{"id":2579,"date":"2021-12-07T16:13:18","date_gmt":"2021-12-07T15:13:18","guid":{"rendered":"https:\/\/koansoftware.com\/?page_id=2579"},"modified":"2024-08-30T10:19:27","modified_gmt":"2024-08-30T08:19:27","slug":"embedded-security","status":"publish","type":"page","link":"https:\/\/koansoftware.com\/embedded-security\/","title":{"rendered":"Embedded security"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2wv3my-656554c824fefa73d428eaf1432176b4\">\n.flex_column.av-2wv3my-656554c824fefa73d428eaf1432176b4{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2wv3my-656554c824fefa73d428eaf1432176b4 av_one_full  avia-builder-el-0  el_before_av_one_half  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-jzvcr5dk-bd79275b5453b340912e483712043a1b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Protect Your Embedded Software from Cybersecurity Vulnerabilities<\/h2>\n<p>In the world of <strong>embedded systems<\/strong>, even a single <strong>cybersecurity vulnerability<\/strong> can leave your devices exposed to <strong>data breaches<\/strong>, <strong>cyberattacks<\/strong>, and other security incidents. Implementing robust <strong>security features<\/strong> is crucial to ensure that your embedded systems are protected against these growing threats.<\/p>\n<h4>The Importance of Embedded Security in the IoT Era<\/h4>\n<p>With the rise of the <strong>Internet of Things (IoT)<\/strong>, a growing number of devices are connected to the Internet, expanding the potential for cyber risks. <strong>IoT embedded devices<\/strong> are now present in a variety of environments, including <strong>offices<\/strong>, <strong>industrial settings<\/strong>, and the <strong>healthcare sector<\/strong>. However, without proper <strong>security features<\/strong>, these connected devices can create serious vulnerabilities in your organization&#8217;s network, posing a significant risk.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2588\" src=\"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png\" alt=\"Embedded security\" width=\"1500\" height=\"385\" \/><\/p>\n<h4>How We Help You Secure Your Embedded Systems<\/h4>\n<p>At <strong>KOAN<\/strong>, we leverage our <strong>expertise<\/strong> and provide <strong>consulting services<\/strong> to help businesses protect their embedded devices from cyber threats. We work with you to mitigate the vulnerabilities inherent in IoT devices, allowing you to enjoy their benefits while minimizing risks. Our approach ensures that your systems remain secure, even as more devices become connected.<\/p>\n<h4>Key Takeaways:<\/h4>\n<ul>\n<li><strong>Embedded security<\/strong> is essential to protect your devices from data breaches and cyberattacks.<\/li>\n<li>IoT devices, if not properly secured, can create vulnerabilities in your network.<\/li>\n<li>Our <strong>consulting services<\/strong> help you implement robust security features, reducing the risks associated with IoT and embedded systems.<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4h8f6p-14f7a7de6ca3581a84a0ced87cc1729b\">\n.flex_column.av-4h8f6p-14f7a7de6ca3581a84a0ced87cc1729b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-4h8f6p-14f7a7de6ca3581a84a0ced87cc1729b av_one_half  avia-builder-el-2  el_after_av_one_full  el_before_av_one_half  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyee333z-56c5dd6f5eb55b34ccb101a58f580c26\">\n.av_font_icon.av-jyee333z-56c5dd6f5eb55b34ccb101a58f580c26{\ncolor:#b02b2c;\nborder-color:#b02b2c;\n}\n.avia-svg-icon.av-jyee333z-56c5dd6f5eb55b34ccb101a58f580c26 svg:first-child{\nstroke:#b02b2c;\nfill:#b02b2c;\n}\n.av_font_icon.av-jyee333z-56c5dd6f5eb55b34ccb101a58f580c26 .av-icon-char{\nfont-size:60px;\nline-height:60px;\n}\n<\/style>\n<span  class='av_font_icon av-jyee333z-56c5dd6f5eb55b34ccb101a58f580c26 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='\uf132' data-av_iconfont='fontello' aria-hidden=\"true\" ><\/span><\/span><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyee3e1f-6c2a2a9dade3273760de499a7a785685\">\n#top .hr.hr-invisible.av-jyee3e1f-6c2a2a9dade3273760de499a7a785685{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-jyee3e1f-6c2a2a9dade3273760de499a7a785685 