{"id":41726,"date":"2023-03-27T16:06:45","date_gmt":"2023-03-27T20:06:45","guid":{"rendered":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/"},"modified":"2023-03-27T16:06:57","modified_gmt":"2023-03-27T20:06:57","slug":"twitter-source-code-leak-should-serve-as-warning-say-security-experts","status":"publish","type":"post","link":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/","title":{"rendered":"Twitter Source Code Leak Should Serve As Warning Say Security Experts"},"content":{"rendered":"<p><\/p>\n<div>\n<figure class=\"embed-base image-embed embed-0\" role=\"presentation\"><figcaption><fbs-accordion class=\"expandable\" current=\"-1\"><\/p>\n<p class=\"color-body light-text\">According to Twitter, the code was stolen and left by a disgruntled employee. <span class=\"plus\" data-ga-track=\"caption expand\">&#8230; [+]<\/span><span class=\"expanded-caption\">The time Elon Musk, a billionaire tech entrepreneur bought the company for $44 Billion (Photo by Jaap Ariens\/NurPhoto via Getty Images).<\/span><\/p>\n<p><\/fbs-accordion><small>NurPhoto via Getty Images<\/small><\/figcaption><\/figure>\n<p>Researchers from security have said that Twitter&#8217;s source codes were being leaked online. They also suggested that this should act as an alarm to other companies about the need for better network protection. This should cover both the internal and external threats.<\/p>\n<p>This case saw the Twitter base programming posted briefly to the GitHub collaborative programming platform. Although it was deleted the next day, the code was still available on the GitHub collaborative programming network. However, the code could easily have been duplicated and redistributed. Twitter asked the U.S. District Court in the Northern District of California for Github&#8217;s order to disclose the identity of Github&#8217;s original poster of the code and those who might have downloaded it.<\/p>\n<p>It has been reported that Twitter executives suspect the code was stolen by a disgruntled employee who left the company around the time that billionaire tech entrepreneur Elon Musk acquired the platform for $44 billion \u2013 and then preceded to lay off a significant portion of the staff.<\/p>\n<p>David Lindner (CISO of Contrast Security) stated via email that the leaked source code could have been the work of unhappy employees or people who don\u2019t like Elon Musk.<\/p>\n<p><fbs-ad position=\"inread\" progressive=\"\" ad-id=\"article-0-inread\" aria-hidden=\"true\" role=\"presentation\"\/><\/p>\n<p>Linder also raised concerns about Twitter&#8217;s response regarding the code leak. The security concern almost felt like an afterthought.<\/p>\n<p>His explanation was that Twitter had initially thought to give the copyright infringement notice for GitHub. &#8220;While it is an important step \u2013 but really not that meaningful as the code is already out there \u2013 I would have immediately hired an outside forensics firm to make sure the malicious actor was not still in Twitter&#8217;s environments.&#8221;<\/p>\n<p>Instead of the dangers that such a leak may pose for Twitter users, it was all about intellectual property (IP).<\/p>\n<p>Linder added that &#8220;In many of these cases, nefarious agents use leaks&#8217; such as this as a diversion to a greater attack.&#8221; &#8220;It will interesting to see Twitter handle the transparency in their findings.&#8221;<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\"><strong>Inside Job \u2013 More Than Likely<\/strong><\/h2>\n<p>Twitter executives are not the only ones who believe that an employee is responsible for this breach. It might even be surprising that it wasn&#8217;t an insider who was unhappy with the company&#8217;s direction.<\/p>\n<p>Tim Mackey (principal security strategist at Synopsys Cybersecurity Research Center, CyRC) stated that finding out the source of the code leak should be top priority.<\/p>\n<p>Multiple governance checks and reviews should be applied to the ability to post source code to a company&#8217;s GitHub repository. &#8220;Occurrences like the one Twitter experienced need to be handled by the same process that every organization uses to decide if they want to open source\u2019 a project. Mackey stated via email.<\/p>\n<p>While such safeguards would be beneficial for the organization&#8217;s source-code repository, developers who work on their particular branch of code likely have a personal account.<\/p>\n<p>Mackey stated, &#8220;Ideally corporate users would have a &#8216;personal account&#8217; that is part of a repository managed by the enterprise with adequate access controls to restrict access to authorized users.&#8221;<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\"><strong>The Genie has left the bottle<\/strong><\/h2>\n<p>Twitter, as noted, is trying to track down not only the source of leaked code but also those who downloaded it. It could prove to be quite a daunting task tracking every copy.<\/p>\n<p>Mackey warned that &#8220;Officially, publication of source code doesn&#8217;t necessarily mean someone didn&#8217;t make copies while it was publicly available.