{"id":13959,"date":"2021-08-12T10:31:58","date_gmt":"2021-08-12T09:31:58","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=13959"},"modified":"2021-08-12T10:31:58","modified_gmt":"2021-08-12T09:31:58","slug":"ending-cyberattacks-with-post-quantum-cryptography-computer-chip","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/","title":{"rendered":"Ending cyberattacks with post-quantum cryptography computer chip"},"content":{"rendered":"

A team of scientists has made significant progress in combatting cyberattacks, developing a revolutionary computer chip that utilises post-quantum cryptography.<\/h2>\n

The team, comprised of researchers from the Technical University of Munich (TUM)<\/a>, has designed and manufactured an innovative computer chip that proficiently implements post-quantum cryptography, a monumental advancement in IT security that may prevent future<\/a> quantum computer cyberattacks.<\/p>\n

In addition to defending IT software from cyberattacks that use quantum computers, the novel chip also employs multiple hardware trojans that help detect this type of malware in the chip factory, adding an extra layer of cybersecurity within the production process.<\/p>\n

The imminent danger of quantum cyberattacks<\/h3>\n

Cyberattacks on large-scale, industrial operations are becoming increasingly prevalent, with attackers able to obtain vital information on production processes or even cause factories to shut down entirely, which is why the communication between computer chips in the individual components are encrypted. However, this method of encrypting algorithms will be futile in the coming years and, in some cases, even in the present, as the processes utilised by modern computers will be unable to thwart cyberattacks from quantum computers.<\/p>\n

Because of this ever-increasing risk to cybersecurity, experts around the globe are working \u00a0to create technical standards for post-quantum cryptography, although this has proved incredibly challenging due to the substantial processing power requirements of this technology.<\/p>\n

Nevertheless, a team led by Georg Sigl, a Professor of Security in Information Technology at TUM, has succeeded in this endeavour, fabricating a highly efficient chip that utilises post-quantum cryptography. The novel chip is based on a hardware\/software co-design, where specialised components and the control software supplement each other.<\/p>\n

Professor Sigl said: \u201cOurs is the first chip for post-quantum cryptography to be based entirely on a hardware\/software co-design approach. As a result, it is around ten times as fast when encrypting with Kyber \u2013 one of the most promising candidates for post-quantum cryptography \u2013 as compared to chips based entirely on software solutions. It also uses around eight times less energy and is almost as flexible.\u201d<\/p>\n

A new framework for computer chips<\/h3>\n

The neoteric computer chip is a type of specialised microcontroller, called an application-specific integrated circuit (ASIC), which can be built bespoke to individual companies\u2019 specifications and in large quantities. Additionally, the researchers modified an open-source chip design that is based on the open-source RISC-V standard. The team also adapted the processor core and special instructions to speed up the arithmetic operations that facilitate the chip\u2019s post-quantum cryptography capabilities, in addition to incorporating a purpose-designed hardware accelerator.<\/p>\n

\"post-quantum
\u00a9 iStock\/solarseven<\/figcaption><\/figure>\n

The chip displays exceptionally versatility, not only being compatible with lattice-based post-quantum cryptography algorithms such as Kyber but is also effective in using power-sapping algorithms like SIKE. The team have expressed that the chip could potentially implement SIKE up to 21 times faster than chips running on only software-based encryption, with SIKE viewed as the most promising candidate for when lattice-based approaches are no longer optimal against cyberattacks.<\/p>\n

Perhaps the most significant threat from future cyberattacks comes in the form of hardware trojans \u2013 malicious modifications to the chips\u2019 circuitry \u2013 which can be planted Surreptitiously within the chip design before the manufacturing stage, resulting in dire consequences. Furthermore, trojans that are built within the hardware can even evade post-quantum cryptography.<\/p>\n

\u201cWe still know very little about how hardware trojans are used by real attackers,\u201d explained Sigl. \u201cTo develop protective measures, we need to think like an attacker and try to develop and conceal our own trojans. In our post-quantum chip, we have therefore developed and installed four hardware trojans, each of which works in an entirely different way.\u201d<\/p>\n