hr-invisible  avia-builder-el-4  el_after_av_font_icon  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-jy08cyvo-c8fcf498124b4cab59ab0d0f799d8363 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Secure Boot and Chain of Trust: Protect Your Devices from Tampered Software<\/h2>\n<p>Ensure your device is secure by implementing <strong>Secure Boot<\/strong> and a <strong>Chain of Trust<\/strong> to verify the authenticity of software before it runs. By establishing software authenticity from the bootloader all the way to user applications, you can protect your embedded systems from unauthorized code and tampered software.<\/p>\n<h4>Secure Boot Implementation Services<\/h4>\n<p>We offer comprehensive <strong>secure boot<\/strong> services, helping you integrate verified boot processes across a wide range of platforms, including:<\/p>\n<ul>\n<li><strong>Verified Bootloader<\/strong>: NXP i.MX \/ QorIQ, Qualcomm Snapdragon, TI Sitara, Atmel SAMA5, Xilinx Zynq, and more.<\/li>\n<li><strong>Kernel Verification<\/strong>: Use methods like <strong>FIT image<\/strong> or <strong>SoC-specific mechanisms<\/strong> to ensure the kernel is genuine.<\/li>\n<li><strong>Root Filesystem Verification<\/strong>: Implement <strong>dm-verity<\/strong>, <strong>IMA\/EVM<\/strong>, or <strong>FIT image<\/strong> to verify the integrity of the root filesystem.<\/li>\n<li><strong>Filesystem Cryptography<\/strong>: Protect data with <strong>filesystem-level encryption<\/strong> using tools like <strong>dm-crypt<\/strong>.<\/li>\n<\/ul>\n<h4>Benefits of Secure Boot and Chain of Trust<\/h4>\n<ul>\n<li><strong>Prevents Tampered Software<\/strong>: Verify the authenticity of every software component before it runs.<\/li>\n<li><strong>Comprehensive Security<\/strong>: From bootloader to kernel and user applications, every layer of software is authenticated.<\/li>\n<li><strong>Advanced Cryptography<\/strong>: Safeguard sensitive data with <strong>filesystem encryption<\/strong>.<\/li>\n<\/ul>\n<p>With our secure boot and <strong>chain of trust<\/strong> implementation, you can ensure the integrity and security of your embedded systems, minimizing the risk of cyber threats.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-jy08hme7-8c533148e7dbb5d5d6da480fa6b3139c-wrap avia-button-center  avia-builder-el-6  el_after_av_textblock  avia-builder-el-last '><a href='https:\/\/koansoftware.com\/secure-boot-and-chain-of-trust\/'  class='avia-button av-jy08hme7-8c533148e7dbb5d5d6da480fa6b3139c av-link-btn avia-icon_select-yes-left-icon avia-size-small avia-position-center avia-color-theme-color'   aria-label=\"Continua\"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue832' data-av_iconfont='entypo-fontello' ><\/span><span class='avia_iconbox_title' >Continua<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2r7wtd-e476021ed8f65c36702b7ace9447b15d\">\n.flex_column.av-2r7wtd-e476021ed8f65c36702b7ace9447b15d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2r7wtd-e476021ed8f65c36702b7ace9447b15d av_one_half  avia-builder-el-7  el_after_av_one_half  avia-builder-el-last  flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyee333z-3-1d58b70fd367ee2b5601859d4778d788\">\n.av_font_icon.av-jyee333z-3-1d58b70fd367ee2b5601859d4778d788{\ncolor:#b02b2c;\nborder-color:#b02b2c;\n}\n.avia-svg-icon.av-jyee333z-3-1d58b70fd367ee2b5601859d4778d788 svg:first-child{\nstroke:#b02b2c;\nfill:#b02b2c;\n}\n.av_font_icon.av-jyee333z-3-1d58b70fd367ee2b5601859d4778d788 .av-icon-char{\nfont-size:60px;\nline-height:60px;\n}\n<\/style>\n<span  class='av_font_icon av-jyee333z-3-1d58b70fd367ee2b5601859d4778d788 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='\ue824' data-av_iconfont='entypo-fontello' aria-hidden=\"true\" ><\/span><\/span><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyee3e1f-2-68f5165b41e35a818db4267f9b89f555\">\n#top .hr.hr-invisible.av-jyee3e1f-2-68f5165b41e35a818db4267f9b89f555{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-jyee3e1f-2-68f5165b41e35a818db4267f9b89f555 hr-invisible  avia-builder-el-9  el_after_av_font_icon  