&#8221; Anyone who had done it would be capable of analyzing the source code to identify any vulnerabilities. This is exactly the kind of scenario source code governance controls are intended to guard against.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to Twitter, the code was stolen and left by a disgruntled employee. &#8230; [+]The&#8230;<\/p>\n","protected":false},"author":226,"featured_media":41631,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6767],"tags":[7839,8149,9039,9915,2282,9912,899],"class_list":["post-41726","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-noise","tag-cybersecurity","tag-elon-musk","tag-hacker","tag-leak","tag-social-media","tag-source-code","tag-twitter"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Twitter Source Code Leak Should Serve As Warning Say Security Experts - Social Media Explorer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twitter Source Code Leak Should Serve As Warning Say Security Experts - Social Media Explorer\" \/>\n<meta property=\"og:description\" content=\"According to Twitter, the code was stolen and left by a disgruntled employee. &#8230; [+]The...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\" \/>\n<meta property=\"og:site_name\" content=\"Social Media Explorer\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/socialmediaexplorer\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/socialmediaexplorer\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T20:06:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T20:06:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"855\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@smxplorer\" \/>\n<meta name=\"twitter:site\" content=\"@smxplorer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\"},\"author\":{\"name\":\"Adam\",\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/person\/532ea00d94484eb306539e1770b2548d\"},\"headline\":\"Twitter Source Code Leak Should Serve As Warning Say Security Experts\",\"datePublished\":\"2023-03-27T20:06:45+00:00\",\"dateModified\":\"2023-03-27T20:06:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#organization\"},\"image\":{\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg\",\"keywords\":[\"cybersecurity\",\"Elon Musk\",\"hacker\",\"leak\",\"Social Media\",\"source code\",\"Twitter\"],\"articleSection\":[\"News &amp; Noise\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\",\"url\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\",\"name\":\"Twitter Source Code Leak Should Serve As Warning Say Security Experts - Social Media Explorer\",\"isPartOf\":{\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg\",\"datePublished\":\"2023-03-27T20:06:45+00:00\",\"dateModified\":\"2023-03-27T20:06:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage\",\"url\":\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg\",\"contentUrl\":\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg\",\"width\":1200,\"height\":855},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sx6ast5b42.wpdns.site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Twitter Source Code Leak Should Serve As Warning Say Security Experts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#website\",\"url\":\"https:\/\/sx6ast5b42.wpdns.site\/\",\"name\":\"Social Media Explorer\",\"description\":\"Exploring the World of Social Media from the Inside Out\",\"publisher\":{\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sx6ast5b42.wpdns.site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#organization\",\"name\":\"Social Media Explorer\",\"url\":\"https:\/\/sx6ast5b42.wpdns.site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2024\/10\/cropped-main-qimg-cd49c1c11b34bad95f20b20b0941f33b-lq.jpg\",\"contentUrl\":\"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2024\/10\/cropped-main-qimg-cd49c1c11b34bad95f20b20b0941f33b-lq.jpg\",\"width\":344,\"height\":121,\"caption\":\"Social Media Explorer\"},\"image\":{\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/socialmediaexplorer\/\",\"https:\/\/x.com\/smxplorer\",\"https:\/\/www.linkedin.com\/company\/social-media-explorer\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/person\/532ea00d94484eb306539e1770b2548d\",\"name\":\"Adam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34be103c65d94ee5d1badee480e143d7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34be103c65d94ee5d1badee480e143d7?s=96&d=mm&r=g\",\"caption\":\"Adam\"},\"description\":\"Adam is an owner at Nanohydr8. He really loves comedy and satire, and the written word in general.