{"id":700,"date":"2024-10-31T16:25:33","date_gmt":"2024-10-31T16:25:33","guid":{"rendered":"https:\/\/zalvis.com\/blog\/?p=700"},"modified":"2024-10-31T18:07:26","modified_gmt":"2024-10-31T18:07:26","slug":"tls-1-3","status":"publish","type":"post","link":"https:\/\/zalvis.com\/blog\/tls-1-3.html","title":{"rendered":"An Overview of TLS 1.3 \u2013 Faster and More Secure"},"content":{"rendered":"<p>Discover the advanced security and speed of TLS 1.3 in our comprehensive guide. Learn how TLS 1.3 enhances online privacy, reduces latency, and secures data with faster handshakes and robust encryption. Ideal for businesses and developers aiming to optimize secure communications.<\/p>\n<p>The advent of the internet has reshaped nearly every facet of our daily lives, and with this transformation has come the need for greater security.<\/p>\n<p>One of the most widely adopted protocols for securing online communications is the Transport Layer Security (TLS) protocol. From its initial release to the most current version, TLS 1.3, this protocol has undergone a series of updates to strengthen security and enhance performance.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-706\" src=\"https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3.png\" alt=\"An Overview of TLS 1.3 \u2013 Faster and More Secure\" width=\"1000\" height=\"500\" srcset=\"https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3.png 1000w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3-300x150.png 300w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3-768x384.png 768w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3-720x360.png 720w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3-580x290.png 580w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/Zalvis-Blog-3-320x160.png 320w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>TLS 1.3, the latest version of the protocol, marks a significant step forward, combining improved security measures with faster connection times. This article provides an in-depth examination of TLS 1.3, exploring its architecture, key features, security enhancements, and performance improvements.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_TLS\"><\/span>What is TLS?<span class=\"ez-toc-section-end\"><\/span><\/h2><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#What_is_TLS\" >What is TLS?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Evolution_of_TLS_From_SSL_to_TLS_13\" >Evolution of TLS: From SSL to TLS 1.3<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Key_Features_of_TLS_13\" >Key Features of TLS 1.3<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Understanding_the_TLS_13_Handshake\" >Understanding the TLS 1.3 Handshake<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#1_Single_Round-Trip_Handshake\" >1. Single Round-Trip Handshake<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#2_Zero_Round-Trip_Time_0-RTT_Handshake\" >2. Zero Round-Trip Time (0-RTT) Handshake<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Security_Enhancements_in_TLS_13\" >Security Enhancements in TLS 1.3<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#1_Mandatory_Forward_Secrecy\" >1. Mandatory Forward Secrecy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#2_Removal_of_Insecure_Algorithms\" >2. Removal of Insecure Algorithms<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#3_Protection_Against_Downgrade_Attacks\" >3. Protection Against Downgrade Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#4_Enhanced_Privacy\" >4. Enhanced Privacy<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Performance_Improvements_in_TLS_13\" >Performance Improvements in TLS 1.3<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Advantages_of_TLS_13_for_Businesses\" >Advantages of TLS 1.3 for Businesses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Adoption_Challenges_and_Considerations\" >Adoption Challenges and Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/zalvis.com\/blog\/tls-1-3.html\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>Transport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication over a computer network. It is widely used in applications such as web browsers, email, instant messaging, and voice over IP (VoIP) services. TLS ensures the integrity, confidentiality, and authentication of the data transmitted between parties.<\/p>\n<p>While TLS 1.2 remains in use, TLS 1.3 represents a leap forward in terms of both security and speed. Understanding this protocol and its improvements is crucial, especially for industries like finance, healthcare, and e-commerce, where data privacy is paramount.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Evolution_of_TLS_From_SSL_to_TLS_13\"><\/span>Evolution of TLS: From SSL to TLS 1.3<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The development of TLS originated from an earlier protocol known as Secure Sockets Layer (SSL). Here\u2019s a quick look at the evolution:<\/p>\n<ul>\n<li><strong>SSL 1.0, 2.0, and 3.0<\/strong>: SSL was developed by Netscape, but earlier versions were susceptible to various security flaws. SSL 3.0 was the last SSL version, and it became widely used despite inherent security weaknesses.<\/li>\n<li><strong>TLS 1.0 and 1.1<\/strong>: Released in 1999 and 2006, respectively, these versions addressed SSL\u2019s vulnerabilities but still left room for improvement.<\/li>\n<li><strong>TLS 1.2<\/strong>: Introduced in 2008, TLS 1.2 added support for stronger cryptographic algorithms and hashing functions. While secure, it involves multiple round trips that slow down connection times.<\/li>\n<li><strong>TLS 1.3<\/strong>: Ratified in 2018, this version not only addresses security concerns found in previous versions but also improves speed by reducing handshake latency.<\/li>\n<\/ul>\n<p>Each evolution brought increased levels of security and performance, culminating in TLS 1.3.