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-jy08cyvo-1-35b12fef61163386e9874908de1393db '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Device Encryption and Secure Key Storage Solutions<\/h2>\n<p>Protect your <strong>intellectual property (IP)<\/strong> and <strong>sensitive user data<\/strong> by encrypting software and data on your embedded devices. To ensure the highest level of security, it is crucial to safeguard the encryption keys with <strong>secure key storage mechanisms<\/strong>. Additionally, software handling confidential information should operate within a hardware\/software-isolated environment for maximum protection.<\/p>\n<h4>Comprehensive Device Encryption and Key Management Services<\/h4>\n<p>Our end-to-end solutions gives you <strong>data encryption<\/strong> and <strong>secure key management<\/strong>, ensuring your devices and information remain protected at every stage. Our services include:<\/p>\n<ul>\n<li><strong>Anti-Cloning Solutions<\/strong>: Protect your intellectual property and sensitive data from unauthorized duplication.<\/li>\n<li><strong>Key Management and Secure Key Storage<\/strong>: Ensure encryption keys are securely managed and stored, preventing unauthorized access.<\/li>\n<li><strong>Data Protection Using Encryption<\/strong>: Encrypt data while <strong>in use<\/strong>, <strong>in motion<\/strong>, and <strong>at rest<\/strong> to ensure complete security.<\/li>\n<li><strong>Trusted Platform Module (TPM)<\/strong>: Implement TPM for secure cryptographic operations and key storage.<\/li>\n<li><strong>Trusted Execution Environment (TEE)<\/strong>: Use <strong>Arm TrustZone<\/strong> and <strong>OP-TEE<\/strong> to create a secure, isolated environment for critical applications.<\/li>\n<li><strong>Device Identity and Authentication<\/strong>: Ensure secure device identity verification and authentication for network communication and software integrity.<\/li>\n<\/ul>\n<h4>Why Device Encryption and Secure Key Storage Matter<\/h4>\n<ul>\n<li><strong>Prevent Data Breaches<\/strong>: Encryption ensures sensitive data is secure, even if devices are compromised.<\/li>\n<li><strong>Protect Intellectual Property<\/strong>: Anti-cloning measures help prevent the unauthorized use of your technology.<\/li>\n<li><strong>Secure Encryption Keys<\/strong>: Key management solutions protect the most critical element of encryption\u2014your keys.<\/li>\n<li><strong>Trusted Hardware<\/strong>: Solutions like <strong>TPM<\/strong> and <strong>TEE<\/strong> provide hardware-backed security, ensuring a high level of trust and integrity.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2579","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Embedded security - KOAN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/koansoftware.com\/embedded-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Embedded security - KOAN\" \/>\n<meta property=\"og:url\" content=\"https:\/\/koansoftware.com\/embedded-security\/\" \/>\n<meta property=\"og:site_name\" content=\"KOAN\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-30T08:19:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/koansoftware.com\/embedded-security\/\",\"url\":\"https:\/\/koansoftware.com\/embedded-security\/\",\"name\":\"Embedded security - KOAN\",\"isPartOf\":{\"@id\":\"https:\/\/koansoftware.com\/?lang=it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/koansoftware.com\/embedded-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/koansoftware.com\/embedded-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png\",\"datePublished\":\"2021-12-07T15:13:18+00:00\",\"dateModified\":\"2024-08-30T08:19:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/koansoftware.com\/embedded-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/koansoftware.com\/embedded-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/koansoftware.com\/embedded-security\/#primaryimage\",\"url\":\"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png\",\"contentUrl\":\"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png\",\"width\":1500,\"height\":385,\"caption\":\"Embedded security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/koansoftware.com\/embedded-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/koansoftware.