{"id":3259,"date":"2024-08-08T18:45:49","date_gmt":"2024-08-08T22:45:49","guid":{"rendered":"https:\/\/aachips.co\/home\/?p=859"},"modified":"2024-08-08T18:45:49","modified_gmt":"2024-08-08T22:45:49","slug":"disappear-online","status":"publish","type":"post","link":"https:\/\/aachips.co\/blog\/disappear-online\/","title":{"rendered":"Disappear Online &#8212; Go Ask Rose"},"content":{"rendered":"<div>\n<p dir=\"auto\"><a class=\"external-link\" href=\"https:\/\/goaskrose.com\/guide-disappear-online\/\" target=\"_blank\" rel=\"noopener\" data-tooltip-position=\"top\" aria-label=\"https:\/\/goaskrose.com\/guide-disappear-online\/\">Disappear Online \u2013 Go Ask Rose<\/a><\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\" data-heading=\"Disappear Online\">Disappear Online<\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use to avoid being found online by a stalker or abusive ex-partner, while retaining your freedom to communicate with people of your choosing. The goal, then, isn\u2019t to remove your presence entirely but to control it wherever possible.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Find yourself first<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">The first step is to figure out how large of a \u201cdigital footprint\u201d you already have. What information about you is already available and where can it be found? Open up your browser in incognito \/ private browsing mode and make sure you\u2019re not logged into any services like google or social media sites, then start searching for yourself. In addition to whatever else you think may apply to you, search for the following specific items and document your findings:<\/p>\n<\/div>\n<div>\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">Your full name<\/li>\n<li dir=\"auto\" data-line=\"1\">Any unique nicknames<\/li>\n<li dir=\"auto\" data-line=\"2\">Email addresses<\/li>\n<li dir=\"auto\" data-line=\"3\">Usernames<\/li>\n<li dir=\"auto\" data-line=\"4\">Phone number<\/li>\n<\/ul>\n<\/div>\n<div>\n<p dir=\"auto\">After that initial search, start combining them for even more granularity. Also add other pieces of information like your past city, current city, and so on. Be creative and thorough, and use as many resources as possible in order to build a complete profile.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">Next, make a second list of all the accounts that\u00a0<em>you<\/em>\u00a0know you have but that you didn\u2019t find in your search. These still represent a risk and need to be considered.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Reduce your footprint<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">Go through the list you just created. Think about which of those accounts you want to keep and which ones you don\u2019t need any more. Unless you\u2019re keeping a dormant account open to provide a decoy (which we\u2019ll cover later in this guide), you should close it. Some sites will allow you to remove your information prior to closing your account, so make sure to research that or contact the site prior to closing your account to find out how to do that.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">For any \u201cpeople search\u201d results that you find, look for options to opt out or have your results removed from the search. Take a look at our other guides for more information on this. Make sure to look for cached versions of the results on the Internet Archive (archive.org); if you find any results there, contact them and provide a link to your information and they will remove it.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Decoy accounts<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">It\u2019s not always possible to remove yourself completely from internet searches and social media. Once you\u2019ve reduced your footprint as much as possible, the next priority is to introduce misleading and decoy information to make it harder to someone to find anything real about you. Because they would have to spend time and energy looking through inaccurate information and false leads, they\u2019re less likely to find your actual accounts and may disregard them if they do. Setting up decoy accounts is one way to introduce \u201cnoise\u201d into the search results.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">Your decoy accounts should be relatively easy to find and active. They should also look very convincing in order to be effective. To do this, you can either continue to use existing accounts but add misleading information, or you can create new accounts just for this purpose. Whichever you choose, under no circumstances should your real and decoy accounts be connected in any way. For example, don\u2019t use the same email account for your real and decoy accounts and don\u2019t friend, follow, or connect them together.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">You should develop at least one convincing persona, but remember that your safety increases as the amount of misleading information about you goes up. So consider ways that you can subtly plant information in different ways that may ultimately be found by someone that you don\u2019t want to find the actual\u00a0<em>you.