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Features_of_TLS_13\"><\/span>Key Features of TLS 1.3<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>TLS 1.3 was designed with the twin objectives of bolstering security and enhancing performance. Some of its notable features include:<\/p>\n<ol>\n<li><strong>Reduced Handshake Complexity and Latency:<\/strong><br \/>\n\u2022 One of the most significant changes in TLS 1.3 is its reduction of handshake complexity. Unlike TLS 1.2, which requires two round-trips to establish a secure connection, TLS 1.3 typically needs just one.<br \/>\n\u2022 For repeated connections between the same client and server, TLS 1.3 can achieve a \u201czero round-trip time\u201d (0-RTT) mode, which allows data to be sent instantly without waiting for a complete handshake.<\/li>\n<li><strong>Simplified Cipher Suites<\/strong>:<br \/>\n\u2022 In TLS 1.3, the cryptographic cipher suites have been streamlined. Only strong, modern algorithms are supported, eliminating obsolete and vulnerable options from previous versions.<br \/>\n\u2022 This streamlined approach reduces the chances of misconfiguration and simplifies the process of establishing secure connections.<\/li>\n<li><strong>Forward Secrecy by Default<\/strong>:<br \/>\n\u2022 TLS 1.3 enforces forward secrecy, a feature that protects past communications even if a private key is compromised in the future.<br \/>\n\u2022 This is achieved through the use of ephemeral keys, which are generated for each session, ensuring that previous communications cannot be decrypted.<\/li>\n<li><strong>Stronger Encryption Algorithms<\/strong>:<br \/>\n\u2022 TLS 1.3 mandates the use of modern encryption algorithms, such as AES-256-GCM and ChaCha20-Poly1305. These algorithms provide robust security and have been optimized for performance.<\/li>\n<li><strong>Improved Security Protocols<\/strong>:<br \/>\n\u2022 Vulnerabilities associated with older versions, such as BEAST, POODLE, and Heartbleed, have been addressed in TLS 1.3.<br \/>\n\u2022 By removing weak or outdated features like RSA key exchange and MD5 hashing, TLS 1.3 enhances overall security.<\/li>\n<li><strong>Enhanced Privacy for Session Resumption<\/strong>:<br \/>\n\u2022 In previous versions, session resumption was achieved through session IDs or session tickets, which could sometimes compromise privacy.<br \/>\n\u2022 TLS 1.3 introduces a new method using Pre-Shared Keys (PSK), which allows for fast reconnection without compromising privacy.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_TLS_13_Handshake\"><\/span>Understanding the TLS 1.3 Handshake<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The handshake process is fundamental to any secure communication protocol, and TLS 1.3 introduces a more efficient method. Here\u2019s how it works:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Single_Round-Trip_Handshake\"><\/span>1. Single Round-Trip Handshake<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In TLS 1.2, the handshake requires two round trips between the client and server, which adds latency. TLS 1.3 reduces this to a single round trip, as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-709\" src=\"https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114.png\" alt=\"What is TLS 1.3\" width=\"960\" height=\"505\" srcset=\"https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114.png 960w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114-300x158.png 300w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114-768x404.png 768w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114-720x379.png 720w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114-580x305.png 580w, https:\/\/zalvis.com\/blog\/wp-content\/uploads\/2024\/10\/IMG_9114-320x168.png 320w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<ul>\n<li>The client initiates the handshake, offering supported cipher suites and cryptographic extensions.<\/li>\n<li>The server responds by selecting the best matching cipher suite and sending its public key.<\/li>\n<li>The client then generates a session key using the server\u2019s public key, completing the handshake with a single round trip.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"2_Zero_Round-Trip_Time_0-RTT_Handshake\"><\/span>2. Zero Round-Trip Time (0-RTT) Handshake<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For clients and servers that have previously communicated, TLS 1.3 offers a 0-RTT option, allowing encrypted data to be sent immediately:<\/p>\n<ul>\n<li>The client remembers the session parameters from a previous connection and starts sending encrypted data without waiting.<\/li>\n<li>The server uses cached session parameters to decrypt and process the data, resulting in near-instantaneous data transfer.<\/li>\n<\/ul>\n<p>0-RTT mode is particularly advantageous for applications requiring fast reconnect times, such as video streaming or real-time messaging.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Enhancements_in_TLS_13\"><\/span>Security Enhancements in TLS 1.3<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>TLS 1.3 incorporates several security improvements over its predecessors. Key security enhancements include:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Mandatory_Forward_Secrecy\"><\/span>1. Mandatory Forward Secrecy<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Forward secrecy ensures that even if encryption keys are compromised, past sessions cannot be decrypted. By enforcing forward secrecy by default, TLS 1.3 mitigates risks associated with long-term key compromise.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Removal_of_Insecure_Algorithms\"><\/span>2. Removal of Insecure Algorithms<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>TLS 1.3 has eliminated algorithms that were found vulnerable or outdated, such as RC4 and 3DES, and weak hashing algorithms like SHA-1. Only strong, modern encryption methods are allowed.