{"id":668,"date":"2024-05-28T10:21:23","date_gmt":"2024-05-28T10:21:23","guid":{"rendered":"https:\/\/nownodes.io\/blog\/?p=668"},"modified":"2024-05-28T10:21:24","modified_gmt":"2024-05-28T10:21:24","slug":"privacy-coins-features-and-differences","status":"publish","type":"post","link":"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/","title":{"rendered":"Privacy Coins: Features and Differences"},"content":{"rendered":"\n<p>The purpose of anonymous cryptocurrencies is to use cryptography to make the information on the blockchain incomprehensible to an observer, but at the same time, the system must ensure that all rules on the network are followed.&nbsp;<\/p>\n\n\n\n<p>Most of the cryptographic solutions that are used today in anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but were not implemented for various reasons.&nbsp;<\/p>\n\n\n\n<p>It\u2019s important to understand why Bitcoin developers are careful when it comes to improving privacy. Aside from implementation difficulties, privacy enhancement techniques often increase transaction size, which harms the scalability of the system. Also, the coin supply \u2014 which anyone with a calculator can check today \u2014 would rely on the trust that the cryptography is working correctly to implement proposals to improve privacy.<\/p>\n\n\n\n<div class=\"wp-block-ideabox-toc ib-block-toc\" data-anchors='h2,h5' data-exclude='.related-posts, #related-posts-container' data-collapsable='true' ><div class=\"ib-toc-container ib-toc-list-style-numbers ib-toc-hierarchical ib-toc-expanded\"><div class=\"ib-toc-header\" style=\"font-size:25px;background-color:#431354;color:#fefefe;--fill:#fefefe\"><div class=\"ib-toc-header-title\">Table of Contents<\/div><div class=\"ib-toc-header-right\"><span class=\"ib-toc-icon-collapse\"><span class=\"dashicon dashicons dashicons-minus\"><\/span><\/span><span class=\"ib-toc-icon-expand\"><span class=\"dashicon dashicons dashicons-plus\"><\/span><\/span><\/div><\/div><div class=\"ib-toc-separator\" style=\"height:2px\"><\/div><div class=\"ib-toc-body\"><ol class=\"ib-toc-anchors\"><\/ol><\/div><\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"monero\">Monero<\/h2>\n\n\n<p>The Monero project was launched in 2014. Technologies that provide privacy in Monero: ring signatures, ring confidential transactions, and stealth addresses. Recently Dandelion++\u00a0<a href=\"https:\/\/web.getmonero.org\/2020\/04\/18\/dandelion-implemented.html\" target=\"_blank\" rel=\"noreferrer noopener\">has also been implemented<\/a>. These technologies mix the spent coins in a network of false paths (decoys), hide the sent amounts and recipient addresses.\u00a0<\/p>\n\n\n\n<p>The key terms in the above paragraph are \u201cmix\u201d and \u201chide\u201d. When something is mixed, it becomes difficult to track it down because there is too much noise \u2014 it\u2019s like listening to one song while 10 others are playing at the same time. In this analogy, the number of songs is called the \u201canonymity set\u201d. This provides good, but not perfect, privacy. Monero was one of the first anonymous cryptocurrencies to deal with user privacy vulnerabilities in the past (see the Monero Research Lab\u00a0<a href=\"https:\/\/web.getmonero.org\/resources\/research-lab\/\" target=\"_blank\" rel=\"noreferrer noopener\">page<\/a>\u00a0for its remedial measures).<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-palette-color-7-color has-vivid-purple-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/nownodes.io\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\">Get your personal API key<\/a><\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"zcash\">Zcash<\/h2>\n\n\n<p>zk-SNARKs technology provides a high level of anonymity in any cryptocurrency. This technology is independent of mixing. By analyzing the blockchain, you will not find any information about the senders, recipients, or transaction amounts. Validation in the system is provided without providing the observer with any useful information.&nbsp;<\/p>\n\n\n\n<p>However, Zcash has had to pay for this seemingly magical privacy technology. The compromise was\u00a0<a href=\"https:\/\/z.cash\/technology\/paramgen\/\" target=\"_blank\" rel=\"noreferrer noopener\">trusted setup<\/a>. This is a critical phase of the network launch when random data is generated by a group of people who should not share this data with each other. When this data is combined, it can be used to create fake Zcash.