<\/em>\u00a0When developing a persona (which in all regards would appear to be you), take time to make it convincing. Where do \u201cyou\u201d live? What college do you attend and what classes are offered there? Your decoy persona should be difficult to discern from your real one. Some ways to do that include:<\/p>\n<\/div>\n<div>\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">Mention a regional restaurant chain at dinnertime in that time zone<\/li>\n<li dir=\"auto\" data-line=\"1\">Follow local businesses, politicians, or sports teams<\/li>\n<li dir=\"auto\" data-line=\"2\">Complain about the local weather (you can use a weather app or website to find out what you should complain about)<\/li>\n<li dir=\"auto\" data-line=\"3\">Reserve a Google Voice number using the area code you\u2019re claiming as your own<\/li>\n<li dir=\"auto\" data-line=\"4\">Discuss local happenings or news events<\/li>\n<li dir=\"auto\" data-line=\"5\">Remember the time zone that your persona is in and post accordingly. You can use a free tool like Hootsuite to schedule tweets for certain times<\/li>\n<\/ul>\n<\/div>\n<div>\n<p dir=\"auto\">Remember that details are what makes a convincing profile. Don\u2019t make every post an overt hint about your location, or it might appear\u00a0<em>too<\/em>\u00a0obvious to be real. Make comments that you would normally make, just be careful not to give away too much. Consider also getting trusted friends or fake accounts to interact with your decoy profile to further increase the seeming legitimacy of the information.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">Consider also creating multiple accounts using your name but without any other identifying information. For example, an Instagram account with only funny cat pictures. This would create even more static while also drowning out any \u201cdox drops\u201d (that is, personal information that might be posted about you). And don\u2019t forget about an Amazon wish list! If you haven\u2019t disabled it, consider seeding it with planned purchases that would support the decoy account. For example, you might live in Arizona, but your decoy lives in Virginia. Which one would be more likely to buy heavy clothing and boots in the winter?<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">The end state is that your real accounts will be difficult to find and your decoy accounts will be easy to find.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Social Media<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">You may wish to keep or create one or more social media accounts in order to communicate with your friends, loved ones, and your support system. There\u2019s nothing wrong with using social media, but it\u2019s important to be smart about how you do it. Make sure to review the social media security guide on this site, but here\u2019s a few things to keep in mind:<\/p>\n<\/div>\n<div>\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">Take advantage of privacy settings. Limit your account\u2019s visibility to only those you trust and don\u2019t allow your profile to show up in search results.<\/li>\n<li dir=\"auto\" data-line=\"1\">Use account security features, like two-factor authentication and strong passwords<\/li>\n<li dir=\"auto\" data-line=\"2\">Consider using a fake name or a nickname if possible and allowed under the terms of use for the service. Only trusted individuals should know the name that you use for those accounts<\/li>\n<li dir=\"auto\" data-line=\"3\">Even on your \u201creal\u201d account (that is, the one you actually use to communicate with your trusted contacts), use fake information wherever possible. Consider using a random date as your birthday, a false address, etc<\/li>\n<\/ul>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Create a \u201cTripwire\u201d<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">A tripwire is a method you can use to see if anyone\u2019s following the fake leads you planted to protect your true identity. While it may generate false positives, it can be an indication that someone is trying to find your actual location and give you time to react or increase your privacy posture. While there\u2019s many ways you can accomplish it, the key is to set up a trigger that would alert you if a certain action is taken.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">For example, your decoy persona naturally has a job. You can create that fictional business from scratch and make it appear legitimate; that means you control the website, email address, and phone number (through Google Voice or some similar service). Monitor the \u201cbusiness\u201d mailboxes; anyone asking about you specifically or asking even asking general questions might be an indication that someone is trying to find you.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Search Engine Optimization<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">Search Engine Optimization, or SEO, is the process of causing a website or page to show more prominently in search engine results. This is often used by businesses to make themselves easier to find, but the process can also be used to make yourself harder to find online. You can create multiple pages using free online tools that will rise to the top of search engine results and make your actual information, to include information over which you have no control, harder to find.