{"id":1447,"name":"dpientka","url":"","description":"","link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/dpientka\/","slug":"dpientka","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/be52bf76457e422c5f98dc2605f8bce4a87e1cf8512c11e8053ffe17ab87ec6f?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/be52bf76457e422c5f98dc2605f8bce4a87e1cf8512c11e8053ffe17ab87ec6f?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/be52bf76457e422c5f98dc2605f8bce4a87e1cf8512c11e8053ffe17ab87ec6f?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/1447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users"}]}}