{"id":3663,"date":"2021-11-03T19:27:25","date_gmt":"2021-11-03T12:57:25","guid":{"rendered":"https:\/\/iatmm.com\/?p=3663"},"modified":"2021-12-17T09:11:57","modified_gmt":"2021-12-17T02:41:57","slug":"1-4-ict-skills-and-working-in-linux-encryption-disk-encryption","status":"publish","type":"post","link":"https:\/\/iat.edu.mm\/1-4-ict-skills-and-working-in-linux-encryption-disk-encryption\/","title":{"rendered":"1.4 ICT Skills and Working in Linux: Encryption \u2013 Disk Encryption"},"content":{"rendered":"\n<p><strong><span style=\"color:#b41d8d\" class=\"has-inline-color\">Disk Encryption<\/span><\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037\u101b\u1032\u1037\u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031 \u1005\u102d\u1010\u103a\u1001\u103b\u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1016\u102d\u102f\u1037\u101b\u102c \u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038\u1000\u1031\u102c\u1004\u103a\u1038\u1010\u1005\u103a\u1001\u102f\u1000\u1010\u1031\u102c\u1037 Disk \u1010\u1005\u103a\u1001\u102f\u101c\u102f\u1036\u1038\u1016\u103c\u1005\u103a\u1005\u1031 (\u101e\u102d\u102f\u1037) Partition \u1010\u1005\u103a\u1015\u102d\u102f\u1004\u103a\u1038\u101c\u102f\u1036\u1038\u1016\u103c\u1005\u103a\u1005\u1031 \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a Code \u1010\u103d\u1031\u1021\u1016\u103c\u1005\u103a \u1015\u103c\u1031\u102c\u1004\u103a\u1038\u101c\u1032 Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1010\u102c\u1015\u102b\u1015\u1032\u104b Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1016\u102d\u102f\u1037 Open Source Softwares \u1010\u103d\u1031\u1019\u103b\u102c\u1038\u1005\u103d\u102c\u101b\u103e\u102d\u1015\u102b\u1010\u101a\u103a\u104b \u1018\u101a\u103a\u101c\u102d\u102f\u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u101c\u1032\u1006\u102d\u102f\u1010\u102c\u1014\u103e\u1004\u1037\u103a \u1018\u101a\u103a Level \u101c\u1031\u102c\u1000\u103a\u1021\u1011\u102d Encryption \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1019\u101c\u1032\u1006\u102d\u102f\u1010\u102c\u1010\u1031\u102c\u1037 \u1021\u1019\u103b\u102d\u102f\u1038\u1019\u103b\u102d\u102f\u1038 \u1000\u103d\u102c\u1001\u103c\u102c\u1038\u1000\u103c\u1015\u102b\u1010\u101a\u103a\u104b \u1021\u1001\u103c\u1031\u1001\u1036\u1021\u1000\u103b\u1006\u102f\u1036\u1038 \u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038 (\u1042) \u1001\u102f\u1000\u1010\u1031\u102c\u1037<em><span style=\"color:#b41d8d\" class=\"has-inline-color\"> Stacked and Block Device Encryption<\/span><\/em> \u1010\u102d\u102f\u1037\u1015\u1032\u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<em><span style=\"color:#b41d8d\" class=\"has-inline-color\"> Stacked Filesystem Solutions<\/span><\/em> \u1010\u103d\u1031\u1000\u102d\u102f \u101c\u1000\u103a\u101b\u103e\u102d\u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1014\u1031\u1000\u103c\u1010\u1032\u1037 Filesystem \u1010\u103d\u1031\u1015\u1031\u102b\u103a\u1019\u103e\u102c\u1015\u1032 \u1016\u1014\u103a\u1010\u102e\u1038\u1011\u102c\u1038\u1010\u102c\u1015\u102b\u104b \u1012\u102e\u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038\u101e\u102f\u1036\u1038\u1019\u100a\u103a\u1006\u102d\u102f\u101c\u103b\u1004\u103a\u1010\u1031\u102c\u1037 Files and Directories \u1010\u103d\u1031\u1000\u102d\u102f Filesystem \u1015\u1031\u102b\u103a\u1019\u103e\u102c \u1019\u101e\u102d\u1019\u103a\u1038\u1001\u1004\u103a Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1015\u103c\u102e\u1038 \u1015\u103c\u1014\u103a\u101a\u1030\u1010\u1032\u1037\u1021\u1001\u102b \u1016\u1010\u103a\u1010\u1032\u1037\u1021\u1001\u102b\u1019\u103e\u102c\u1010\u1031\u102c\u1037 \u1015\u103c\u1014\u103a\u1016\u103c\u100a\u103a Decrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1010\u102c\u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b \u1006\u102d\u102f\u101c\u102d\u102f\u1010\u102c\u1000\u1010\u1031\u102c\u1037 \u1016\u102d\u102f\u1004\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u101e\u1030\u1010\u102d\u102f\u1037\u101b\u1032\u1037 \u101c\u1000\u103a\u1001\u1036 Host Filesystem \u1015\u1031\u102b\u103a\u1019\u103e\u102c \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a Code \u1015\u102f\u1036\u1005\u1036 (\u1010\u1005\u103a\u1014\u100a\u103a\u1038 \u1016\u102d\u102f\u1004\u103a\u1011\u1032\u1000 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u101b\u1031\u102c File\/Folder Names \u1010\u103d\u1031\u101b\u1031\u102c \u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1000\u102d\u102f \u1015\u102f\u1036\u1005\u1036\u1021\u1019\u103b\u102d\u102f\u1038\u1019\u103b\u102d\u102f\u1038 Random-looking Data \u1016\u103c\u1004\u1037\u103a \u1015\u103c\u1031\u102c\u1004\u103a\u1038\u101c\u1032 \u1021\u1005\u102c\u1038\u1011\u102d\u102f\u1038\u1010\u1032\u1037\u1015\u102f\u1036\u1005\u1036) \u1019\u103b\u102c\u1038\u1016\u103c\u1004\u1037\u103a \u101e\u102d\u1019\u103a\u1038\u1011\u102c\u1038\u1015\u1031\u1019\u101a\u1037\u103a\u101c\u100a\u103a\u1038 Encryption \u1019\u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1010\u1032\u1037 \u1015\u102f\u1036\u1019\u103e\u1014\u103a Normal Files, Symlinks, Hardlinks \u1005\u1010\u1032\u1037 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u101c\u100a\u103a\u1038 Filesystem \u1015\u1031\u102b\u103a\u1019\u103e\u102c \u101b\u103e\u102d\u1014\u1031\u1006\u1032\u1015\u102b\u104b<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Block Device Encryption<\/span><\/em> \u1019\u103e\u102c\u1010\u1031\u102c\u1037 Block Device \u1011\u1032\u1019\u103e\u102c \u101b\u1031\u1038\u101e\u1019\u103b\u103e \u1019\u103e\u1010\u103a\u101e\u1019\u103b\u103e \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1000\u102d\u102f Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1010\u101a\u103a\u1006\u102d\u102f\u1010\u102c \u101e\u1031\u1001\u103b\u102c\u1005\u1031\u1016\u102d\u102f\u1037\u1021\u1010\u103d\u1000\u103a Filesystem Layer \u101b\u1032\u1037\u1021\u1031\u102c\u1000\u103a\u1018\u1000\u103a\u1019\u103e\u102c Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1010\u102c\u1015\u102b\u104b Offline \u1016\u103c\u1005\u103a\u1014\u1031\u1010\u1032\u1037\u1021\u1001\u103b\u102d\u1014\u103a Block \u1000\u102d\u102f\u1000\u103c\u100a\u1037\u103a\u1019\u100a\u103a\u1006\u102d\u102f\u101c\u103b\u1004\u103a Random Data Section \u1000\u103c\u102e\u1038\u1010\u1005\u103a\u1001\u102f\u101c\u102d\u102f \u1019\u103c\u1004\u103a\u101b\u1019\u103e\u102c\u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038 Decrypt \u1021\u101b\u1004\u103a&nbsp; \u1000\u103c\u102d\u102f \u1019\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1018\u1032 \u1019\u100a\u103a\u101e\u100a\u1037\u103a Filesystem Type \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1011\u102c\u1038\u101c\u1032\u1006\u102d\u102f\u1010\u102c\u1010\u1031\u102c\u1004\u103a\u1019\u103e \u1015\u103c\u1031\u102c\u1014\u102d\u102f\u1004\u103a\u1019\u103e\u102c\u1019\u101f\u102f\u1010\u103a\u1015\u102b\u1018\u1030\u1038\u104b \u1006\u102d\u102f\u101c\u102d\u102f\u1010\u102c\u1000\u1010\u1031\u102c\u1037 Permissions, Directory Structure and Metadata \u1010\u103d\u1031 \u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1000\u102d\u102f\u1015\u102b Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u1010\u102c\u1000\u103c\u1031\u102c\u1004\u1037\u103a \u1018\u101a\u103a\u101f\u102c\u1000 File (or) Directory \u1006\u102d\u102f\u1010\u102c\u104a \u1018\u101a\u103a\u101c\u1031\u102c\u1000\u103a\u1015\u1019\u102c\u100f\u1019\u103b\u102c\u1038\u1015\u103c\u102c\u1038\u1010\u101a\u103a\u1006\u102d\u102f\u1010\u102c\u104a \u1018\u101a\u103a\u101c\u102d\u102f\u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1019\u103b\u102d\u102f\u1038\u1010\u103d\u1031\u101c\u1032\u1006\u102d\u102f\u1010\u102c\u1010\u103d\u1031\u1000\u102d\u102f \u1018\u102c\u1019\u103e \u1019\u1015\u103c\u1031\u102c\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1018\u1030\u1038\u104b<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/gitlab.com\/cryptsetup\/cryptsetup\/-\/wikis\/DMCrypt\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-03-at-19.04.30-1024x375.png\" alt=\"\" class=\"wp-image-3665\"\/><\/a><\/figure><\/div>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038 ( \u1042 ) \u1019\u103b\u102d\u102f\u1038\u101c\u102f\u1036\u1038\u101f\u102c \u1021\u102c\u1038\u101e\u102c\u1001\u103b\u1000\u103a\u104a \u1021\u102c\u1038\u1014\u100a\u103a\u1038\u1001\u103b\u1000\u103a\u1010\u103d\u1031 \u101b\u103e\u102d\u1000\u103c\u1015\u102b\u1010\u101a\u103a\u104b \u101b\u1014\u102d\u102f\u1004\u103a\u101e\u1019\u103b\u103e Options \u1010\u103d\u1031 \u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1011\u1032\u1019\u103e Kernel \u1011\u1032\u1019\u103e\u102c \u1015\u102b\u101d\u1004\u103a\u1011\u102c\u1038\u1015\u103c\u102e\u1038\u101e\u102c\u1038\u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038 Linux Systems \u1010\u103d\u1031\u101b\u1032\u1037 Block Encryption \u1021\u1010\u103d\u1000\u103a \u1021\u1019\u103b\u102c\u1038\u101c\u1000\u103a\u1001\u1036\u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1014\u1031\u1000\u103c\u1010\u1032\u1037 De-facto Standard \u1010\u1005\u103a\u1001\u102f\u101c\u100a\u103a\u1038\u1016\u103c\u1005\u103a\u1010\u1032\u1037<em><span style=\"color:#b41d8d\" class=\"has-inline-color\"> dm-crypt <\/span><\/em>\u1000\u102d\u102f \u101e\u102f\u1036\u1038\u1000\u103c\u100a\u1037\u103a\u1015\u102b\u104b Tools \u1021\u1019\u103b\u102d\u102f\u1038\u1019\u103b\u102d\u102f\u1038\u1014\u103e\u1004\u1037\u103a \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1016\u102d\u102f\u1037\u1021\u1010\u103d\u1000\u103a Platform-independent Standard \u1010\u1005\u103a\u1001\u102f\u1000\u102d\u102f \u1016\u1014\u103a\u1010\u102e\u1038\u1011\u102c\u1038\u1010\u1032\u1037 <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Linux Unified Key Setup (LUKS) Extension<\/span><\/em> \u1014\u103e\u1004\u1037\u103a\u1021\u1010\u1030 \u1010\u103d\u1032\u101e\u102f\u1036\u1038\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/gitlab.com\/cryptsetup\/cryptsetup\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-03-at-19.05.04-1024x357.png\" alt=\"\" class=\"wp-image-3666\"\/><\/a><\/figure><\/div>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stackable Method \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1019\u100a\u103a\u1006\u102d\u102f\u101c\u103b\u1004\u103a\u1010\u1031\u102c\u1037 Linux \u1019\u103e\u102c \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031 \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1005\u102d\u1010\u103a\u1001\u103b\u101b\u1005\u1031\u1016\u102d\u102f\u1037 \u1021\u101c\u103d\u101a\u103a\u1006\u102f\u1036\u1038\u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038\u1010\u1005\u103a\u1001\u102f\u1016\u103c\u1005\u103a\u1015\u103c\u102e\u1038 Root Privileges \u1019\u101c\u102d\u102f\u1018\u1032 \u1011\u1015\u103a\u1019\u1036\u1015\u103c\u102f\u1015\u103c\u1004\u103a\u1016\u102d\u102f\u1037\u101c\u100a\u103a\u1038 \u1019\u101c\u102d\u102f\u1018\u1032 \u101c\u1000\u103a\u101b\u103e\u102d Filesystem \u1015\u1031\u102b\u103a\u1019\u103e\u102c\u1015\u1032 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1010\u1032\u1037<em><span style=\"color:#b41d8d\" class=\"has-inline-color\"> EncFS <\/span><\/em>\u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1000\u103c\u100a\u1037\u103a\u1015\u102b\u104b<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/vgough.github.io\/encfs\/\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-03-at-19.13.19-1024x513.png\" alt=\"\" class=\"wp-image-3668\"\/><\/a><\/figure><\/div>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\u1014\u1031\u102c\u1000\u103a\u1006\u102f\u1036\u1038\u100a\u103d\u103e\u1014\u103a\u1038\u1006\u102d\u102f\u101b\u1019\u100a\u103a\u1006\u102d\u102f\u101c\u103b\u1004\u103a\u1010\u1031\u102c\u1037 Platforms \u1021\u1019\u103b\u102d\u102f\u1038\u1019\u103b\u102d\u102f\u1038\u1015\u1031\u102b\u103a\u1019\u103e\u102c \u101b\u103e\u102d\u1010\u1032\u1037 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u101b\u101a\u1030 Access \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1016\u102d\u102f\u1037 \u101c\u102d\u102f\u1021\u1015\u103a\u1015\u102b\u1000<em><span style=\"color:#b41d8d\" class=\"has-inline-color\"> Veracrypt <\/span><\/em>\u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101c\u102d\u102f\u1037\u101b\u1015\u102b\u1010\u101a\u103a\u104b Windows, macOS \u1014\u103e\u1004\u1037\u103a Linux \u101c\u102d\u102f Platforms \u1010\u103d\u1031\u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1019\u103e\u102c \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1014\u102d\u102f\u1004\u103a\u1010\u1032\u1037 Media \u1010\u103d\u1031 Files \u1010\u103d\u1031\u1000\u102d\u102f Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1010\u1032\u1037 Truecrypt \u101b\u1032\u1037\u1014\u1031\u102c\u1000\u103a\u1019\u103e\u102c \u1015\u1031\u102b\u103a\u101c\u102c\u1010\u1032\u1037 Open-source Utility \u101c\u1031\u1038\u1010\u1005\u103a\u1001\u102f\u1015\u102b\u1015\u1032\u104b &nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.veracrypt.fr\/en\/Home.html\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-03-at-19.15.46-1024x361.png\" alt=\"\" class=\"wp-image-3667\"\/><\/a><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Disk Encryption &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u1019\u102d\u1019\u102d\u1010\u102d\u102f\u1037\u101b\u1032\u1037\u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031 \u1005\u102d\u1010\u103a\u1001\u103b\u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1016\u102d\u102f\u1037\u101b\u102c \u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038\u1000\u1031\u102c\u1004\u103a\u1038\u1010\u1005\u103a\u1001\u102f\u1000\u1010\u1031\u102c\u1037 Disk \u1010\u1005\u103a\u1001\u102f\u101c\u102f\u1036\u1038\u1016\u103c\u1005\u103a\u1005\u1031 (\u101e\u102d\u102f\u1037) Partition \u1010\u1005\u103a\u1015\u102d\u102f\u1004\u103a\u1038\u101c\u102f\u1036\u1038\u1016\u103c\u1005\u103a\u1005\u1031 \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a Code \u1010\u103d\u1031\u1021\u1016\u103c\u1005\u103a \u1015\u103c\u1031\u102c\u1004\u103a\u1038\u101c\u1032 Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1010\u102c\u1015\u102b\u1015\u1032\u104b Encrypt \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1016\u102d\u102f\u1037 Open [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4035,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64,18,65],"tags":[],"class_list":["post-3663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iat-courses","category-knowledge-sharing","category-linux"],"_links":{"self":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/3663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/comments?post=3663"}],"version-history":[{"count":3,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/3663\/revisions"}],"predecessor-version":[{"id":3672,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/3663\/revisions\/3672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media\/4035"}],"wp:attachment":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media?parent=3663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/categories?post=3663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/tags?post=3663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}