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">Unlike businesses that have to optimize their site for a wide variety of search patterns, you know exactly what search terms you\u2019re targeting. Because those are very specific and likely exact terms, it\u2019s relatively easy to get your desired pages higher up in the results. Even though your pages aren\u2019t likely to have much \u201cpage rank\u201d (a general term for the \u201cimportance\u201d of a webpage from a search perspective), the specificity of the terms will compensate for this.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">There are many free website builders available online. Just searching for the term will come up with many great options. Some of those include wix.com, webs.com, and wordpress.com. You can use any of them or all of them. WordPress is a good option to start with, because it\u2019s easy to use and has SEO options built in. Create a page using information that the abuser is likely to search for, such as your name, username(s), or other pieces of common information that\u2019s worked into the profiles or bios.<\/p>\n<\/div>\n<div>\n<p dir=\"auto\">Once you have the key information on the page, you can add other information either as a decoy or just to add more noise into the search results. Once again, the goal is to make your actual information hard to find by someone that you haven\u2019t specifically shared it with.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Don\u2019t Commit Crimes<\/strong><\/h3>\n<\/div>\n<div>\n<p dir=\"auto\">This is probably a good idea for many reasons, but don\u2019t do anything that would be recorded in public arrest or trial records. Even speeding tickets can often be found by searching county court databases, which can give information about your location.<\/p>\n<\/div>\n<div>\n<h3 dir=\"auto\"><strong>Other Tips<\/strong><\/h3>\n<\/div>\n<div>\n<ul class=\"has-list-bullet\">\n<li dir=\"auto\" data-line=\"0\">Avoid using your real name for real information whenever possible<\/li>\n<li dir=\"auto\" data-line=\"1\">Don\u2019t use the same usernames for your real accounts as your decoy accounts<\/li>\n<li dir=\"auto\" data-line=\"2\">Always use strong passwords and two-factor authentication<\/li>\n<li dir=\"auto\" data-line=\"3\">Verify new friend requests before accepting them<\/li>\n<li dir=\"auto\" data-line=\"4\">Remove metadata before sharing images or documents<\/li>\n<li dir=\"auto\" data-line=\"5\">Use fake information for account security questions. Make sure your abusive ex-partner can\u2019t guess your answers<\/li>\n<li dir=\"auto\" data-line=\"6\">Change all passwords for accounts that your abuser had access to<\/li>\n<li dir=\"auto\" data-line=\"7\">Educate your children and trusted friends about what they can and shouldn\u2019t share online<\/li>\n<li dir=\"auto\" data-line=\"8\">If using a shared computer, always log out<\/li>\n<li dir=\"auto\" data-line=\"9\">Don\u2019t click unfamiliar links or open untrusted attachments<\/li>\n<li dir=\"auto\" data-line=\"10\">Don\u2019t click on shortened links unless you\u2019re 100% of the source<\/li>\n<li dir=\"auto\" data-line=\"11\">If using your own computer but others have access to it, always log out of your accounts<\/li>\n<li dir=\"auto\" data-line=\"12\">Just don\u2019t use a shared computer if you can help it<\/li>\n<li dir=\"auto\" data-line=\"13\">Use the other security guides on GoAskRose.com<\/li>\n<li dir=\"auto\" data-line=\"14\">Think about everything you post online. Can it be used to find you?<\/li>\n<li dir=\"auto\" data-line=\"15\">Use a VPN to avoid being tracked by your IP address<\/li>\n<\/ul>\n<\/div>\n<div>\n<p dir=\"auto\">Although it can be a lot of work, you can make yourself very difficult to find online. By following these steps, you can limit your exposure while drowning out the accurate results that you need to hide. The end state is that you can control who you communicate with and keep yourself safer on the internet.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use to avoid being found online<\/p>\n","protected":false},"author":3,"featured_media":2549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,7,13],"tags":[],"class_list":["post-3259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accessible-tech","category-educational","category-helpful"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Disappear Online - Go Ask Rose - Apple Chip Blog<\/title>\n<meta name=\"description\" content=\"Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aachips.co\/blog\/disappear-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disappear Online - Go Ask Rose - Apple Chip Blog\" \/>\n<meta property=\"og:description\" content=\"Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aachips.co\/blog\/disappear-online\/\" \/>\n<meta property=\"og:site_name\" content=\"Apple Chip Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-08T22:45:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"April Chips\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"April Chips\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/aachips.co\/blog\/disappear-online\/\",\"url\":\"https:\/\/aachips.co\/blog\/disappear-online\/\",\"name\":\"Disappear Online - Go Ask Rose - Apple Chip Blog\",\"isPartOf\":{\"@id\":\"https:\/\/aachips.co\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/aachips.co\/blog\/disappear-online\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/aachips.co\/blog\/disappear-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg\",\"datePublished\":\"2024-08-08T22:45:49+00:00\",\"author\":{\"@id\":\"https:\/\/aachips.co\/blog\/#\/schema\/person\/9a742b7f7f02faea2aab0a6accdc54fc\"},\"description\":\"Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use.