{"id":6117,"date":"2021-01-13T22:32:49","date_gmt":"2021-01-13T14:32:49","guid":{"rendered":"https:\/\/www.benjamincheah.com\/?p=6117"},"modified":"2021-01-13T22:32:49","modified_gmt":"2021-01-13T14:32:49","slug":"hunters-of-the-void-chapter-3","status":"publish","type":"post","link":"https:\/\/kitsuncheah.com\/?p=6117","title":{"rendered":"Hunters of the Void Chapter 3"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/i1.wp.com\/cdn.pixabay.com\/photo\/2017\/08\/31\/05\/36\/new-york-2699520_960_720.jpg?w=752&amp;ssl=1\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Weakest Link<\/h2>\n\n\n\n<p>Precision. Control. Calmness. The watchwords that kept Kayla grounded in the field.<\/p>\n\n\n\n<p>She was <em>not<\/em> in the field any more.<\/p>\n\n\n\n<p>\u201cShit, shit, shit, shit, SHIT!\u201d<\/p>\n\n\n\n<p>She punctuated every word with a step, burning a circle into the living room carpet. Seated at his workstation, Zen folded his hands over his belly, his lips locked into a tight, tense line.<\/p>\n\n\n\n<p>\u201cHow the hell did the guards recognize me?\u201d Kayla wondered.<\/p>\n\n\n\n<p>\u201cFacial recognition?\u201d Zen volunteered.<\/p>\n\n\n\n<p>\u201cThey didn\u2019t have tech.\u201d<\/p>\n\n\n\n<p>\u201cNo <em>external<\/em> tech,\u201d Zen corrected.<\/p>\n\n\n\n<p>\u201cWhich means they\u2019ve upgraded their implants. And that light disguise doesn\u2019t work anymore.\u201d<\/p>\n\n\n\n<p>\u201cWish Alex could send in his bots.\u201d<\/p>\n\n\n\n<p>Alex\u2019s voice issued from Zen\u2019s laptop.<\/p>\n\n\n\n<p>\u201cBots can\u2019t do what you can do.\u201d<\/p>\n\n\n\n<p>Zen swiveled back around, looking at Alex\u2019s face on the teleconference app.<\/p>\n\n\n\n<p>\u201cShame.\u201d<\/p>\n\n\n\n<p>\u201cAll is not lost. Though you were compromised, the Void Collective didn\u2019t harm you,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cWhich is another mystery. Why didn\u2019t they?\u201d she wondered.<\/p>\n\n\n\n<p>\u201cMaybe because they don\u2019t control all of Zenith. Only the labs. If you disappeared, someone would talk,\u201d Zen said.<\/p>\n\n\n\n<p>\u201cPerhaps they weren\u2019t sure if you were part of a larger organization, one that would seek reprisals if they harmed you. They chose to err on the side of caution,\u201d Alex added.<\/p>\n\n\n\n<p>Kayla exhaled sharply. All anger evaporated. She closed the bulkheads in her head, separating heart from mind. She had indulged in her emotions long enough. She was operational now. Always had been.<\/p>\n\n\n\n<p>\u201cOn the other hand, they know I\u2019m in Babylon now, and that I\u2019m interested in their affairs. They\u2019ll start looking for me, for Zen, for everyone connected to us. We\u2019ve got to assume they have access to the city sensors and databases,\u201d she said.<\/p>\n\n\n\n<p>\u201cWe checked in here under false names,\u201d Zen said.<\/p>\n\n\n\n<p>\u201cIt\u2019ll buy us some time. Not much. We\u2019ve got to move.\u201d<\/p>\n\n\n\n<p>\u201cTry to find us a place with high speed Internet.\u201d<\/p>\n\n\n\n<p>\u201cGot it. What about you two? Got enough to work with?\u201d<\/p>\n\n\n\n<p>\u201cWe do not have access to the data center,\u201d Alex said. \u201cHowever, we are already receiving gigabytes of data from the tap you installed, as well as the devices you\u2019ve compromised.\u201d<\/p>\n\n\n\n<p>\u201cLet\u2019s hope we find something useful.\u201d<\/p>\n\n\n\n<p>\u201cIf we don\u2019t, there\u2019s always sneaky ninja shit,\u201d Zen opined.<\/p>\n\n\n\n<p>\u201cWe have a large attack surface. We have many other potential targets,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cThat was a joke.\u201d<\/p>\n\n\n\n<p>Alex blinked.<\/p>\n\n\n\n<p>\u201cOh.\u201d<\/p>\n\n\n\n<p>\u201cWell, half a joke. It might well boil down to that if we don\u2019t come up with something,\u201d Zen said.<\/p>\n\n\n\n<p>\u201cYou boys do your thing. I\u2019ll do mine,\u201d Kayla said.