\u00a0<\/p>\n\n\n\n<p>Just because the privacy of a coin is independent of mixing does not mean that the set of anonymity is endless. Anonymity on the blockchain is made possible by the fact that all network users use it. In Zcash, unfortunately, this is not entirely true, because in the Zcash blockchain there are two types of addresses \u2013 t-addresses and z-addresses \u2013 and only transactions between z-addresses are completely anonymous. T-addresses are as transparent as regular Bitcoin transactions.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/web.archive.org\/web\/20231207162227im_\/https:\/\/nownodes.io\/blog\/nownodes-content\/uploads\/2020\/07\/Screenshot-2020-07-20-at-17.20.58-1024x301.png\" alt=\"zcash\" class=\"wp-image-303\"\/><figcaption class=\"wp-element-caption\">Source:\u00a0<a href=\"https:\/\/explorer.zcha.in\/statistics\/usage\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/explorer.zcha.in\/statistics\/usage<\/a><\/figcaption><\/figure>\n\n\n\n<p>And the thing is, most of the transactions are transparent. It says nothing about the Zcash itself, but about people\u2019s habit of sacrificing anonymity to usability.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-palette-color-7-color has-vivid-purple-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/nownodes.io\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\">Get your personal API key<\/a><\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"beam-and-grin\">Beam and Grin<\/h2>\n\n\n<p>Both Grin and Beam launched last year. The interest in this protocol stems from the fact that it scales better than Bitcoin and has significant privacy improvements. Mimblewimble-based protocols sync faster and have lower memory requirements as they leave much less data on the blockchain.&nbsp;<\/p>\n\n\n\n<p>One of the drawbacks of Mimblewimble-based protocols is that they require messages to be exchanged between the sender and receiver in order to complete a transaction. This means that when two people make transactions, their IP addresses will be open to each other. The developers have created intermediaries (grinbox) to transfer encrypted messages between users. This does not completely solve the problem as you are still exposing your IP address to this reseller, however, your IP is your responsibility. When you contact grinbox, you can hide your real IP address via i2p, VPN and \/ or Tor.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-palette-color-7-color has-vivid-purple-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/nownodes.io\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\">Get your personal API key<\/a><\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2>\n\n\n<p>While all of these projects have the same goal, each coin has its own set of trade-offs regarding privacy, security, scalability, and usability. With NOWNodes, you can get access to Monero and Zcash explorer and node within 1 business day \u2014 drop us a ling and\u00a0get free API key. You could buy it on <a href=\"https:\/\/changenow.io\/\">ChangeNOW<\/a> without any difficulties.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The purpose of anonymous cryptocurrencies is to use cryptography to make the information on the blockchain incomprehensible to an observer, but at the same time, the system must ensure that all rules on the network are followed.&nbsp; Most of the cryptographic solutions that are used today in anonymous coins originally originated as proposals to improve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":669,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_lmt_disableupdate":"","_lmt_disable":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[64,166,1,220],"tags":[219,87,217,162,218,39,163,216],"class_list":["post-668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-beam","category-monero","category-uncategorized","category-zcash","tag-anonymous","tag-beam","tag-grin","tag-monero","tag-privacy-coins","tag-tutorial","tag-xmr","tag-zcash"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy Coins: Features and Differences<\/title>\n<meta name=\"description\" content=\"Privacy Coins: anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nownodes.io\/blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Coins: Features and Differences\" \/>\n<meta property=\"og:description\" content=\"Privacy Coins: anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nownodes.io\/blog\/\" \/>\n<meta