{"id":22817,"date":"2024-06-14T12:00:16","date_gmt":"2024-06-14T09:00:16","guid":{"rendered":"https:\/\/coinengineer.io\/?p=22817"},"modified":"2024-06-14T09:29:54","modified_gmt":"2024-06-14T06:29:54","slug":"uwu-lend-offers-5-million-bounty","status":"publish","type":"post","link":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/","title":{"rendered":"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit"},"content":{"rendered":"<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rm:\" data-state=\"closed\">The team of the <strong>UwU Lend protocol<\/strong> has put up a <strong>$5 million<\/strong> reward for anyone who can find the attacker of the second exploit that occurred on the protocol. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rn:\" data-state=\"closed\">This bounty arrives with the hacker not responding to UwU\u2019s ultimatum of getting back part of the stolen funds.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_71 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#UwU_Lend_Issues_5_Million_Bounty_After_Second_Attack\" title=\"UwU Lend Issues $5 Million Bounty After Second Attack\">UwU Lend Issues $5 Million Bounty After Second Attack<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#Details_of_the_Exploits_and_Ongoing_Reimbursement_Efforts\" title=\"Details of the Exploits and Ongoing Reimbursement Efforts\">Details of the Exploits and Ongoing Reimbursement Efforts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#Impact_on_UwU_Lend_Token_and_Broader_Crypto_Security_Landscape\" title=\"Impact on UwU Lend Token and Broader Crypto Security Landscape\">Impact on UwU Lend Token and Broader Crypto Security Landscape<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1><span class=\"ez-toc-section\" id=\"UwU_Lend_Issues_5_Million_Bounty_After_Second_Attack\"><\/span>UwU Lend Issues $5 Million Bounty After Second Attack<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rp:\" data-state=\"closed\">On June 13, <strong>UwU<\/strong> posted an onchain message to the hacker, \u201cRepayment deadline for the funds you stole has passed. 5 Million Dollar bounty to the first person to identify and locate you.\u201d, following the hacker\u2019s non-compliance with the June 12 deadline of transferring 80% of the stolen funds. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rq:\" data-state=\"closed\"><strong>UwU<\/strong> said that the $5 million bounty would be in Ether and would be given before the money is returned or the charges are laid.<\/span><\/p>\n<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rr:\" data-state=\"closed\">Same hacker managed to perform the second <strong>$3.7m<\/strong> exploit and drained UwU\u2019s uDAI, uWETH, uLUSD, uFRAX, uCRVUSD, and uUSDT on June 13, Cyvers blockchain security firm explained. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rs:\" data-state=\"closed\">The two breaches that were executed were done by the same hacker wallet address identified as \u201c0x841\u202621f47. \u201d<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Details_of_the_Exploits_and_Ongoing_Reimbursement_Efforts\"><\/span>Details of the Exploits and Ongoing Reimbursement Efforts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:ru:\" data-state=\"closed\">The first exploit Aubrey noted was <strong>$20.3 million<\/strong> removed through a price manipulation attack on June 10. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rv:\" data-state=\"closed\">UwU asked the hacker to send back 80% of the funds and, in return, UwU could keep 20% and promised not to contact the authorities. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:r10:\" data-state=\"closed\">However, the hacker did not reply and performed the second $3.7 million exploit shortly before UwU declared the $5 million bounty.<\/span><\/p>\n<p><a href=\"https:\/\/coinengineer.net\/blog\/bnb-chain-offers-grants-and-support-web3\/\"><em><span style=\"font-weight: 400;\">This Might Interest You: BNB Chain Offers Grants and Support to Web3 Projects<br \/>\n<\/span><\/em><\/a><\/p>\n<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:r11:\" data-state=\"closed\">The second attack happened when UwU began returning funds from the first $20.3 million attack.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Impact_on_UwU_Lend_Token_and_Broader_Crypto_Security_Landscape\"><\/span>Impact on UwU Lend Token and Broader Crypto Security Landscape<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:r14:\" data-state=\"closed\">As for the <strong>UwU Lend token (UWU)<\/strong>, even after losing $24 million in total, the token has only declined by 20% in the last week trading at $2.51 on CoinGecko. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:r15:\" data-state=\"closed\">It has a market capitalization of $22.6 billion as on today.<\/span><\/p>\n<p><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:r16:\" data-state=\"closed\">This case reveals the ongoing problems and the hazards present in the world of cryptocurrency. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:rk:\" data-state=\"closed\">The first industry hack was reported in June 2011 and to date, a recent Crystal Intelligence report shows that $19 billion worth of cryptocurrencies have been stolen. <\/span><span class=\"cursor-pointer whitespace-pre-line text-base font-normal text-title-color transition-opacity duration-150 hover:bg-gray-200\" aria-expanded=\"false\" aria-controls=\"radix-:r17:\" data-state=\"closed\">Such vulnerabilities are inevitable in the growth of the industry; thus, strong security measures and constant oversight should be applied to avoid such cases and keep investors\u2019 funds safe.<\/span><\/p>\n<p><a href=\"https:\/\/t.me\/coinengineernews\"><em><span style=\"font-weight: 400;\">Click here to get the latest news from Coin Engineer!