<\/p>\n\n\n\n<p>#<\/p>\n\n\n\n<p>Humans were the weakest link in the chain. The most secure network in the world didn\u2019t matter if a single careless user opened a vulnerability in the network. Air gapped systems truly weren\u2019t air gapped. In this era of networks and cloud computing, outside of certain specialist tasks, any computer totally isolated from all other computers was functionally useless.<\/p>\n\n\n\n<p>A corporate data center was no exception. An air gapped server was the best way to keep data safe from hackers. But without a method of feeding data into the server, it was practically useless. There would always be a vulnerability. Instead, computer security architecture sought to design choke points and safeguards, minimizing potential attack vectors and maximizing the defenders\u2019 ability to identify and intercept cyberattacks.<\/p>\n\n\n\n<p>Yet it was contingent on the users conforming strictly to cybersecurity protocols.<\/p>\n\n\n\n<p>And if here was one thing Zen knew, it was that you could always count on human laziness and carelessness.<\/p>\n\n\n\n<p>Data trickled from the sniffer into the secure website. Much of it was noise. Personal emails, cat videos, the odd mobile game. But hidden among the data dump was pure gold. Usernames. Passwords. Encrypted files.<\/p>\n\n\n\n<p>Alex struck paydirt first. A manager used her work tablet to access Zenith\u2019s intranet. From there he gleaned her credentials. Then he hopped on over to the HR department, where he created a new administrator account, with complete access to the entire system.<\/p>\n\n\n\n<p>Standard IT security protocol was to manually transfer data from nonsecure machines to the data center using flash drives. After plugging in the drive into a nonsecure machine, the user was supposed to scan the drive. Then, at the data center, the user had to scan the drive again before transferring the data over.<\/p>\n\n\n\n<p>But there was always a gap between paper and practice, and there was only so much antivirus software could do.<\/p>\n\n\n\n<p>In the evening, Kayla and Zen relocated to another two-room suite in another hotel. The Wellington was a perfectly respectable business hotel, perfectly bland, perfectly anonymous, and therefore perfect for the job. Even better, it also had fiber optic high-speed room Internet.<\/p>\n\n\n\n<p>When Zen set up shop, he took over from Alex. Using the new administrator account, he remotely accessed key computers. The receptionist, the managers, the executives, everyone who would have a reason to transfer secure data to the data center. He injected each machine with a payload of malware, whitelisted it on the computer\u2019s antivirus program, then vacuumed up the data from every compromised machine and pasted it to the secure site.<\/p>\n\n\n\n<p>Much of it was useless to him. Zen was only interested in information pertaining to the New Gods. He deployed crawlers to scour the text, looking for keywords related to the Void Collective, its puppet corporations, its biotech research.<\/p>\n\n\n\n<p>Nothing.<\/p>\n\n\n\n<p>There was plenty of other data. Biochemistry research, financial records, personnel folders, client information, so much more. Alex would surely find use in it. He knew the kind of people who would pay a premium for information like this.<\/p>\n\n\n\n<p>It didn\u2019t sit right with him. He had sworn an oath to protect and serve the people. He could justify this hack\u2014this <em>crime<\/em>\u2014as pre-emptive defense. To learn what the Void Collective was up to before they unleashed another surprise on him. But going after innocents, <em>civilians<\/em>, was a line he could not cross.<\/p>\n\n\n\n<p>Not that Alex shared his qualms.<\/p>\n\n\n\n<p>When his night\u2019s work was done, he sent Alex a message.