{"id":327,"date":"2013-04-12T14:54:31","date_gmt":"2013-04-12T18:54:31","guid":{"rendered":"https:\/\/www.mysecuritysign.com/blog\/?p=327"},"modified":"2023-05-30T06:38:02","modified_gmt":"2023-05-30T10:38:02","slug":"fashion-surveillance-stealth-wear","status":"publish","type":"post","link":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/","title":{"rendered":"Fashion strikes back against surveillance technology with stealth wear"},"content":{"rendered":"<p>\u201cOver the next 15 years, the\u00a0US Federal Aviation Administration anticipates more than 20,000 new drones will appear in American skies, owned not just by law enforcement agencies and the military, but also public health bodies and private companies.\u201d (<a href=\"https:\/\/www.psfk.com\/2013\/04\/anti-drone-hoodie-privacy.html\" rel=\"nofollow\">Report<\/a>: PSFK) This rise in surveillance technology includes face recognition software, body scans, and cell phones as GPS locators. This loss of privacy has disturbed many individuals and groups, including the fashion industry.<\/p>\n<p><div id=\"attachment_328\" style=\"width: 478px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-328\" class=\"size-full wp-image-328\" alt=\"stealth wear\" src=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg\" width=\"468\" height=\"410\" srcset=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg 468w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes-300x262.jpg 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/a><p id=\"caption-attachment-328\" class=\"wp-caption-text\">Adam Harvey\u2019s collection- Stealth Wear [Image via <a href=\"https:\/\/weburbanist.com\/2013\/04\/01\/stealth-wear-counter-surveillance-fashion-protects-privacy\/\" rel=\"nofollow\">Web Urbanist<\/a>]<\/p><\/div>In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers from <a href=\"https:\/\/ahprojects.com\/projects\/stealth-wear\" rel=\"nofollow\">thermal imaging<\/a> surveillance, a technology used widely by UAVs\/drones. The fabric reflects heat, masking the wearer\u2019s thermal signature. \u201cConceptually, these garments align themselves with the rationale behind the traditional hijab and burqa: to act as \u2018the veil which separates man or the world from God,\u2019 replacing God with drone,\u201d says Harvey.<\/p>\n<p>Harvey designed Stealth Wear for \u201cexploring the ways in which we can interact and aestheticize our culture of rising surveillance.\u201d Simply put, right now they&#8217;re more of a conversation piece than functional gear. The cell phone pocket is another conceptual element:\u00a0it blocks all incoming and outgoing phone signals. Flexible and waterproof, it\u00a0\u00a0is \u201csoftware and carrier\u00a0<a href=\"https:\/\/ahprojects.com\/projects\/stealth-wear\" rel=\"nofollow\">agnostic<\/a>.\u201d<\/p>\n<p>This isn&#8217;t the first project Adam Harvey has created to comment on privacy and surveillance. Before Stealth Wear, Harvey created CV Dazzle as a master&#8217;s student.\u00a0<a href=\"https:\/\/weburbanist.com\/2013\/04\/01\/stealth-wear-counter-surveillance-fashion-protects-privacy\/\" rel=\"nofollow\">WebUrbanist.com<\/a> reports: \u201cDeveloped as his master\u2019s thesis, Harvey\u2019s project CV Dazzle attempted to find makeup and hair styles that would elude recognition. This collaboration between hair stylists, makeup artists and fashion designers used custom software that exposes the vulnerabilities of the OpenCV face detection algorithm, creating styles that exploit these weaknesses.\u201d<\/p>\n<div id=\"attachment_332\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/cvdazzlejan5.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-332\" class=\" wp-image-332 \" alt=\"dazzle-makeup\" src=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/cvdazzlejan5.jpeg\" width=\"400\" height=\"398\" srcset=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/cvdazzlejan5.jpeg 400w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/cvdazzlejan5-150x150.jpeg 150w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/cvdazzlejan5-300x298.jpeg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><p id=\"caption-attachment-332\" class=\"wp-caption-text\">Adam Harvey&#8217;s CV Dazzle makeup prevents facial recognition software from identifying distinctive features (via <a href=\"https:\/\/boingboing.net\/2012\/01\/05\/dazzle-makeup-and-hairstyles-t.html\" rel=\"nofollow\">boingboing.net<\/a>).<\/p><\/div>\n<p>Unlike Stealth Wear, CV Dazzle is not an obvious camouflage. Its striking colors and patterns draw attention rather than hide from it. The idea is to confuse facial recognition software. Automated face detection systems often look for the difference between the dark and light regions of the face. CV Dazzle thwarts automated face recognition systems by changing the spatial relationship and contrast of important facial features. \u201cOne trick is to darken areas that usually seem bright, like the upper cheek or the nose bridge (the region where the nose, eyes, and forehead intersect) area.\u201d reports <a href=\"https:\/\/dismagazine.com\/dystopia\/evolved-lifestyles\/8115\/anti-surveillance-how-to-hide-from-machines\/\" rel=\"nofollow\">DIS Magazine<\/a>.<\/p>\n<p>Camouflage is traditionally used in the military. Not unlike Harvey, Guy Cramer, CEO of HyperStealth, a Canadian camouflage company, has created an \u201c<a href=\"https:\/\/www.psfk.com\/2013\/04\/anti-drone-hoodie-privacy.html\" rel=\"nofollow\">intelligent textile<\/a>\u201d named\u00a0Smartcamo, capable of changing color to match its surroundings. Although such products can\u2019t fool surveillance technology all the time, they serve to highlight a growing public concern.<\/p>\n<div class=\"related-products\">\n<h3>Like this topic? Check out our related products:<\/h3>\n<ul>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/video-surveillance-signs\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.mysecuritysign.com\/img\/sm\/S\/digitally-recorded-private-property-sign-s-5718.png\" \/><\/a><\/div>\n<p>Video Surveillance Signs<\/li>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/mss\/security-signs\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.mysecuritysign.com\/img\/sm\/K\/Video-Recorded-Surveillance-Sign-K-4174.gif\" \/><\/a><\/div>\n<p>Security Camera Signs<\/li>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/surveillance-sign\/surveillance-warning-signs\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.mysecuritysign.com\/img\/sm\/K\/no-trespassing-cctv-sign-k-2257.png\" \/><\/a><\/div>\n<p>Surveillance Warning Signs<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u201cOver the next 15 years, the\u00a0US Federal Aviation Administration anticipates more than 20,000 new drones will appear in American skies, owned not just by law enforcement agencies and the military, but also public health bodies and private companies.