{"id":6349,"date":"2016-06-27T09:00:11","date_gmt":"2016-06-26T23:00:11","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=6349"},"modified":"2025-07-28T06:37:38","modified_gmt":"2025-07-28T06:37:38","slug":"what-is-advanced-encryption-standard-aes","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes","title":{"rendered":"What is Advanced Encryption Standard (AES)?"},"content":{"rendered":"<p><strong>If you&#8217;ve ever heard of encryption, you&#8217;ve probably heard the term &#8216;AES&#8217;. But for those of us who aren&#8217;t cryptographers, what exactly is it?<\/strong><\/p>\n<p>We answer just that in this blog article. along with who uses it and how hard it is to crack. (Spoiler:\u00a0Got all the computers in the world at your disposal?)<\/p>\n<h2>What exactly is AES?<\/h2>\n<p>AES stands for Advanced Encryption Standard, but it&#8217;s also known as Rijndael (Pronounced &#8216;rain-dahl&#8217;). It was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen in 1998. As you can probably guess, Rijndael is a mix of the creator&#8217;s last names.<\/p>\n<p>Since its creation in the late 90&#8217;s, AES has\u00a0effectively replaced every other encryption standard and is now used worldwide. It&#8217;s also the U.S. government standard of encryption. They have a lot of faith in it, because it&#8217;s the first (and only) publically accessible cipher approved by the National Security Agency (NSA) for top secret information.<\/p>\n<p>When the NSA feels secure using a cipher everyone in the global community has access to, you know it&#8217;s got to be good. Especially since AES has been nigh-unbreakable for almost two decades. (And in IT\u00a0years, that&#8217;s\u00a0<em>amazing<\/em>)<\/p>\n<h2>So What Does AES Do?<\/h2>\n<p>The mechanics of AES would make your head spin. That&#8217;s half the point. But the &#8216;simplest&#8217; way to explain it is that it encrypts your data behind a key, sends it somewhere, then uses the same key to decrypt it.\u00a0Both locations need the key in order to decrypt the data.<\/p>\n<p>The data key\u00a0really is the\u00a0key to the whole thing\u2014pun intended\u2014and it&#8217;s\u00a0measured in data bits. AES keys come in 128, 192 or 256 bits. The longer the key, the better the encryption.<\/p>\n<p>That doesn&#8217;t mean a 128-bit key is anything to sneeze at. For instance<span style=\"line-height: 1.5;\">, the NSA in particular use 128 bit encryption or above to protect classified information up to the SECRET level. That said, TOP SECRET information requires the 192 or 265 AES key lengths.<\/span><\/p>\n<p>The neat thing about AES is that it has built-in flexibility of key length. That means there&#8217;s a degree of &#8216;future-proofing&#8217; if anything higher than 256 bits is needed in years or decades to come.<\/p>\n<h2>How Hard Is AES To Crack?<\/h2>\n<p>Honestly? Next to impossible. And I mean &#8216;next to&#8217; in the sense that the sun going out tomorrow is &#8216;next to&#8217; impossible, but we still can&#8217;t rule it out.<\/p>\n<p>Since it came out almost two decades ago, nobody has been able to come up with a practical means of attacking and properly reading AES encrypted data\u2014so long as it&#8217;s correctly implemented. Yes, even a nigh-perfect encryption protocol can be screwed up if you leave the keys on the table.<\/p>\n<p>In 2011, three cryptanalysts attempted key-recovery attacks on AES. It was four times faster than a brute force approach, but it was still not fast. They calculated that it would take billions of years to steal\u00a0a 126-bit AES key (two bits short of the lowest standard) on current and available hardware.<\/p>\n<p>Just to take down the lowest 128-bit AES key, they estimated it would take\u00a038 trillion terrabites of data. That&#8217;s more than all the data stored on all the computers on the planet in 2016.\u00a0As you can imagine, this isn&#8217;t a pressing security threat.<\/p>\n<p>Microsoft is also another avid supporter of AES encryption. They incorporated into Bitlocker and took AES a step further, if you can believe that.<\/p>\n<h2>What is BitLocker?<\/h2>\n<p>BitLocker is a full-disk encrypter that uses either 128 or 256-bit AES. This software\u00a0has a lot of features, but the neatest by far is to create a USB Key that is required to boot a protected operating system (OS).<\/p>\n<p>That means on top of having to crack impossibly tough encryption, any would-be crackers also require a physical USB key to access your data. There&#8217;s a reason Microsoft used the codename &#8216;Cornerstone&#8217; when they were building BitLocker.<\/p>\n<h2>AES and Backup Protection<\/h2>\n<p>Encryption is a vital component of any backup plan. Why? Because your business data is all in one place. This is particularly important if you store it off-site, where someone can could break in and make off with a physical hard drive. That means sensitive information like your time-sheets, passwords, transaction data and user information are ripe for the taking.<\/p>\n<p>Using AES Encryption\u2014especially with BitLocker\u2014means you can rest assured your backups are safe, even if they&#8217;re stolen physically or digitally. I mean, if it takes billions of years and all the computers in the world to crack the lowest level bit key, what are the chances your business data will be compromised?<\/p>\n<p>That&#8217;s why <a href=\"https:\/\/www.backupassist.com\/backupassist.html\">BackupAssist<\/a> offers 128 and 256-bit AES encyption for your backups, as well as support for BitLocker so you can protect your data with a USB key. We&#8217;re serious when it comes to protecting your data\u2014whether that means backing it up for data disasters or making it impossible for crackers to get their hands on your files.