<\/p>\n\n\n\n<p><em>Our focus is the VC\u2019s biotech research, and only the research. We\u2019re here to figure out what they\u2019re up to. Everything else is not our business. We will discard all collateral data we\u2019ve picked up and keep only what is relevant.<\/em><\/p>\n\n\n\n<p>Alex responded with a single word: <em>Okay.<\/em><\/p>\n\n\n\n<p>Zen didn\u2019t know whether Alex would keep his word. So he simply selected every piece of irrelevant information dumped on the site and deleted them all.<\/p>\n\n\n\n<p>There was nothing stopping Alex from making and keeping his own copies, of course. But Zen had to try. He wouldn\u2019t be able to live with himself if he hadn\u2019t.<\/p>\n\n\n\n<p>In the morning, Zen ensconced himself at his workstation, checked the progress over the previous night, and waited.<\/p>\n\n\n\n<p>Hacking wasn\u2019t like the movies. Most of the time, if you were doing it right, you just let the machine run the code and allow the data to flow in. You only stepped it when you needed to, to execute programs, to interpret data, to do what a machine couldn\u2019t do.<\/p>\n\n\n\n<p>He stayed at the laptop all day, sorting data, discarding what was useless, keeping only information related to biotech. Data streams ebbed and flowed as the hours passed, reflecting user preferences and behaviors. He stepped away only to eat and to tend to bodily functions. As he worked, he saw data moving around, files appearing and disappearing, notes materializing from the ether. Alex at work, his hands invisible but not the fruits of his labor.<\/p>\n\n\n\n<p>It was slow, tedious work. But it was work like this that broke cases and exposed demons. Zen understood this when he signed up to become a cyber specialist in the STS. It had been a long time since he\u2019d done anything like this, but it was riding a bicycle. Some things you just didn\u2019t forget.<\/p>\n\n\n\n<p>As time passed, stranger files flowed into the secure site. These weren\u2019t text, videos, images, music, or anything a classical computer could read. These had a unique file format.<\/p>\n\n\n\n<p>VOID.<\/p>\n\n\n\n<p>The file format to end all file formats, the file format that had haunted Zen\u2019s dreams in the weeks and months after the invasion of the Golden Mile. Bridging biological and classical computing paradigms, VOID coded text, imagery and video with equal aplomb. Only one kind of computer could read VOID.<\/p>\n\n\n\n<p>A hybrid biocomputer running VoidOS.<\/p>\n\n\n\n<p>Which meant there was a VC biocomputer in Zenith. Likely inside the lab. That would explain the presence of the guards\u2014and why they ejected Kayla without hurting her. They didn\u2019t want her to discover the secret, but they didn\u2019t want to signal its importance by harming her either.<\/p>\n\n\n\n<p>A calculated maneuver. Zen couldn\u2019t read VOID files. Without a biocomputer, or a machine capable of reading data DNA storage, no one could. He hunted for plain text files generated by the classical component of a VC hybrid biocomputer that described the genetic sequences that stored the information. The last time they encountered VOID files, Alex had used this workaround to recreate information store don DNA data storage. This time, Zen found nothing.<\/p>\n\n\n\n<p>The VC had patched that vulnerability.<\/p>\n\n\n\n<p>Kayla had little to do. She read the news, worked out, maintained her gear, called room service at mealtimes. Occasionally she read through copied project documentation, to decide whether it was something the Void Collective was interested in, or whether it could be safely discarded. Every single time, she voted for the recycle bin.<\/p>\n\n\n\n<p>Night fell. Zen finally broke away from the screen. Everyone at Zenith Biotech had left. He let the machines do their thing and wound down.<\/p>\n\n\n\n<p>In the living room, he flowed through an intense bodyweight exercise regimen. Forty-five minutes of push-ups, squats, lunges, jumps, interspaced with punches, kicks, sweeps, strikes. He flowed from one exercise to the other without stopping, getting in dozens, hundreds, of reps each.