property=\"og:site_name\" content=\"NOWNodes Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-28T10:21:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T10:21:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nownodes.io\/blog\/wp-content\/uploads\/2024\/05\/Full-Node-Wallet-vs-Light-Wallet-9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2320\" \/>\n\t<meta property=\"og:image:height\" content=\"1305\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NOWNodes Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nownodes\" \/>\n<meta name=\"twitter:site\" content=\"@nownodes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NOWNodes Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nownodes.io\/blog#article\",\"isPartOf\":{\"@id\":\"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/\"},\"author\":{\"name\":\"NOWNodes Team\",\"@id\":\"https:\/\/nownodes.io\/blog\/#\/schema\/person\/c041891469390738b68a2aafe063f93c\"},\"headline\":\"Privacy Coins: Features and Differences\",\"datePublished\":\"2024-05-28T10:21:23+00:00\",\"dateModified\":\"2024-05-28T10:21:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/\"},\"wordCount\":711,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/nownodes.io\/blog\/#organization\"},\"keywords\":[\"anonymous\",\"Beam\",\"grin\",\"Monero\",\"privacy coins\",\"Tutorial\",\"XMR\",\"zcash\"],\"articleSection\":{\"0\":\"Beam\",\"1\":\"Monero\",\"3\":\"zcash\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nownodes.io\/blog#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/\",\"url\":\"https:\/\/nownodes.io\/blog\",\"name\":\"Privacy Coins: Features and Differences\",\"isPartOf\":{\"@id\":\"https:\/\/nownodes.io\/blog\/#website\"},\"datePublished\":\"2024-05-28T10:21:23+00:00\",\"dateModified\":\"2024-05-28T10:21:24+00:00\",\"description\":\"Privacy Coins: anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but...\",\"breadcrumb\":{\"@id\":\"https:\/\/nownodes.io\/blog#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nownodes.io\/blog\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nownodes.io\/blog#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/nownodes.io\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Node Guides\",\"item\":\"https:\/\/nownodes.io\/blog\/category\/node-guides\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Monero\",\"item\":\"https:\/\/nownodes.io\/blog\/category\/node-guides\/monero\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Privacy Coins: Features and Differences\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nownodes.io\/blog\/#website\",\"url\":\"https:\/\/nownodes.io\/blog\/\",\"name\":\"NOWNodes Blog\",\"description\":\"Your first-to-go source of development guides, web3 analytics and most recent news about NOWNodes\",\"publisher\":{\"@id\":\"https:\/\/nownodes.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nownodes.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nownodes.io\/blog\/#organization\",\"name\":\"NOWNodes Blog\",\"url\":\"https:\/\/nownodes.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nownodes.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nownodes.io\/blog\/wp-content\/uploads\/2024\/02\/cropped-New-Logo-NN.png\",\"contentUrl\":\"https:\/\/nownodes.io\/blog\/wp-content\/uploads\/2024\/02\/cropped-New-Logo-NN.png\",\"width\":1164,\"height\":1164,\"caption\":\"NOWNodes Blog\"},\"image\":{\"@id\":\"https:\/\/nownodes.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/nownodes\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nownodes.io\/blog\/#\/schema\/person\/c041891469390738b68a2aafe063f93c\",\"name\":\"NOWNodes Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nownodes.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/084e45aa2f2bfa61b9ce9f41af97a74f38e87c065b0d49f23a1bb84727320c2e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/084e45aa2f2bfa61b9ce9f41af97a74f38e87c065b0d49f23a1bb84727320c2e?s=96&d=mm&r=g\",\"caption\":\"NOWNodes Team\"},\"sameAs\":[\"http:\/\/65.108.139.113\"],\"url\":\"https:\/\/nownodes.io\/blog\/author\/nownodes\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Coins: Features and Differences","description":"Privacy Coins: anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nownodes.io\/blog\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Coins: Features and Differences","og_description":"Privacy Coins: anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but...","og_url":"https:\/\/nownodes.io\/blog\/","og_site_name":"NOWNodes