{"id":795,"date":"2018-03-01T12:42:00","date_gmt":"2018-03-01T12:42:00","guid":{"rendered":""},"modified":"2018-06-20T00:39:37","modified_gmt":"2018-06-19T22:39:37","slug":"brucon-0x0a-cfp-cft-announcement","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2021\/2018\/03\/01\/brucon-0x0a-cfp-cft-announcement\/","title":{"rendered":"BruCON 0x0A CFP\/CFT Announcement"},"content":{"rendered":"<div style=\"background-color: white\">\n<div>\n<div style=\"line-height: 20.8px\">\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\"><span style=\"line-height: 20px\">This is the\u00a0<b>Call for Papers<\/b>\u00a0(CFP) for talks and workshops and\u00a0<b>Call for Training<\/b>\u00a0(CFT) for the 10th edition of BruCON.\u00a0<\/span><\/span><span style=\"font-family: arial, helvetica, sans-serif\">We are celebrating our 10th anniversary and are therefore adding an\u00a0<\/span><u style=\"font-family: arial, helvetica, sans-serif;font-weight: bold\">additional<\/u><span style=\"font-family: arial, helvetica, sans-serif\">\u00a0conference day!<\/span><\/div>\n<div style=\"line-height: 20.8px\">\n<div style=\"text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 13px\">\u00a0<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify\"><span style=\"font-family: arial, sans-serif;font-size: 12.8px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">On the off chance you don&#8217;t know BruCON (where have you been?). This year we host a 3-day Security and Hacking Conference full of interesting presentations, workshops and security challenges for about 600 attendees.\u00a0<\/span><\/span><span style=\"line-height: 20px\">BruCON is an open-minded gathering of people discussing computer security, privacy, and information technology. The conference tries to build bridges between the various actors active in the computer security world including (but not limited to) hackers, security professionals, security communities, non-profit organisations, CERTs, students, law enforcement agencies, and many more. Next to the conference we offer several world-class, deep-dive mostly offensive technical training courses given by the most recognised experts with huge industry experience in their domain! These training sessions take place twice a year, Spring Training takes places on 18, 19 and 20th of April 2018 (Registration and line-up\u00a0<a href=\"https:\/\/2018.brucon.org\/index.php\/Training\" target=\"_blank\" rel=\"noopener\">here<\/a>) and conference training tracks are on 1, 2 and 3rd October 2018. Our slogan is &#8220;<i>Hacking for Beer<\/i>&#8221; of which you&#8217;ll find plenty during and after the conference.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 13px\">\u00a0<\/span><\/div>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 13px\"><span style=\"line-height: 20px\">The conference will be held in Ghent\u00a0<\/span><span style=\"line-height: 20px\">on\u00a0<b>3, 4\u00a0and 5th of October 2018<\/b>. The training sessions will be held from 1st\u00a0until 3rd of October 2018\u00a0(all courses start on the 1st!).<\/span><\/span><\/p>\n<\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\">\n<div><span style=\"font-family: arial, helvetica, sans-serif\">\u00a0<\/span><\/div>\n<p><b style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">[CONFERENCE]<\/span><\/b><\/p>\n<\/div>\n<p><span style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Topics of interest for the conference include, but are not limited to :<\/span><\/span><\/p>\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Electronic\/Digital Privacy<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">IoT Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Wireless Network and Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Attacks on Information Systems and\/or Digital Information Storage<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Web Application and Web Services Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Lockpicking &amp; physical security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Honeypots\/Honeynets<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Spyware, Phishing and Botnets (Distributed attacks)<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Hardware hacking, embedded systems and other electronic devices<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Mobile devices exploitation, Symbian, P2K and bluetooth technologies<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Electronic Voting<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">Vulnerability research and disclosure<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Free Software and Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Legal and Social Aspect of Information Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Software Engineering and Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Security in Information Retrieval<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Security aspects in SCADA, industrial environments and &#8220;obscure&#8221; networks<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Forensics and Anti-Forensics<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Mobile communications security and vulnerabilities<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Information warfare and industrial espionage<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Social Engineering<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Virtualisation Security<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">&#8230;<\/span><\/span><\/li>\n<\/ul>\n<div style=\"font-family: arial, sans-serif;font-size: 13px\"><span style=\"font-family: arial, helvetica, sans-serif\"><b>[ICS\/IOT Village]<\/b><\/span><\/div>\n<div style=\"font-family: arial, sans-serif;font-size: 13px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\">The ICS\/IOT Village is a dedicated area where attendees with a relative &#8220;safe&#8221; environment to learn more about the (in)security of technologies that you are less likely to encounter on a day-to-day basis such as industrial control systems, electronic voting devices, etc.