<\/p>\n\n\n\n<p>By the time he was done, he was panting, sweating, sore, but in a good way. He treated himself to a long, hot shower. He toweled himself down, changed into fresh clothing, and returned to his laptop.<\/p>\n\n\n\n<p>And checked the secure site.<\/p>\n\n\n\n<p>And grinned.<\/p>\n\n\n\n<p>\u201cJackpot.\u201d<\/p>\n\n\n\n<p>They were in.<\/p>\n\n\n\n<p>Yesterday, the Finance Executive had plugged a flash drive into his infected machine. The computer passed on the malware to the drive. Someone plugged the drive into a server in the data center. Once embedded in the machine, the malware hunted among the folders, copying every document that contained a set of targeted keywords.<\/p>\n\n\n\n<p>This evening, someone else plugged another drive into the server. The malware exfiltrated the data onto the drive. The user plugged the drive into the HR Executive\u2019s computer. The infected computer began transmitting the captured data onto the web through the device Zen had installed in the water dispenser.<\/p>\n\n\n\n<p>The HR Executive shut down her computer. Fifteen minutes later, it stealthily booted back up, keeping the monitor dark but the processor running, and continued the exfiltration.<\/p>\n\n\n\n<p>And now, at last, they had what they were looking for.<\/p>\n\n\n\n<p>Kayla sidled up next to Zen, looking over his shoulder.<\/p>\n\n\n\n<p>\u201cFound something?\u201d she asked.<\/p>\n\n\n\n<p>He tapped the screen.<\/p>\n\n\n\n<p>\u201cProject Communion.\u201d<\/p>\n\n\n\n<p>#<\/p>\n\n\n\n<p>It took the team an hour to read the project documentation. Heavy on concepts but light on details, it described the project vision and time lines, capabilities and use cases, division of responsibilities and implementation strategy. Alex needed only a minute to summarize it.<\/p>\n\n\n\n<p>\u201cProject Communion is the Void Collective\u2019s next generation biocomputer. In development for five years, research and development was accelerated following the formation of the Temple Commission. Zenith Biotech brings together research findings from five separate subsidiaries, then submits them and its own work to the Golden Mile Research Laboratory for final integration.<\/p>\n\n\n\n<p>\u201cProject Communion introduces VoidOS 2.1, an upgrade to the previous VoidOS. Among other things, it features enhanced security measures, including native anti-intrusion DNA sequences. Unauthorized users who attempt to read specific sequences will upload dummy data or malware into their systems. These anti-intrusion sequences can be rapidly edited and rewritten to suit specific requirements. In addition, should a biocomputer be compromised, the remaining biocomputers can rapidly mutate into a new configuration to preserve critical data while locking out compromised devices.<\/p>\n\n\n\n<p>\u201cProject Communion has completed user acceptance testing and is now being deployed to all VC nodes and support facilities.\u201d<\/p>\n\n\n\n<p>Kayla leaned back in her chair, rubbing her temples.<\/p>\n\n\n\n<p>\u201cYou\u2019re saying the VC has upgraded their network.\u201d<\/p>\n\n\n\n<p>Through the window of the teleconferencing app, Alex stared at her with supreme indifference.<\/p>\n\n\n\n<p>\u201cIt is currently ongoing.\u201d<\/p>\n\n\n\n<p>\u201cHow long will it take?\u201d<\/p>\n\n\n\n<p>\u201cA biocomputer is not like a regular computer. You cannot simply push out a new OS over the Internet and install new parts. The OS is hardcoded into its DNA sequences. New biocomputers must be printed from scratch and old ones disposed of.\u201d<\/p>\n\n\n\n<p>Seated by the laptop, Zen stroked his chin.<\/p>\n\n\n\n<p>\u201cThis upgrade takes time,\u201d Zen mused.<\/p>\n\n\n\n<p>\u201cIt says here that the VC expects the upgrades to be completed in five days,\u201d Kayla said. \u201cAlex, if you still want your biocomputer, we don\u2019t have much time.