{"id":652,"date":"2024-05-23T07:20:38","date_gmt":"2024-05-23T07:20:38","guid":{"rendered":"https:\/\/200oksolutionssandbox.co.uk\/blog\/?p=652"},"modified":"2024-07-30T08:26:22","modified_gmt":"2024-07-30T08:26:22","slug":"securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization","status":"publish","type":"post","link":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/","title":{"rendered":"Securing Your Android Apps: Guide to Secure Implementation of Encryption, Authentication, and Authorization"},"content":{"rendered":"\n<p>Smartphone application through robust encryption, authentication, and authorization techniques. By implementing these strategies, you can safeguard sensitive data and protect your users&#8217; privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encryption<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encryption plays a vital role in securing user data on Android devices.<\/li>\n\n\n\n<li>Encryption is the process of transforming data into an unreadable format using a secret key. This ensures that only authorized parties with the decryption key can access the original data.<\/li>\n\n\n\n<li>Understanding the fundamentals of encryption: symmetric vs. asymmetric encryption, hashing, and salting.<\/li>\n\n\n\n<li>Selecting appropriate encryption algorithms and key management strategies for Android apps.<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>User Model<\/strong><\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code has-black-color has-gray-background-color has-text-color has-background has-link-color wp-elements-8cc3c64317249efac23905bf17435411\"><code>public class User { \n  private String username; \n  private String password; \/\/ Hashed password (not plain text)\n     \/\/ Getters and Setters \n }<\/code><\/pre>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Secure Password Storage (using Hashing):<\/strong><\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code has-black-color has-gray-background-color has-text-color has-background has-link-color wp-elements-a59d239693068fc5e848d99924979074\"><code>public class SecurityUtils {\n \n    public static String hashPassword(String password) { \n         \/\/ Use a strong hashing algorithm like bcrypt or scrypt \n    return BCrypt.hashpw(password, BCrypt.gensalt(10));\n  } \npublic static boolean verifyPassword(String plainTextPassword, String hashedPassword) \n  { \n   return BCrypt.checkpw(plainTextPassword, hashedPassword);\n  } \n}\n<\/code><\/pre>\n\n\n\n<p>The <strong>User model<\/strong> stores the hashed password, no longer the obvious textual content password. This prevents retrieving the original password even supposing the database is compromised.<\/p>\n\n\n\n<p>The <strong>SecurityUtils<\/strong> provides methods for hashing passwords (using BCrypt in this case) and verifying them for the duration of login.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Implementing Secure Authentication<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exploring various authentication methods and their suitability for different scenarios.<\/li>\n\n\n\n<li>Authentication Methods:\n<ul class=\"wp-block-list\">\n<li>Username &amp; Password:<\/li>\n\n\n\n<li>Multi-Factor Authentication (MFA)<\/li>\n\n\n\n<li>Token-Based Authentication:<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Best practices for securely storing and managing user credentials on the device.<\/li>\n\n\n\n<li>Implementing secure authentication flows using libraries like Firebase Authentication or OAuth 2.0.<\/li>\n<\/ul>\n\n\n\n<p>Implementing secure authentication flows using libraries like Firebase Authentication or OAuth 2.0.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Login Activity<\/strong><\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code has-black-color has-gray-background-color has-text-color has-background has-link-color wp-elements-6525d618bc8dc7ec7b6658ed088d17be\"><code>public class LoginActivity extends AppCompatActivity { \n     private ActivityLoginBinding binding; \n     @Override \n     protected void onCreate(Bundle savedInstanceState) <strong>{<\/strong> \n        super.onCreate(savedInstanceState);\n        binding = ActivityLoginBinding.inflate(getLayoutInflater()); \n        setContentView(binding.getRoot()); \n\n       \/\/ Login button click listener \n       binding.loginButton.setOnClickListener(new View.OnClickListener() <strong>{<\/strong> \n           @Override \n       public void onClick(View v) <strong>{<\/strong>\n          String username = binding.usernameEditText.getText().toString(); \n          String password = binding.passwordEditText.getText().toString(); \n\n      \/\/ Hash the entered password for comparison \n          String hashedPassword = SecurityUtils.hashPassword(password); \n      \/\/ Authenticate user with username and hashed password (backend call)\n        authenticateUser(username, hashedPassword);\n    <strong>}<\/strong> \n  <strong>}<\/strong>);\n<strong>}<\/strong>\n \nprivate void authenticateUser(String username, String hashedPassword) <strong>{<\/strong> \n    \/\/ Call your API here to authenticate the user with username and hashed password \n    \/\/ ... \n\n    \/\/ If successful, store a secure token for authorization \n    storeAuthToken(\/\/ ...);\n\n    \/\/ Start main activity \n    Intent intent = new Intent (LoginActivity.this, MainActivity.class); \n    startActivity(intent); \n <strong>}<\/strong> \n}<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>The login activity retrieves username and password from the edit texts.<\/p>\n\n\n\n<p>The password is hashed before sending it for authentication.