" target=\"_blank\">Hashing vs Encryption \u2014 The Big Players of the Cyber Security World<\/a><\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/sectigostore.com\/blog\/what-is-encryption-and-how-does-it-work\/\" target=\"_blank\">What Is Encryption and How Does It Work?<\/a><\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/sectigostore.com\/blog\/5-differences-between-symmetric-vs-asymmetric-encryption\/\" target=\"_blank\">Symmetric vs Asymmetric Encryption &#8211; 5 Things You Should Know<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Using Secure Email Ensures That Only Your Intended Recipients Can Read Your Messages What is an encrypted email? Email encryption refers to the method of securing email messages by making them unreadable by an attacker who listens in over the network. So, what makes them so secure? An encrypted email is one that\u2019s sent out over an encrypted communication channel and is secured using standard encryption protocols. If you use an untrusted connection (like a public Wi-Fi), details such as your email login credentials, or any messages sent or received <a href=\"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/\" class=\"more-link\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[53],"tags":[],"class_list":["post-912","post","type-post","status-publish","format-standard","hentry","category-email-encryption"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is an Encrypted Email and How Does Encryption Work?<\/title>\n<meta name=\"description\" content=\"We reveal study on an Encrypted Email and how does Email Encryption work to ensure message integrity. Read now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an Encrypted Email and How Does Encryption Work?\" \/>\n<meta property=\"og:description\" content=\"We reveal study on an Encrypted Email and how does Email Encryption work to ensure message integrity. Read now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/\" \/>\n<meta property=\"og:site_name\" content=\"SectigoStore\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sectigostore\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-21T09:42:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-10T09:41:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png\" \/>\n<meta name=\"author\" content=\"sectigostorepages\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sectigostore\" \/>\n<meta name=\"twitter:site\" content=\"@sectigostore\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sectigostorepages\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/\"},\"author\":{\"name\":\"sectigostorepages\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/#\\\/schema\\\/person\\\/f38f303abd42ade13a74a5d3c12b1cec\"},\"headline\":\"What is an Encrypted Email and How Does Encryption Work?\",\"datePublished\":\"2019-10-21T09:42:17+00:00\",\"dateModified\":\"2020-06-10T09:41:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/\"},\"wordCount\":1003,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/publick-key-private-key.png\",\"articleSection\":[\"Email Encryption\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/\",\"name\":\"What is an Encrypted Email and How Does Encryption Work?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/publick-key-private-key.png\",\"datePublished\":\"2019-10-21T09:42:17+00:00\",\"dateModified\":\"2020-06-10T09:41:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/#\\\/schema\\\/person\\\/f38f303abd42ade13a74a5d3c12b1cec\"},\"description\":\"We reveal study on an Encrypted Email and how does Email Encryption work to ensure message integrity. Read now!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/publick-key-private-key.png\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/publick-key-private-key.png\",\"width\":663,\"height\":255},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/what-is-an-encrypted-email-and-how-does-encryption-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"SSL Resources\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Encryption\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/email-encryption\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is an Encrypted Email and How Does Encryption Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/\",\"name\":\"SectigoStore\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/#\\\/schema\\\/person\\\/f38f303abd42ade13a74a5d3c12b1cec\",\"name\":\"sectigostorepages\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g\",\"caption\":\"sectigostorepages\"},\"url\":\"https:\\\/\\\/sectigostore.com\\\/page\\\/author\\\/sectigostorepages\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is an Encrypted Email and How Does Encryption Work?","description":"We reveal study on an Encrypted Email and how does Email Encryption work to ensure message integrity. Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/","og_locale":"en_US","og_type":"article","og_title":"What is an Encrypted Email and How Does Encryption Work?","og_description":"We reveal study on an Encrypted Email and how does Email Encryption work to ensure message integrity. Read now!","og_url":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/","og_site_name":"SectigoStore","article_publisher":"https:\/\/www.facebook.com\/sectigostore\/","article_published_time":"2019-10-21T09:42:17+00:00","article_modified_time":"2020-06-10T09:41:02+00:00","og_image":[{"url":"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png","type":"","width":"","height":""}],"author":"sectigostorepages","twitter_card":"summary_large_image","twitter_creator":"@sectigostore","twitter_site":"@sectigostore","twitter_misc":{"Written by":"sectigostorepages","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/"},"author":{"name":"sectigostorepages","@id":"https:\/\/sectigostore.com\/page\/#\/schema\/person\/f38f303abd42ade13a74a5d3c12b1cec"},"headline":"What is an Encrypted Email and How Does Encryption Work?","datePublished":"2019-10-21T09:42:17+00:00","dateModified":"2020-06-10T09:41:02+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/"},"wordCount":1003,"commentCount":0,"image":{"@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png","articleSection":["Email Encryption"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/","url":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/","name":"What is an Encrypted Email and How Does Encryption Work?","isPartOf":{"@id":"https:\/\/sectigostore.com\/page\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png","datePublished":"2019-10-21T09:42:17+00:00","dateModified":"2020-06-10T09:41:02+00:00","author":{"@id":"https:\/\/sectigostore.com\/page\/#\/schema\/person\/f38f303abd42ade13a74a5d3c12b1cec"},"description":"We reveal study on an Encrypted Email and how does Email Encryption work to ensure message integrity. Read now!","breadcrumb":{"@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#primaryimage","url":"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png","contentUrl":"https:\/\/sectigostore.com\/page\/wp-content\/uploads\/2019\/10\/publick-key-private-key.png","width":663,"height":255},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/page\/what-is-an-encrypted-email-and-how-does-encryption-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"SSL Resources","item":"https:\/\/sectigostore.com\/page\/"},{"@type":"ListItem","position":2,"name":"Email Encryption","item":"https:\/\/sectigostore.com\/page\/email-encryption\/"},{"@type":"ListItem","position":3,"name":"What is an Encrypted Email and How Does Encryption Work?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/page\/#website","url":"https:\/\/sectigostore.com\/page\/","name":"SectigoStore","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/page\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/page\/#\/schema\/person\/f38f303abd42ade13a74a5d3c12b1cec","name":"sectigostorepages","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g","caption":"sectigostorepages"},"url":"https:\/\/sectigostore.com\/page\/author\/sectigostorepages\/"}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/posts\/912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/comments?post=912"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/posts\/912\/revisions"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/media?parent=912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/categories?post=912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/page\/wp-json\/wp\/v2\/tags?post=912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}