Extra security measures<\/h3>\n

The team are now analysing the cryptography capabilities, functionality, and hardware trojan detectability of the chip, which will then be destroyed for research purposes. The researchers will shave the circuit pathways off one by one while photographing each successive layer. The team will then employ novel machine learning methods that can reconstruct the intricate functions of the chip without the requirement of documentation.<\/p>\n

Sigl commented: \u201cThese reconstructions can help to detect chip components that perform functions unrelated to the chip\u2019s actual tasks and which may have been smuggled into the design. Processes like ours could become the standard for taking random samples in large orders of chips.\u00a0 Combined with effective post-quantum cryptography, this could help us to make hardware more secure \u2013 in industrial facilities as well as in cars.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"

Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.<\/p>\n","protected":false},"author":15,"featured_media":13965,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530,24208],"acf":[],"yoast_head":"\nEnding cyberattacks with post-quantum cryptography computer chip<\/title>\n<meta name=\"description\" content=\"Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ending cyberattacks with post-quantum cryptography computer chip\" \/>\n<meta property=\"og:description\" content=\"Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-12T09:31:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Thomas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Thomas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\"},\"author\":{\"name\":\"Jack Thomas\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d\"},\"headline\":\"Ending cyberattacks with post-quantum cryptography computer chip\",\"datePublished\":\"2021-08-12T09:31:58+00:00\",\"dateModified\":\"2021-08-12T09:31:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\"},\"wordCount\":743,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg\",\"keywords\":[\"Cybersecurity\",\"Disruptive Technology\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#respond\"]}],\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\",\"name\":\"Ending cyberattacks with post-quantum cryptography computer chip\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg\",\"datePublished\":\"2021-08-12T09:31:58+00:00\",\"dateModified\":\"2021-08-12T09:31:58+00:00\",\"description\":\"Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 iStock\/matejmo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ending cyberattacks with post-quantum cryptography computer chip\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d\",\"name\":\"Jack Thomas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g\",\"caption\":\"Jack Thomas\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/jackthomas\/\"}]}<\/script>\n","yoast_head_json":{"title":"Ending cyberattacks with post-quantum cryptography computer chip","description":"Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/","og_locale":"en_GB","og_type":"article","og_title":"Ending cyberattacks with post-quantum cryptography computer chip","og_description":"Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.","og_url":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2021-08-12T09:31:58+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg","type":"image\/jpeg"}],"author":"Jack Thomas","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Jack Thomas","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/"},"author":{"name":"Jack Thomas","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d"},"headline":"Ending cyberattacks with post-quantum cryptography computer chip","datePublished":"2021-08-12T09:31:58+00:00","dateModified":"2021-08-12T09:31:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/"},"wordCount":743,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg","keywords":["Cybersecurity","Disruptive Technology"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#respond"]}],"copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/","url":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/","name":"Ending cyberattacks with post-quantum cryptography computer chip","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg","datePublished":"2021-08-12T09:31:58+00:00","dateModified":"2021-08-12T09:31:58+00:00","description":"Scientists have made significant progress in combatting cyberattacks, developing a computer chip that utilises post-quantum cryptography.","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2021\/08\/\u00a9-iStock-matejmo.jpg","width":1920,"height":1080,"caption":"\u00a9 iStock\/matejmo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/ending-cyberattacks-with-post-quantum-cryptography-computer-chip\/13959\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"Ending cyberattacks with post-quantum cryptography computer chip"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/e34bceac54cf8934b0df3f4c8c2a649d","name":"Jack Thomas","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b61be388a9781729729469d3dcf95087?s=96&d=mm&r=g","caption":"Jack Thomas"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/jackthomas\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-02-07 23:44:42","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/13959"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=13959"}],"version-history":[{"count":2,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/13959\/revisions"}],"predecessor-version":[{"id":13968,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/13959\/revisions\/13968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/13965"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=13959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=13959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=13959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}