Blog","article_published_time":"2024-05-28T10:21:23+00:00","article_modified_time":"2024-05-28T10:21:24+00:00","og_image":[{"width":2320,"height":1305,"url":"https:\/\/nownodes.io\/blog\/wp-content\/uploads\/2024\/05\/Full-Node-Wallet-vs-Light-Wallet-9.jpg","type":"image\/jpeg"}],"author":"NOWNodes Team","twitter_card":"summary_large_image","twitter_creator":"@nownodes","twitter_site":"@nownodes","twitter_misc":{"Written by":"NOWNodes Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nownodes.io\/blog#article","isPartOf":{"@id":"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/"},"author":{"name":"NOWNodes Team","@id":"https:\/\/nownodes.io\/blog\/#\/schema\/person\/c041891469390738b68a2aafe063f93c"},"headline":"Privacy Coins: Features and Differences","datePublished":"2024-05-28T10:21:23+00:00","dateModified":"2024-05-28T10:21:24+00:00","mainEntityOfPage":{"@id":"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/"},"wordCount":711,"commentCount":0,"publisher":{"@id":"https:\/\/nownodes.io\/blog\/#organization"},"keywords":["anonymous","Beam","grin","Monero","privacy coins","Tutorial","XMR","zcash"],"articleSection":{"0":"Beam","1":"Monero","3":"zcash"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nownodes.io\/blog#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nownodes.io\/blog\/privacy-coins-features-and-differences\/","url":"https:\/\/nownodes.io\/blog","name":"Privacy Coins: Features and Differences","isPartOf":{"@id":"https:\/\/nownodes.io\/blog\/#website"},"datePublished":"2024-05-28T10:21:23+00:00","dateModified":"2024-05-28T10:21:24+00:00","description":"Privacy Coins: anonymous coins originally originated as proposals to improve the privacy of Bitcoin, but...","breadcrumb":{"@id":"https:\/\/nownodes.io\/blog#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nownodes.io\/blog"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nownodes.io\/blog#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/nownodes.io\/blog"},{"@type":"ListItem","position":2,"name":"Node Guides","item":"https:\/\/nownodes.io\/blog\/category\/node-guides"},{"@type":"ListItem","position":3,"name":"Monero","item":"https:\/\/nownodes.io\/blog\/category\/node-guides\/monero"},{"@type":"ListItem","position":4,"name":"Privacy Coins: Features and Differences"}]},{"@type":"WebSite","@id":"https:\/\/nownodes.io\/blog\/#website","url":"https:\/\/nownodes.io\/blog\/","name":"NOWNodes Blog","description":"Your first-to-go source of development guides, web3 analytics and most recent news about NOWNodes","publisher":{"@id":"https:\/\/nownodes.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nownodes.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nownodes.io\/blog\/#organization","name":"NOWNodes Blog","url":"https:\/\/nownodes.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nownodes.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/nownodes.io\/blog\/wp-content\/uploads\/2024\/02\/cropped-New-Logo-NN.png","contentUrl":"https:\/\/nownodes.io\/blog\/wp-content\/uploads\/2024\/02\/cropped-New-Logo-NN.png","width":1164,"height":1164,"caption":"NOWNodes Blog"},"image":{"@id":"https:\/\/nownodes.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/nownodes"]},{"@type":"Person","@id":"https:\/\/nownodes.io\/blog\/#\/schema\/person\/c041891469390738b68a2aafe063f93c","name":"NOWNodes Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nownodes.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/084e45aa2f2bfa61b9ce9f41af97a74f38e87c065b0d49f23a1bb84727320c2e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/084e45aa2f2bfa61b9ce9f41af97a74f38e87c065b0d49f23a1bb84727320c2e?s=96&d=mm&r=g","caption":"NOWNodes Team"},"sameAs":["http:\/\/65.108.139.113"],"url":"https:\/\/nownodes.io\/blog\/author\/nownodes"}]}},"modified_by":"NOWNodes Team","_links":{"self":[{"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/posts\/668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/comments?post=668"}],"version-history":[{"count":2,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/posts\/668\/revisions"}],"predecessor-version":[{"id":671,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/posts\/668\/revisions\/671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/media\/669"}],"wp:attachment":[{"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/media?parent=668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/categories?post=668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nownodes.io\/blog\/wp-json\/wp\/v2\/tags?post=668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}