{"id":40141,"date":"2020-05-14T00:00:00","date_gmt":"2020-05-14T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/security-by-webrtc-or-security-by-obscurity\/"},"modified":"2022-12-30T07:02:31","modified_gmt":"2022-12-30T15:02:31","slug":"security-by-webrtc-or-security-by-obscurity","status":"publish","type":"post","link":"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/","title":{"rendered":"Security by WebRTC or security by obscurity?"},"content":{"rendered":"<p>H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per their specification, but none of them mandate encryption. They don\u2019t mandate encryption for the signaling itself and certainly not for the media. This leaves the encryption decisions the people deploying them.<\/p>\n<p>WebRTC is different in that regard. Encryption is built-in.<\/p>\n<p>There are three things that make WebRTC such a great solution for the security conscious, and I\u2019d like to point them here.<\/p>\n<h2>1. Usability and low friction<\/h2>\n<p>In some applications, activating encryption requires admins and hosts to specify certain settings. This adds unnecessary steps to account configuration and meeting scheduling.<\/p>\n<p>By adopting a WebRTC-based service, attendees are no longer forced to download and install a third party application, admins are not forced to activate encryption at an account level and hosts don\u2019t need to choose whether to have encryption active or not for their meetings.<\/p>\n<p>WebRTC offers a low friction solution that addresses each of these scenarios without compromising security. How does this work? WebRTC is part of the HTML5 specification and is already part of modern browsers, such as Chrome and Microsoft Edge.<\/p>\n<h2>2. Open standard<\/h2>\n<p>Open standards are available for scrutiny and testing. The end result is a standard that is continuously analyzed and improved, with information made available to the public when issues are discovered.<\/p>\n<p>WebRTC takes the open security approach by being a standard specification that makes use of other, previously popular and widely used open standard specifications such as TLS, DTLS and SRTP.<\/p>\n<h2>3. Secure by design<\/h2>\n<p>With WebRTC, security isn\u2019t optional. It is there intentionally and purposefully.<\/p>\n<p>Browsers are one of the most popular applications we run on our endpoints today. They undergo a great deal of scrutiny in the public domain, as do the open standards that they make use of.<\/p>\n<p>To that end, WebRTC makes use of multiple security and privacy mechanisms. These include:<\/p>\n<ul>\n<li>Encrypting all traffic sent and received using WebRTC<\/li>\n<li>Forcing the application to host its web application over HTTPS<\/li>\n<li>Not exposing the encryption key to the Java Script layer of the application<\/li>\n<li>Requiring user consent to access their microphone, camera and screen<\/li>\n<\/ul>\n<p>There is a lot more to <a href=\"https:\/\/bloggeek.me\/is-webrtc-safe\/\">WebRTC security<\/a> if you are interested to dig deeper.<\/p>\n<p>WebRTC goes a long way in securing the communications that make use of the protocol.<\/p>\n<h2>Where do we go from here?<\/h2>\n<p>The benefits of open standards are clear. That said, there\u2019s more to security than just picking the right standard. When a vendor opts for WebRTC it doesn\u2019t mean they can forget about security concerns. Vendors still need to work hard to maintain the security provided by WebRTC out of the box and provide a secure service for their users.<\/p>\n<p>RingCentral Video is a communications service built on top of WebRTC, offering its users low friction while using open standards that are secure by design.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per their specification, but none of them mandate encryption. They don\u2019t mandate encryption for the signaling itself and certainly not for the media. This leaves the encryption decisions the people &#8230;<\/p>\n","protected":false},"author":29,"featured_media":40142,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[],"class_list":["post-40141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security by WebRTC or security by obscurity? | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security by WebRTC or security by obscurity?\" \/>\n<meta property=\"og:description\" content=\"H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-14T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T15:02:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"Security by WebRTC or security by obscurity?\",\"datePublished\":\"2020-05-14T00:00:00+00:00\",\"dateModified\":\"2022-12-30T15:02:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\"},\"wordCount\":499,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\",\"name\":\"Security by WebRTC or security by obscurity? | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg\",\"datePublished\":\"2020-05-14T00:00:00+00:00\",\"dateModified\":\"2022-12-30T15:02:31+00:00\",\"description\":\"H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg\",\"width\":1050,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security by WebRTC or security by obscurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security by WebRTC or security by obscurity? | RingCentral Blog","description":"H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/","og_locale":"en_US","og_type":"article","og_title":"Security by WebRTC or security by obscurity?","og_description":"H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2020-05-14T00:00:00+00:00","article_modified_time":"2022-12-30T15:02:31+00:00","og_image":[{"width":1050,"height":360,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg","type":"image\/jpeg"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#article","isPartOf":{"@id":"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"Security by WebRTC or security by obscurity?","datePublished":"2020-05-14T00:00:00+00:00","dateModified":"2022-12-30T15:02:31+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/"},"wordCount":499,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/","name":"Security by WebRTC or security by obscurity? | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg","datePublished":"2020-05-14T00:00:00+00:00","dateModified":"2022-12-30T15:02:31+00:00","description":"H.323, SIP, XMPP are the most popular and widely known signaling protocols for VoIP and video conferencing. They all can be encrypted and made private per","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg","width":1050,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Security by WebRTC or security by obscurity?"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/millennial-indian-girl-in-headphones-using-laptop-at-home-picture-id1208855996.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/security-by-webrtc-or-security-by-obscurity\/amp","excerpt_title":"Security by WebRTC or security by obscurity?","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/40141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=40141"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/40141\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/40142"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=40141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=40141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=40141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}