<\/p>\n<p>Try out our trusty software with a <a href=\"https:\/\/www.backupassist.com\/BackupAssist\/download2.php\">fully featured and free 30-day trial<\/a>. Protect your backups behind military-grade AES encryption and make sure nobody can get at your business data!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you&#8217;ve ever heard of encryption, you&#8217;ve probably heard the term &#8216;AES&#8217;. But for those of us who aren&#8217;t cryptographers, what exactly is it? We answer just that in this blog article. along with who uses it and how hard it is to crack. (Spoiler:\u00a0Got all the computers in the world at your disposal?) What &#8230; <a title=\"What is Advanced Encryption Standard (AES)?\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\">Read more <span class=\"screen-reader-text\">What is Advanced Encryption Standard (AES)?<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":19714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23],"tags":[459,234,33,389],"class_list":["post-6349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news","tag-aes","tag-bitlocker","tag-encryption","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Advanced Encryption Standard (AES)? - BackupAssist<\/title>\n<meta name=\"description\" content=\"If you&#039;ve ever heard of encryption, you&#039;ve probably heard the term &#039;AES&#039;. But for those of us who aren&#039;t cryptographers, what exactly is it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Advanced Encryption Standard (AES)? - BackupAssist\" \/>\n<meta property=\"og:description\" content=\"If you&#039;ve ever heard of encryption, you&#039;ve probably heard the term &#039;AES&#039;. But for those of us who aren&#039;t cryptographers, what exactly is it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-26T23:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T06:37:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"486\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"What is Advanced Encryption Standard (AES)?\",\"datePublished\":\"2016-06-26T23:00:11+00:00\",\"dateModified\":\"2025-07-28T06:37:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\"},\"wordCount\":856,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg\",\"keywords\":[\"AES\",\"bitlocker\",\"encryption\",\"security\"],\"articleSection\":[\"Interest\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\",\"url\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\",\"name\":\"What is Advanced Encryption Standard (AES)? - BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg\",\"datePublished\":\"2016-06-26T23:00:11+00:00\",\"dateModified\":\"2025-07-28T06:37:38+00:00\",\"description\":\"If you've ever heard of encryption, you've probably heard the term 'AES'. But for those of us who aren't cryptographers, what exactly is it?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg\",\"width\":1366,\"height\":486},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Advanced Encryption Standard (AES)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Advanced Encryption Standard (AES)? - BackupAssist","description":"If you've ever heard of encryption, you've probably heard the term 'AES'. But for those of us who aren't cryptographers, what exactly is it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes","og_locale":"en_US","og_type":"article","og_title":"What is Advanced Encryption Standard (AES)? - BackupAssist","og_description":"If you've ever heard of encryption, you've probably heard the term 'AES'. But for those of us who aren't cryptographers, what exactly is it?","og_url":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes","og_site_name":"Cyber Resilience Blog","article_published_time":"2016-06-26T23:00:11+00:00","article_modified_time":"2025-07-28T06:37:38+00:00","og_image":[{"width":1366,"height":486,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg","type":"image\/jpeg"}],"author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"What is Advanced Encryption Standard (AES)?","datePublished":"2016-06-26T23:00:11+00:00","dateModified":"2025-07-28T06:37:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes"},"wordCount":856,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg","keywords":["AES","bitlocker","encryption","security"],"articleSection":["Interest","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes","url":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes","name":"What is Advanced Encryption Standard (AES)? - BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg","datePublished":"2016-06-26T23:00:11+00:00","dateModified":"2025-07-28T06:37:38+00:00","description":"If you've ever heard of encryption, you've probably heard the term 'AES'. But for those of us who aren't cryptographers, what exactly is it?","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/05\/BackupAssist-Blog-Header-Image-Standard.jpg","width":1366,"height":486},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/what-is-advanced-encryption-standard-aes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"What is Advanced Encryption Standard (AES)?"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=6349"}],"version-history":[{"count":1,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6349\/revisions"}],"predecessor-version":[{"id":19995,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6349\/revisions\/19995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/19714"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=6349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=6349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=6349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}