\u201d<\/p>\n\n\n\n<p>\u201cWe have enough.\u201d<\/p>\n\n\n\n<p>\u201cWe\u2019re still going to do it? We\u2019re going to steal a biocomputer from the VC?\u201d<\/p>\n\n\n\n<p>\u201cWithout a biocomputer, one that conforms to Project Communion specifications, we will have no way of penetrating the VC\u2019s information ecosystem. We must obtain it if we are to monitor future VC activities.\u201d<\/p>\n\n\n\n<p>\u201cIt can\u2019t be as simple as breaking into a warehouse and stealing one,\u201d Zen said. \u201cIf the VC knows we\u2019ve stolen or compromised a biocomputer, they can mutate the entire network in moments. From then on, the stolen biocomputer can only read junk data on the VC net.\u201d<\/p>\n\n\n\n<p>\u201cOr they\u2019ll feed the compromised machine misinformation, viruses, or both,\u201d Kayla added.<\/p>\n\n\n\n<p>\u201cYes,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cThat makes a heist extremely risky. I read the VC is using blockchain technology to maintain its supply line integrity. If something disappears from the system, if it doesn\u2019t show up where it\u2019s supposed to go, it sends an alert throughout the system.\u201d<\/p>\n\n\n\n<p>\u201cIt is unlikely that they will ship such sensitive technologies, not when they have in-house bioprinting capabilities,\u201d Alex said. \u201cI believe they will simply transmit the genetic sequences to every arcology and network node for on-site printing.\u201d<\/p>\n\n\n\n<p>\u201cYou can bet they will,\u201d Zen said. \u201cIt cuts out the weakest link in the supply chain. Printing the biocomputers wouldn\u2019t take long. No more than a day or two. The real difficulty lies in integrating the biocomputer into their existing infrastructure and testing them.\u201d<\/p>\n\n\n\n<p>\u201cWe could infiltrate an arcology, access the bioprinter, and print a new biocomputer,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cYou serious?\u201d Kayla exclaimed. \u201cThe VC know what we know like, even with disguises. While we can reasonably expect the arcologies to have bioprinters, we don\u2019t know <em>where<\/em> they are, or how to access them. Even if we do break into the bioprinter workshop, the bioprinter will likely leave records. If the records are stored on a blockchain, we\u2019re screwed. And then there\u2019s the problem of extracting with the biocomputer, without sounding the alarm.\u201d<\/p>\n\n\n\n<p>\u201cShe\u2019s right,\u201d Zen said. \u201cIt\u2019s just as risky as a heist, if not more so.\u201d<\/p>\n\n\n\n<p>Alex frowned, and went silent.<\/p>\n\n\n\n<p>\u201cThe plans for the Project Communion biocomputer only exists as data, right?\u201d Kayla asked.<\/p>\n\n\n\n<p>\u201cYes,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cAnd Zenith Biotech is a \u2018support facility\u2019, isn\u2019t it?\u201d<\/p>\n\n\n\n<p>\u201cThe presence of the guards suggests that,\u201d Zen said. \u201cThey don\u2019t deploy personnel to protect third-party personnel and infrastructure.\u201d<\/p>\n\n\n\n<p>\u201cThe presence of VOID files tells us that they have a biocomputer on site,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cThen we can expect Zenith to request a copy of the biocomputer plans, if they haven\u2019t already,\u201d Zen said.<\/p>\n\n\n\n<p>Zen grinned.<\/p>\n\n\n\n<p>\u201cWhich means <em>we <\/em>can obtain a copy of the plans.\u201d<\/p>\n\n\n\n<p>\u201cAnd print our own biocomputer,\u201d Alex finished.<\/p>\n\n\n\n<p>His voice remained a flat monotone, but the hints of a smile crept across his face.<\/p>\n\n\n\n<p>\u201cGive me a moment,\u201d Alex said.<\/p>\n\n\n\n<p>\u201cWait one.\u201d<\/p>\n\n\n\n<p>He hammered at his keyboard. Clicked his mouse. Typed again. Clicked again. Nodded.