<\/span><\/div>\n<div style=\"font-family: arial, sans-serif;font-size: 13px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\">\u00a0<\/span><\/div>\n<div style=\"font-family: arial, sans-serif;font-size: 13px\"><span style=\"font-family: arial, helvetica, sans-serif\">Just like previous years we host the Village in a dedicated area where you can immersive yourself in technologies related to:\u00a0<\/span><\/div>\n<div>\n<ul style=\"font-family: arial, sans-serif;font-size: 12.8px\">\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">Automotive securit<\/span>y<\/li>\n<li style=\"margin-left: 15px\">Electronic voting<\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">Embedded circuits<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">Hardware hacking<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">Industrial control systems or simply buzzword &#8220;SCADA&#8221;<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">Radio frequency and other wireless networks<\/span><\/li>\n<li style=\"margin-left: 15px\">(Industrial) IoT<\/li>\n<li style=\"margin-left: 15px\">etc.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div style=\"font-family: arial, helvetica, sans-serif;font-size: 13px\"><b>[Submission formats]<\/b><\/div>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 13px\">Possible formats are:<\/span><\/p>\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">1hr talk<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">2hr workshop (preferably hands on)<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">4hr workshop (preferably hands on)<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div style=\"font-family: Georgia, serif;font-size: 13px\"><span style=\"font-family: arial, helvetica, sans-serif\">If you want to get an idea about the atmosphere at BruCON, check out the previous talks on our\u00a0<a href=\"https:\/\/www.youtube.com\/user\/brucontalks\/playlists\" target=\"_blank\" rel=\"noopener\">Youtube channel<\/a>.\u00a0<\/span><\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px\"><span style=\"font-family: arial, helvetica, sans-serif\">\u00a0<\/span><\/div>\n<div>\n<p><span style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\"><b>[TRAINING]<\/b><\/span><\/span><span style=\"font-family: arial, sans-serif;font-size: 12.8px\"><br style=\"font-family: Georgia, serif;font-size: 13px\" \/><span style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Please take into account the following guidelines :\u00a0<\/span><\/span><\/span><\/p>\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">BruCON hosts predominantly offensive technical security training sessions. We don&#8217;t have any specific focus areas for now, so please submit any training you deem interesting !<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"list-style-type: none\">\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"margin-left: 15px\"><span style=\"line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Training should be either 2 or 3 days.<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div>\n<div>\n<ul>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">You are allowed to submit multiple training suggestions, however please specify if they can be hosted simultaneously.<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">If you have additional hardware that need to be taken into account, please specify including the additional costs.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p><span style=\"font-size: 13px;line-height: 20.8px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">If you submit a training, please include, at minimum, the following information :\u00a0<\/span><\/span><\/p>\n<ul>\n<li style=\"margin-left: 15px\"><span style=\"font-size: 13px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Description<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-size: 13px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Course content<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-size: 13px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Target audience<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-size: 13px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Level (Beginner, Advanced, Expert)<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-size: 13px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Trainer(s) Biography<\/span><\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-size: 13px;line-height: 20px\"><span style=\"font-family: arial, helvetica, sans-serif\">Hosted before? If so, where and when<\/span><\/span><\/li>\n<\/ul>\n<div>\n<p><span style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Possible formats are:<\/span><\/span><\/p>\n<ul style=\"font-family: Georgia, serif;font-size: 13px\">\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">2-day training (1100 \u20ac Early-bird \/ 1200 \u20ac Regular)<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">3-day training (1400 \u20ac Early-bird \/ 1500 \u20ac Regular)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><span style=\"font-size: 13px\">\u00a0<\/span><\/span><\/p>\n<div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\"><span style=\"font-family: arial, helvetica, sans-serif\"><b><span style=\"line-height: 20px\">[SUBMISSION GUIDELINES]<\/span><\/b><\/span><\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Submissions will contain as much detail as possible and will be written in English.