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Protection_Against_Downgrade_Attacks\"><\/span>3. Protection Against Downgrade Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>TLS 1.3 incorporates safeguards against downgrade attacks, where attackers trick servers into using older, less secure protocol versions. This ensures clients and servers stay on the most secure connection possible.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Enhanced_Privacy\"><\/span>4. Enhanced Privacy<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To protect against traffic analysis and fingerprinting attacks, TLS 1.3 encrypts more of the handshake messages than TLS 1.2, including the session ID and client random value.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Performance_Improvements_in_TLS_13\"><\/span>Performance Improvements in TLS 1.3<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of the primary motivations behind TLS 1.3 was to reduce latency and improve performance. Key performance enhancements include:<\/p>\n<ol>\n<li><strong>Faster Handshakes and Reduced Latency<\/strong>: By reducing the handshake process to a single round trip, TLS 1.3 significantly reduces connection times, making it faster than TLS 1.2.<\/li>\n<li><strong>Zero Round-Trip Resumption<\/strong>: For returning clients, 0-RTT resumption means that data can be sent almost instantaneously, leading to improved performance for applications that require rapid reconnects.<\/li>\n<li><strong>Reduced Bandwidth Consumption<\/strong>: TLS 1.3 reduces the overhead associated with encryption, lowering bandwidth consumption. This is especially beneficial for mobile users and applications with constrained network resources.<\/li>\n<li><strong>Optimized for Modern Hardware<\/strong>: With support for AES-GCM and ChaCha20, TLS 1.3 is optimized for modern processors and can leverage hardware acceleration, enhancing performance even further.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Advantages_of_TLS_13_for_Businesses\"><\/span>Advantages of TLS 1.3 for Businesses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>TLS 1.3 is particularly beneficial for businesses in security-sensitive sectors such as banking, healthcare, and e-commerce. Some of the notable advantages include:<\/p>\n<ul>\n<li><strong>Increased Security<\/strong>: With stronger encryption and mandatory forward secrecy, businesses can protect sensitive customer data more effectively.<\/li>\n<li><strong>Enhanced User Experience<\/strong>: Faster handshake times mean that users experience quicker page loads and smoother interactions.<\/li>\n<li><strong>Reduced Infrastructure Load<\/strong>: The reduced bandwidth requirements and faster reconnections can decrease the load on servers, allowing businesses to optimize resource usage.<\/li>\n<li><strong>Future-Proof Security<\/strong>: By adopting TLS 1.3, businesses are aligning with the latest security standards, ensuring compliance and readiness for future security demands.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Adoption_Challenges_and_Considerations\"><\/span>Adoption Challenges and Considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While TLS 1.3 offers significant improvements, there are a few challenges that organizations might face during adoption:<\/p>\n<ol>\n<li><strong>Legacy Systems Compatibility<\/strong>: Not all legacy systems are compatible with TLS 1.3, so businesses may face challenges in upgrading older infrastructure.<\/li>\n<li><strong>0-RTT Security Risks<\/strong>: The 0-RTT feature, while enhancing speed, can be vulnerable to replay attacks. Implementing it securely requires careful consideration.<\/li>\n<li><strong>Vendor and Compliance Requirements<\/strong>: Certain regulatory frameworks may require specific encryption standards, so businesses should ensure that TLS 1.3 aligns with compliance needs.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>TLS 1.3 is a transformative upgrade, enhancing both the security and performance of online communications. With faster handshakes, simplified cipher suites, and mandatory forward secrecy, TLS 1.3 offers a robust solution for today\u2019s cybersecurity landscape. Its ability to provide stronger protection against attacks, coupled with improved connection speeds, makes it an essential tool for any organization looking to safeguard data while enhancing user experience.<\/p>\n<p>For businesses and developers, embracing TLS 1.3 represents a commitment to modern security practices and readiness for an increasingly connected world. As the internet continues to evolve, protocols like TLS 1.3 will remain foundational to ensuring safe, efficient, and private digital interactions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the advanced security and speed of TLS 1.3 in our comprehensive guide. Learn how TLS 1.3 enhances online privacy, reduces latency, and secures data with faster handshakes and robust encryption. Ideal for businesses and developers aiming to optimize secure communications. The advent of the internet has reshaped nearly every facet of our daily lives, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":706,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wordpress-cms"],"_links":{"self":[{"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/posts\/700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/comments?post=700"}],"version-history":[{"count":0,"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/posts\/700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/media\/706"}],"wp:attachment":[{"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/media?parent=700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/categories?post=700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zalvis.com\/blog\/wp-json\/wp\/v2\/tags?post=700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}