\u00a0<\/span><\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The team of the UwU Lend protocol has put up a $5 million reward for anyone who can find the attacker of the second exploit that occurred on the protocol. This bounty arrives with the hacker not responding to UwU\u2019s ultimatum of getting back part of the stolen funds. UwU Lend Issues $5 Million Bounty<\/p>\n","protected":false},"author":6,"featured_media":22822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,1],"tags":[6800,6839],"class_list":["post-22817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto-news","category-genel","tag-crypto-hack","tag-uwu-lend"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit - Coin Engineer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit - Coin Engineer\" \/>\n<meta property=\"og:description\" content=\"The team of the UwU Lend protocol has put up a $5 million reward for anyone who can find the attacker of the second exploit that occurred on the protocol. This bounty arrives with the hacker not responding to UwU\u2019s ultimatum of getting back part of the stolen funds. UwU Lend Issues $5 Million Bounty\" \/>\n<meta property=\"og:url\" content=\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/\" \/>\n<meta property=\"og:site_name\" content=\"Coin Engineer\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-14T09:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-14T06:29:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Tanju Akb\u0131y\u0131k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tanju Akb\u0131y\u0131k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/\",\"url\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/\",\"name\":\"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit - Coin Engineer\",\"isPartOf\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp\",\"datePublished\":\"2024-06-14T09:00:16+00:00\",\"dateModified\":\"2024-06-14T06:29:54+00:00\",\"author\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/286f3a00b45c1661961e40ff0a1c7546\"},\"breadcrumb\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#primaryimage\",\"url\":\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp\",\"contentUrl\":\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp\",\"width\":800,\"height\":450,\"caption\":\"uwu lend, uwu\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/coinengineer.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/coinengineer.net\/blog\/#website\",\"url\":\"https:\/\/coinengineer.net\/blog\/\",\"name\":\"Coin Engineer\",\"description\":\"Btc, Coins, Pre-Sale, DeFi, NFT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/coinengineer.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/286f3a00b45c1661961e40ff0a1c7546\",\"name\":\"Tanju Akb\u0131y\u0131k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a027c5acae1ab2c3649244f87d705ac7ee359dd7e3222b84cb1d32ba3a8d2e18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a027c5acae1ab2c3649244f87d705ac7ee359dd7e3222b84cb1d32ba3a8d2e18?s=96&d=mm&r=g\",\"caption\":\"Tanju Akb\u0131y\u0131k\"},\"url\":\"https:\/\/coinengineer.net\/blog\/author\/cetanju\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit - Coin Engineer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/","og_locale":"en_US","og_type":"article","og_title":"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit - Coin Engineer","og_description":"The team of the UwU Lend protocol has put up a $5 million reward for anyone who can find the attacker of the second exploit that occurred on the protocol. This bounty arrives with the hacker not responding to UwU\u2019s ultimatum of getting back part of the stolen funds. UwU Lend Issues $5 Million Bounty","og_url":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/","og_site_name":"Coin Engineer","article_published_time":"2024-06-14T09:00:16+00:00","article_modified_time":"2024-06-14T06:29:54+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp","type":"image\/webp"}],"author":"Tanju Akb\u0131y\u0131k","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tanju Akb\u0131y\u0131k","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/","url":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/","name":"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit - Coin Engineer","isPartOf":{"@id":"https:\/\/coinengineer.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#primaryimage"},"image":{"@id":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#primaryimage"},"thumbnailUrl":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp","datePublished":"2024-06-14T09:00:16+00:00","dateModified":"2024-06-14T06:29:54+00:00","author":{"@id":"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/286f3a00b45c1661961e40ff0a1c7546"},"breadcrumb":{"@id":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#primaryimage","url":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp","contentUrl":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2024\/06\/uwu-lend.webp","width":800,"height":450,"caption":"uwu lend, uwu"},{"@type":"BreadcrumbList","@id":"https:\/\/coinengineer.net\/blog\/uwu-lend-offers-5-million-bounty\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/coinengineer.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UwU Lend Offers $5 Million Bounty to Identify Hacker Behind $24 Million Exploit"}]},{"@type":"WebSite","@id":"https:\/\/coinengineer.net\/blog\/#website","url":"https:\/\/coinengineer.net\/blog\/","name":"Coin Engineer","description":"Btc, Coins, Pre-Sale, DeFi, NFT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/coinengineer.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/286f3a00b45c1661961e40ff0a1c7546","name":"Tanju Akb\u0131y\u0131k","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a027c5acae1ab2c3649244f87d705ac7ee359dd7e3222b84cb1d32ba3a8d2e18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a027c5acae1ab2c3649244f87d705ac7ee359dd7e3222b84cb1d32ba3a8d2e18?s=96&d=mm&r=g","caption":"Tanju Akb\u0131y\u0131k"},"url":"https:\/\/coinengineer.net\/blog\/author\/cetanju\/"}]}},"_links":{"self":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts\/22817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/comments?post=22817"}],"version-history":[{"count":3,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts\/22817\/revisions"}],"predecessor-version":[{"id":22830,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts\/22817\/revisions\/22830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/media\/22822"}],"wp:attachment":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/media?parent=22817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/categories?post=22817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/tags?post=22817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}