<\/p>\n\n\n\n<p>Upon successful login, a secure token (e.g., JWT) can be stored for authorization in subsequent requests.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Secure Storage and Data Handling<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Safeguarding sensitive data in transit and at rest using encryption and secure storage techniques.<\/li>\n\n\n\n<li>Implementing data encryption for local databases, Shared Preferences, and file storage.<\/li>\n\n\n\n<li>Securely transmitting data between client and server using HTTPS and encrypted communication protocols.<\/li>\n\n\n\n<li>Secure Storage Mechanisms: Shared Preferences, KeyStore, Android Room with Encryption<\/li>\n\n\n\n<li>Best Practices for Data Handling: Validate User Input, Secure Network Communication, Regular Backups, Clear Data on Logout or App Uninstall<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><strong>Secure Storage (for Auth Token)<\/strong><\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code has-black-color has-gray-background-color has-text-color has-background has-link-color wp-elements-983d0584d4968a3b9d7422d216dacdbd\"><code>public class SharedPrefManager { \n\n    private static final String PREF_NAME = \"MyApp_Prefs\"; \n    private static final String KEY_AUTH_TOKEN = \"auth_token\"; \n\n    private static SharedPreferences getSharedPreferences() { \n      return getApplicationContext().getSharedPreferences(PREF_NAME, \nContext.MODE_PRIVATE); \n  } \n\n    public static void storeAuthToken(String token) { \n      SharedPreferences.Editor editor = getSharedPreferences().edit();    \n      editor.putString(KEY_AUTH_TOKEN, token); \n      editor.apply();\n }\n\n    public static String getAuthToken() { \n      return getSharedPreferences().getString(KEY_AUTH_TOKEN, null); \n  } \n}<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>The <strong>SharedPrefManager<\/strong> class provides secure storage for the auth token using SharedPreferences with a private mode.<\/p>\n\n\n\n<p>The token is retrieved for subsequent API calls requiring authorization.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Authorization: Controlling Access<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The user is successfully authenticated, and <strong>authorization<\/strong> comes into play. It determines what actions or resources a user is allowed to access within the app.<\/li>\n\n\n\n<li>There are different authorization models you can implement in your app.<\/li>\n\n\n\n<li>A common approach is <strong>Role-Based Access Control (RBAC)<\/strong>. Users are assigned roles (e.g., admin, editor, viewer) with predefined permissions.<\/li>\n\n\n\n<li>Effective authorization is crucial for protecting your app&#8217;s data and functionalities.<\/li>\n\n\n\n<li>By Understanding and implementing authorization correctly, you can build a more secure and user-friendly application for Android phones.<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li><strong>Authorization Activities<\/strong><\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code has-black-color has-gray-background-color has-text-color has-background has-link-color wp-elements-b48dfccf8c557e6f10d7de9e59a6be73\"><code>public class ProtectedActivity extends AppCompatActivity { \n   @Override \n   protected void onCreate(Bundle savedInstanceState) <strong>{<\/strong> \n      super.onCreate(savedInstanceState); \n      setContentView(R.layout.activity_protected);\n      String authToken = SharedPrefManager.getAuthToken(); \n      if (authToken == null) { \n         \/\/ User is not authorized, redirect to login \n         Intent intent = new Intent(ProtectedActivity.this, LoginActivity.class);      \n         startActivity(intent); \n         finish();\n   } else { \n      \/\/ Make authorized API calls using the auth token \n      \/\/ ... \n    } \n  <strong>}<\/strong> \n}<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>The protected activity checks for the presence of an auth token before allowing access to sensitive features.<\/p>\n\n\n\n<p>If the token is missing, the user is redirected to the login activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphone application through robust encryption, authentication, and authorization techniques. By implementing these strategies, you can&hellip;<\/p>\n","protected":false},"author":1,"featured_media":655,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[115,7],"tags":[113,111,114,68,92,112],"class_list":["post-652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-mobile","tag-app-authorization","tag-app-encryption","tag-app-security-best-practices","tag-data-protection","tag-mobile-app-development","tag-mobile-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Secure Android Phone App Development Guidelines 2024<\/title>\n<meta name=\"description\" content=\"How to Securely Implement Authentication, Authorization, and Encryption in Your Android Apps, Latest Guideline Secure Mobile App Development 2024.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Secure Android Phone App Development Guidelines 2024\" \/>\n<meta property=\"og:description\" content=\"How to Securely Implement Authentication, Authorization, and Encryption in Your Android Apps, Latest Guideline Secure Mobile App Development 2024.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61552217825863\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T07:20:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-30T08:26:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2024\/05\/Securing-Your-Android-Apps-Guide-to-Secure-Implementation-of-Encryption-Authentication-and-Authorization.