\",\"sameAs\":[\"http:\/\/socialmediaexplorer.com\",\"https:\/\/www.facebook.com\/socialmediaexplorer\/\",\"https:\/\/x.com\/smxplorer\"],\"url\":\"https:\/\/socialmediaexplorer.com\/author\/adamt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twitter Source Code Leak Should Serve As Warning Say Security Experts - Social Media Explorer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/","og_locale":"en_US","og_type":"article","og_title":"Twitter Source Code Leak Should Serve As Warning Say Security Experts - Social Media Explorer","og_description":"According to Twitter, the code was stolen and left by a disgruntled employee. &#8230; [+]The...","og_url":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/","og_site_name":"Social Media Explorer","article_publisher":"https:\/\/www.facebook.com\/socialmediaexplorer\/","article_author":"https:\/\/www.facebook.com\/socialmediaexplorer\/","article_published_time":"2023-03-27T20:06:45+00:00","article_modified_time":"2023-03-27T20:06:57+00:00","og_image":[{"width":1200,"height":855,"url":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg","type":"image\/jpeg"}],"author":"Adam","twitter_card":"summary_large_image","twitter_creator":"@smxplorer","twitter_site":"@smxplorer","twitter_misc":{"Written by":"Adam","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#article","isPartOf":{"@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/"},"author":{"name":"Adam","@id":"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/person\/532ea00d94484eb306539e1770b2548d"},"headline":"Twitter Source Code Leak Should Serve As Warning Say Security Experts","datePublished":"2023-03-27T20:06:45+00:00","dateModified":"2023-03-27T20:06:57+00:00","mainEntityOfPage":{"@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/"},"wordCount":635,"publisher":{"@id":"https:\/\/sx6ast5b42.wpdns.site\/#organization"},"image":{"@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg","keywords":["cybersecurity","Elon Musk","hacker","leak","Social Media","source code","Twitter"],"articleSection":["News &amp; Noise"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/","url":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/","name":"Twitter Source Code Leak Should Serve As Warning Say Security Experts - Social Media Explorer","isPartOf":{"@id":"https:\/\/sx6ast5b42.wpdns.site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage"},"image":{"@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg","datePublished":"2023-03-27T20:06:45+00:00","dateModified":"2023-03-27T20:06:57+00:00","breadcrumb":{"@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#primaryimage","url":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg","contentUrl":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2023\/03\/0x0.jpg","width":1200,"height":855},{"@type":"BreadcrumbList","@id":"https:\/\/socialmediaexplorer.com\/content-sections\/news-and-noise\/twitter-source-code-leak-should-serve-as-warning-say-security-experts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sx6ast5b42.wpdns.site\/"},{"@type":"ListItem","position":2,"name":"Twitter Source Code Leak Should Serve As Warning Say Security Experts"}]},{"@type":"WebSite","@id":"https:\/\/sx6ast5b42.wpdns.site\/#website","url":"https:\/\/sx6ast5b42.wpdns.site\/","name":"Social Media Explorer","description":"Exploring the World of Social Media from the Inside Out","publisher":{"@id":"https:\/\/sx6ast5b42.wpdns.site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sx6ast5b42.wpdns.site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sx6ast5b42.wpdns.site\/#organization","name":"Social Media Explorer","url":"https:\/\/sx6ast5b42.wpdns.site\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/logo\/image\/","url":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2024\/10\/cropped-main-qimg-cd49c1c11b34bad95f20b20b0941f33b-lq.jpg","contentUrl":"https:\/\/socialmediaexplorer.com\/wp-content\/uploads\/2024\/10\/cropped-main-qimg-cd49c1c11b34bad95f20b20b0941f33b-lq.jpg","width":344,"height":121,"caption":"Social Media Explorer"},"image":{"@id":"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/socialmediaexplorer\/","https:\/\/x.com\/smxplorer","https:\/\/www.linkedin.com\/company\/social-media-explorer"]},{"@type":"Person","@id":"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/person\/532ea00d94484eb306539e1770b2548d","name":"Adam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sx6ast5b42.wpdns.site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34be103c65d94ee5d1badee480e143d7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34be103c65d94ee5d1badee480e143d7?s=96&d=mm&r=g","caption":"Adam"},"description":"Adam is an owner at Nanohydr8. He really loves comedy and satire, and the written word in general.","sameAs":["http:\/\/socialmediaexplorer.com","https:\/\/www.facebook.com\/socialmediaexplorer\/","https:\/\/x.com\/smxplorer"],"url":"https:\/\/socialmediaexplorer.com\/author\/adamt\/"}]}},"_links":{"self":[{"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/posts\/41726"}],"collection":[{"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/comments?post=41726"}],"version-history":[{"count":0,"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/posts\/41726\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/media\/41631"}],"wp:attachment":[{"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/media?parent=41726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/categories?post=41726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/socialmediaexplorer.com\/wp-json\/wp\/v2\/tags?post=41726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}