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Embedded security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/koansoftware.com\/?lang=it\/#website\",\"url\":\"https:\/\/koansoftware.com\/?lang=it\/\",\"name\":\"KOAN\",\"description\":\"embedded software engineering\",\"publisher\":{\"@id\":\"https:\/\/koansoftware.com\/?lang=it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/koansoftware.com\/?lang=it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/koansoftware.com\/?lang=it\/#organization\",\"name\":\"KOAN\",\"url\":\"https:\/\/koansoftware.com\/?lang=it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/koansoftware.com\/?lang=it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/koansoftware.com\/wp-content\/uploads\/2019\/06\/logo_head_3.jpg\",\"contentUrl\":\"https:\/\/koansoftware.com\/wp-content\/uploads\/2019\/06\/logo_head_3.jpg\",\"width\":340,\"height\":156,\"caption\":\"KOAN\"},\"image\":{\"@id\":\"https:\/\/koansoftware.com\/?lang=it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Embedded security - KOAN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/koansoftware.com\/embedded-security\/","og_locale":"en_US","og_type":"article","og_title":"Embedded security - KOAN","og_url":"https:\/\/koansoftware.com\/embedded-security\/","og_site_name":"KOAN","article_modified_time":"2024-08-30T08:19:27+00:00","og_image":[{"url":"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/koansoftware.com\/embedded-security\/","url":"https:\/\/koansoftware.com\/embedded-security\/","name":"Embedded security - KOAN","isPartOf":{"@id":"https:\/\/koansoftware.com\/?lang=it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/koansoftware.com\/embedded-security\/#primaryimage"},"image":{"@id":"https:\/\/koansoftware.com\/embedded-security\/#primaryimage"},"thumbnailUrl":"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png","datePublished":"2021-12-07T15:13:18+00:00","dateModified":"2024-08-30T08:19:27+00:00","breadcrumb":{"@id":"https:\/\/koansoftware.com\/embedded-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/koansoftware.com\/embedded-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/koansoftware.com\/embedded-security\/#primaryimage","url":"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png","contentUrl":"https:\/\/koansoftware.com\/wp-content\/uploads\/2021\/12\/Embedded_security.png","width":1500,"height":385,"caption":"Embedded security"},{"@type":"BreadcrumbList","@id":"https:\/\/koansoftware.com\/embedded-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/koansoftware.com\/"},{"@type":"ListItem","position":2,"name":"Embedded security"}]},{"@type":"WebSite","@id":"https:\/\/koansoftware.com\/?lang=it\/#website","url":"https:\/\/koansoftware.com\/?lang=it\/","name":"KOAN","description":"embedded software engineering","publisher":{"@id":"https:\/\/koansoftware.com\/?lang=it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/koansoftware.com\/?lang=it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/koansoftware.com\/?lang=it\/#organization","name":"KOAN","url":"https:\/\/koansoftware.com\/?lang=it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/koansoftware.com\/?lang=it\/#\/schema\/logo\/image\/","url":"https:\/\/koansoftware.com\/wp-content\/uploads\/2019\/06\/logo_head_3.jpg","contentUrl":"https:\/\/koansoftware.com\/wp-content\/uploads\/2019\/06\/logo_head_3.jpg","width":340,"height":156,"caption":"KOAN"},"image":{"@id":"https:\/\/koansoftware.com\/?lang=it\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/pages\/2579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/comments?post=2579"}],"version-history":[{"count":9,"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/pages\/2579\/revisions"}],"predecessor-version":[{"id":3083,"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/pages\/2579\/revisions\/3083"}],"wp:attachment":[{"href":"https:\/\/koansoftware.com\/wp-json\/wp\/v2\/media?parent=2579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}