<\/p>\n\n\n\n<p>\u201cThe Lab Executive sent an internal email to the receptionist. He is expecting a secure courier to arrive tomorrow at three pm. The courier has a package for the \u2018partner lab\u2019 on the second floor. And this courier is from Vex.\u201d<\/p>\n\n\n\n<p>\u201cThe Void Collective\u2019s delivery megacorp,\u201d Zen said.<\/p>\n\n\n\n<p>Vex ran the fastest, cheapest, most efficient delivery service in the world. Every courier had the power of teleportation. Within five minutes of placing an order, a Vex courier would show up at your address. Five more minutes and the job would be done, guaranteed. Vex\u2019s only drawback was each courier was limited to what he could carry on his person. No other courier company could hope to compete against that. Either they switched their focus to delivering bulk goods or closed shop. Ever since its inception, Vex enjoyed an unbreakable monopoly in the industry.<\/p>\n\n\n\n<p>It also served as a front for the Elect commandos of the Void Collective.<\/p>\n\n\n\n<p>\u201cWe can\u2019t grab the courier,\u201d Kayla said. \u201cHe\u2019ll teleport into the lobby. Or into the lab. No way to take him in a nonsecure area. We\u2019ll have to wait until the code is uploaded into the network, then exfiltrate it.\u201d<\/p>\n\n\n\n<p>\u201cIt\u2019s going to be encrypted,\u201d Zen said.<\/p>\n\n\n\n<p>\u201cGive me a moment,\u201d Alex said.<\/p>\n\n\n\n<p>More typing. More clicking. More reading.<\/p>\n\n\n\n<p>\u201cWhile we have not penetrated the lab\u2019s secure servers, we have access to the scheduling software Zenith uses to manage its rooms, machines and critical equipment,\u201d Alex said. \u201cThe Lab Executive has booked time on the in-house bioprinter. Twelve hours, starting from six in the evening, tomorrow.\u201d<\/p>\n\n\n\n<p>\u201cEnough time to print a biocomputer,\u201d Zen said.<\/p>\n\n\n\n<p>\u201cCorrect. The Lab Executive\u2019s computer is networked with the bioprinter. To print the biocomputer, he will need to decrypt the file. Once he does this, we can exfiltrate the data.\u201d<\/p>\n\n\n\n<p>\u201cAnd we can print our very own biocomputer,\u201d Zen said.<\/p>\n\n\n\n<p>\u201cAnd then, the mission will be complete,\u201d Kayla said.<\/p>\n\n\n\n<p>\u201cNot yet,\u201d Alex said. \u201cThere is still one last task I would like you to perform.\u201d<\/p>\n\n\n\n<p>She sighed.<\/p>\n\n\n\n<p>\u201cAnd what is that?\u201d <\/p>\n\n\n\n<p>\u201cInstallation protection.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.benjamincheah.com\/wp-content\/uploads\/2020\/08\/Benjamin-Cheah_BabylonBlue_KS_Title-2-676x1024.jpg\" alt=\"\" class=\"wp-image-5905\"\/><\/figure>\n\n\n\n<p>The last time Zen hacked into a VC system, it didn&#8217;t end well. Read that operation <a href=\"https:\/\/www.amazon.com\/Babylon-Blues-Cyberpunk-Military-Collection-ebook\/dp\/B083WF252K\">here<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Weakest Link Precision. Control. Calmness. The watchwords that kept Kayla grounded in the field. She was not in the field any more. \u201cShit, shit, shit, shit, SHIT!\u201d She punctuated every word with a step, burning a circle into the living room carpet. Seated at his workstation, Zen folded his hands over his belly, his [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[68,106,143,168,172,253,289],"class_list":["post-6117","post","type-post","status-publish","format-standard","hentry","category-fiction","tag-babylon-red","tag-cyberpunk","tag-free-story","tag-horror","tag-hunters-of-the-void","tag-pulprev","tag-singlit"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=\/wp\/v2\/posts\/6117"}],"collection":[{"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6117"}],"version-history":[{"count":0,"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=\/wp\/v2\/posts\/6117\/revisions"}],"wp:attachment":[{"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kitsuncheah.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}