\",\"breadcrumb\":{\"@id\":\"https:\/\/aachips.co\/blog\/disappear-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/aachips.co\/blog\/disappear-online\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/aachips.co\/blog\/disappear-online\/#primaryimage\",\"url\":\"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg\",\"contentUrl\":\"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg\",\"width\":900,\"height\":1200,\"caption\":\"white rose enclosed photograph\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/aachips.co\/blog\/disappear-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/aachips.co\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Disappear Online &#8212; Go Ask Rose\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/aachips.co\/blog\/#website\",\"url\":\"https:\/\/aachips.co\/blog\/\",\"name\":\"Apple Chip Blog\",\"description\":\"A. A. Chips Blog Archive\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/aachips.co\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/aachips.co\/blog\/#\/schema\/person\/9a742b7f7f02faea2aab0a6accdc54fc\",\"name\":\"April Chips\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/aachips.co\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a639bda0ba57fbf40d9d6ca8926d3df3ce08ee1252597c2c7f48b3ca5cd976c7?s=96&d=mm&r=r\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a639bda0ba57fbf40d9d6ca8926d3df3ce08ee1252597c2c7f48b3ca5cd976c7?s=96&d=mm&r=r\",\"caption\":\"April Chips\"},\"url\":\"https:\/\/aachips.co\/blog\/author\/applechipkitchen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Disappear Online - Go Ask Rose - Apple Chip Blog","description":"Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aachips.co\/blog\/disappear-online\/","og_locale":"en_US","og_type":"article","og_title":"Disappear Online - Go Ask Rose - Apple Chip Blog","og_description":"Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use.","og_url":"https:\/\/aachips.co\/blog\/disappear-online\/","og_site_name":"Apple Chip Blog","article_published_time":"2024-08-08T22:45:49+00:00","og_image":[{"width":900,"height":1200,"url":"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg","type":"image\/jpeg"}],"author":"April Chips","twitter_card":"summary_large_image","twitter_misc":{"Written by":"April Chips","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/aachips.co\/blog\/disappear-online\/","url":"https:\/\/aachips.co\/blog\/disappear-online\/","name":"Disappear Online - Go Ask Rose - Apple Chip Blog","isPartOf":{"@id":"https:\/\/aachips.co\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aachips.co\/blog\/disappear-online\/#primaryimage"},"image":{"@id":"https:\/\/aachips.co\/blog\/disappear-online\/#primaryimage"},"thumbnailUrl":"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg","datePublished":"2024-08-08T22:45:49+00:00","author":{"@id":"https:\/\/aachips.co\/blog\/#\/schema\/person\/9a742b7f7f02faea2aab0a6accdc54fc"},"description":"Disappearing online can be difficult, but it\u2019s not impossible in most cases. This security guide will discuss methods that you can use.","breadcrumb":{"@id":"https:\/\/aachips.co\/blog\/disappear-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aachips.co\/blog\/disappear-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aachips.co\/blog\/disappear-online\/#primaryimage","url":"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg","contentUrl":"https:\/\/aachips.co\/blog\/wp-content\/uploads\/2024\/09\/pdgnbk9a0sk.jpg","width":900,"height":1200,"caption":"white rose enclosed photograph"},{"@type":"BreadcrumbList","@id":"https:\/\/aachips.co\/blog\/disappear-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aachips.co\/blog\/"},{"@type":"ListItem","position":2,"name":"Disappear Online &#8212; Go Ask Rose"}]},{"@type":"WebSite","@id":"https:\/\/aachips.co\/blog\/#website","url":"https:\/\/aachips.co\/blog\/","name":"Apple Chip Blog","description":"A. A. Chips Blog Archive","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aachips.co\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/aachips.co\/blog\/#\/schema\/person\/9a742b7f7f02faea2aab0a6accdc54fc","name":"April Chips","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aachips.co\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a639bda0ba57fbf40d9d6ca8926d3df3ce08ee1252597c2c7f48b3ca5cd976c7?s=96&d=mm&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a639bda0ba57fbf40d9d6ca8926d3df3ce08ee1252597c2c7f48b3ca5cd976c7?s=96&d=mm&r=r","caption":"April Chips"},"url":"https:\/\/aachips.co\/blog\/author\/applechipkitchen\/"}]}},"_links":{"self":[{"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/posts\/3259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/comments?post=3259"}],"version-history":[{"count":0,"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/posts\/3259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/media\/2549"}],"wp:attachment":[{"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/media?parent=3259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/categories?post=3259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aachips.co\/blog\/wp-json\/wp\/v2\/tags?post=3259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}