{"id":1573,"name":"lzm","url":"","description":"","link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/lzm\/","slug":"lzm","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/795a776a61deed6e13b005699927d778933da7936ebf72074414de9a69da3bad?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/795a776a61deed6e13b005699927d778933da7936ebf72074414de9a69da3bad?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/795a776a61deed6e13b005699927d778933da7936ebf72074414de9a69da3bad?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/1573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users"}]}}