{"id":16,"name":"Sam","url":"","description":"","link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/sthooker\/","slug":"sthooker","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/340052f4fcf6449c56479641e3634fd2234189bc4a84dea9753ef638fa821600?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/340052f4fcf6449c56479641e3634fd2234189bc4a84dea9753ef638fa821600?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/340052f4fcf6449c56479641e3634fd2234189bc4a84dea9753ef638fa821600?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users"}]}}