<\/span><\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\"><span style=\"line-height: 20px\">We use EasyChair to collect and review talk, workshop and training proposals.<\/span><\/span><\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\"><span style=\"line-height: 20px\">You will submit your proposal online:\u00a0<\/span><\/span><a style=\"font-family: arial, sans-serif;font-size: 12.8px\" href=\"https:\/\/www.easychair.org\/conferences\/?conf=brucon0x0a\" target=\"_blank\" rel=\"noopener\">https:\/\/www.easychair.org\/conferences\/?conf=brucon0x0a<\/a><\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\"><span style=\"line-height: 20px\">Your submission will contain at least the following details:<\/span><\/span><\/div>\n<div style=\"font-family: arial, sans-serif;font-size: 13px;line-height: 20.8px\">\n<ul>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Your name<\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Where do you live (country)<\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">How to reach you<\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">The title of your talk\/workshop\/training, including type [talk|2h workshop|4h workshop|2 day training|3 day training]<\/span><\/li>\n<li style=\"margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif\">General Track or ICS\/IOT Village Track<\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">An abstract of your talk\/workshop\/training, including\u00a0<\/span><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20.8px\"><span style=\"line-height: 20px\">a brief biography<\/span><\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">A number of keywords to\u00a0characterise\u00a0your submission<\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Whether you submitted and\/or presented this proposal at other conferences, and which<\/span><\/li>\n<li style=\"font-family: Georgia, serif;margin-left: 15px\"><span style=\"font-family: arial, helvetica, sans-serif;line-height: 20px\">Additionally you are encouraged to include, in plain text or PDF format, supporting materials such as slide decks, white papers, curriculum, prerequisites for talk\/workshop\/training, outline,&#8230;<\/span><\/li>\n<\/ul>\n<\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px;text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif\">Our speaker treatment hasn&#8217;t changed since the first year. You&#8217;re our guest and we will do anything to make your stay and experience as enjoyable as possible. This includes helping you with travel and accommodation and providing ample opportunities to sample the best of whatever Belgium has to offer. You know what we&#8217;re talking about so &#8230; submit now!<\/span><\/div>\n<div style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.8px\">\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify\"><b>This CFP closes on April 30th 2018 at midnight CET &#8212; CFP feedback will be sent before May 30th 2018. All accepted talks and workshops will be published before June 15th 2018.<\/b><\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div style=\"text-align: justify\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: xx-small\">\u00a0<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify\"><span style=\"font-size: xx-small;line-height: 20.8px\"><span style=\"line-height: 20px\">Small print: We do not accept product or vendor related pitches. If your presentation involves an advertisement for a new product or service your company is offering, please do not submit. Also, we do not accept presentations submitted by a third party including (but not limited to) company representatives, management bureau&#8217;s, etc. BruCON presentations should be focused on topics that are of interest to security and technology professionals who are paying attention to current trends and issues. We want BruCON to be educational and entertaining to the attendees and the community.<\/span><\/span><span style=\"font-family: arial, sans-serif;font-size: 12.8px\">\u00a0<\/span><\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<p><span style=\"color: #333333;font-family: arial, helvetica, sans-serif\"><span style=\"font-size: 13px\">\u00a0<\/span><\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is the\u00a0Call for Papers\u00a0(CFP) for talks and workshops and\u00a0Call for Training\u00a0(CFT) for the 10th edition of BruCON.\u00a0We are celebrating our 10th anniversary and are therefore adding an\u00a0additional\u00a0conference day! \u00a0 &nbsp; On the off chance you don&#8217;t know BruCON (where have you been?). This year we host a 3-day Security and Hacking Conference full of interesting presentations, workshops and security challenges for about 600 attendees.\u00a0BruCON is an open-minded gathering of people discussing computer security, privacy,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-795","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/posts\/795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/comments?post=795"}],"version-history":[{"count":2,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/posts\/795\/revisions"}],"predecessor-version":[{"id":1463,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/posts\/795\/revisions\/1463"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/media?parent=795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/categories?post=795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2021\/wp-json\/wp\/v2\/tags?post=795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}