{"id":3505,"name":"jdphilli","url":"","description":"","link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/jdphilli\/","slug":"jdphilli","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/4b047af8af6687657cafdcce25095fff26c155f542681f07719f6e516da60d15?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/4b047af8af6687657cafdcce25095fff26c155f542681f07719f6e516da60d15?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/4b047af8af6687657cafdcce25095fff26c155f542681f07719f6e516da60d15?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/3505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users"}]}}