{"id":4920,"name":"Emily","url":"","description":"","link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/econnol2\/","slug":"econnol2","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/e0987d791582d3d91d6784b68f1d5d37437a3a4dbd1815b787589dd1478a6de3?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/e0987d791582d3d91d6784b68f1d5d37437a3a4dbd1815b787589dd1478a6de3?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/e0987d791582d3d91d6784b68f1d5d37437a3a4dbd1815b787589dd1478a6de3?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/4920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users"}]}}