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1373\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"BlogAdmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BlogAdmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Secure Android Phone App Development Guidelines 2024","description":"How to Securely Implement Authentication, Authorization, and Encryption in Your Android Apps, Latest Guideline Secure Mobile App Development 2024.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/","og_locale":"en_US","og_type":"article","og_title":"Best Secure Android Phone App Development Guidelines 2024","og_description":"How to Securely Implement Authentication, Authorization, and Encryption in Your Android Apps, Latest Guideline Secure Mobile App Development 2024.","og_url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61552217825863","article_published_time":"2024-05-23T07:20:38+00:00","article_modified_time":"2024-07-30T08:26:22+00:00","og_image":[{"width":2048,"height":1373,"url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2024\/05\/Securing-Your-Android-Apps-Guide-to-Secure-Implementation-of-Encryption-Authentication-and-Authorization.webp","type":"image\/webp"}],"author":"BlogAdmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"BlogAdmin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#article","isPartOf":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/"},"author":{"name":"BlogAdmin","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#\/schema\/person\/ea0b72006227b3403f5ad825b82ced43"},"headline":"Securing Your Android Apps: Guide to Secure Implementation of Encryption, Authentication, and Authorization","datePublished":"2024-05-23T07:20:38+00:00","dateModified":"2024-07-30T08:26:22+00:00","mainEntityOfPage":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2024\/05\/Securing-Your-Android-Apps-Guide-to-Secure-Implementation-of-Encryption-Authentication-and-Authorization.webp","keywords":["App Authorization","App Encryption","App Security Best Practices","Data Protection","Mobile App Development","Mobile Authentication"],"articleSection":["Android","Mobile"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/","url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/","name":"Best Secure Android Phone App Development Guidelines 2024","isPartOf":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#primaryimage"},"image":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#primaryimage"},"thumbnailUrl":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2024\/05\/Securing-Your-Android-Apps-Guide-to-Secure-Implementation-of-Encryption-Authentication-and-Authorization.webp","datePublished":"2024-05-23T07:20:38+00:00","dateModified":"2024-07-30T08:26:22+00:00","description":"How to Securely Implement Authentication, Authorization, and Encryption in Your Android Apps, Latest Guideline Secure Mobile App Development 2024.","breadcrumb":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#primaryimage","url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2024\/05\/Securing-Your-Android-Apps-Guide-to-Secure-Implementation-of-Encryption-Authentication-and-Authorization.webp","contentUrl":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2024\/05\/Securing-Your-Android-Apps-Guide-to-Secure-Implementation-of-Encryption-Authentication-and-Authorization.webp","width":2048,"height":1373,"caption":"Securing Your Android Apps Guide to Secure Implementation of Encryption, Authentication, and Authorization"},{"@type":"BreadcrumbList","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/securing-your-android-apps-guide-to-secure-implementation-of-encryption-authentication-and-authorization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/200oksolutionssandbox.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Your Android Apps: Guide to Secure Implementation of Encryption, Authentication, and Authorization"}]},{"@type":"WebSite","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#website","url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/","name":"","description":"","publisher":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/200oksolutionssandbox.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#organization","name":"Web Development Blog | Software Blog | App Blog","url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2026\/01\/200ok_logo.png","contentUrl":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-content\/uploads\/2026\/01\/200ok_logo.png","width":500,"height":191,"caption":"Web Development Blog | Software Blog | App Blog"},"image":{"@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61552217825863"]},{"@type":"Person","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#\/schema\/person\/ea0b72006227b3403f5ad825b82ced43","name":"BlogAdmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/200oksolutionssandbox.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/53ecc99d859b4d3444ee1e076f3b5d9da9962836d1c20b3b44d73574f435740d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53ecc99d859b4d3444ee1e076f3b5d9da9962836d1c20b3b44d73574f435740d?s=96&d=mm&r=g","caption":"BlogAdmin"},"sameAs":["http:\/\/blog.200oksolutions.com"],"url":"https:\/\/200oksolutionssandbox.co.uk\/blog\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/posts\/652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=652"}],"version-history":[{"count":5,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/posts\/652\/revisions"}],"predecessor-version":[{"id":718,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/posts\/652\/revisions\/718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/media\/655"}],"wp:attachment":[{"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/200oksolutionssandbox.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}