\u201d (Report: PSFK) This rise in surveillance technology includes face recognition software, body scans, and cell phones as [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":328,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,11],"tags":[],"class_list":["post-327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance","category-trespassing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fashion strikes back against surveillance technology with stealth wear -<\/title>\n<meta name=\"description\" content=\"In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fashion strikes back against surveillance technology with stealth wear -\" \/>\n<meta property=\"og:description\" content=\"In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trespassingsignscctvsigns\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-12T18:54:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-30T10:38:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/211288.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg?time=1722559791\" \/>\n\t<meta property=\"og:image:width\" content=\"468\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kanika Pareek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:site\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kanika Pareek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/\"},\"author\":{\"name\":\"Kanika Pareek\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/1100729452b5677e8629cd9004725070\"},\"headline\":\"Fashion strikes back against surveillance technology with stealth wear\",\"datePublished\":\"2013-04-12T18:54:31+00:00\",\"dateModified\":\"2023-05-30T10:38:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/\"},\"wordCount\":499,\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/stealth_clothes.jpg\",\"articleSection\":[\"Surveillance\",\"Trespassing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/\",\"name\":\"Fashion strikes back against surveillance technology with stealth wear -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/stealth_clothes.jpg\",\"datePublished\":\"2013-04-12T18:54:31+00:00\",\"dateModified\":\"2023-05-30T10:38:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/1100729452b5677e8629cd9004725070\"},\"description\":\"In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers...\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/fashion-surveillance-stealth-wear\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/stealth_clothes.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/stealth_clothes.jpg\",\"width\":468,\"height\":410,\"caption\":\"Adam Harvey\u2019s collection- Stealth Wear [Image via Web Urbanist]\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/1100729452b5677e8629cd9004725070\",\"name\":\"Kanika Pareek\",\"description\":\"Kanika is a literature admirer, art lover, and a freelance content developer for SmartSign. She holds bachelor degrees in life sciences and education and as well as a masters degree in zoology. She is passionate about exploring and writing on various subjects including environment, life sciences, jewelry, fashion and education. She is also an active theater and radio artiste, a dancer by passion and a social worker who is associated with a couple of local and international NGOs. Kanika lives in the beautiful city of Jaipur, India.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fashion strikes back against surveillance technology with stealth wear -","description":"In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/","og_locale":"en_US","og_type":"article","og_title":"Fashion strikes back against surveillance technology with stealth wear -","og_description":"In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers...","og_url":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/","article_publisher":"https:\/\/www.facebook.com\/trespassingsignscctvsigns","article_published_time":"2013-04-12T18:54:31+00:00","article_modified_time":"2023-05-30T10:38:02+00:00","og_image":[{"width":468,"height":410,"url":"https:\/\/211288.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg?time=1722559791","type":"image\/jpeg"}],"author":"Kanika Pareek","twitter_card":"summary_large_image","twitter_creator":"@mysecuritysign","twitter_site":"@mysecuritysign","twitter_misc":{"Written by":"Kanika Pareek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/#article","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/"},"author":{"name":"Kanika Pareek","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/1100729452b5677e8629cd9004725070"},"headline":"Fashion strikes back against surveillance technology with stealth wear","datePublished":"2013-04-12T18:54:31+00:00","dateModified":"2023-05-30T10:38:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/"},"wordCount":499,"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg","articleSection":["Surveillance","Trespassing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/","url":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/","name":"Fashion strikes back against surveillance technology with stealth wear -","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/#primaryimage"},"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg","datePublished":"2013-04-12T18:54:31+00:00","dateModified":"2023-05-30T10:38:02+00:00","author":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/1100729452b5677e8629cd9004725070"},"description":"In his series called \u2018Stealth Wear\u2019, designer Adam Harvey experiments with anti-drone garments made out of metallized fabric that protect wearers...","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mysecuritysign.com/blog\/fashion-surveillance-stealth-wear\/#primaryimage","url":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg","contentUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/stealth_clothes.jpg","width":468,"height":410,"caption":"Adam Harvey\u2019s collection- Stealth Wear [Image via Web Urbanist]"},{"@type":"WebSite","@id":"https:\/\/www.mysecuritysign.com/blog\/#website","url":"https:\/\/www.mysecuritysign.com/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mysecuritysign.com/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/1100729452b5677e8629cd9004725070","name":"Kanika Pareek","description":"Kanika is a literature admirer, art lover, and a freelance content developer for SmartSign. She holds bachelor degrees in life sciences and education and as well as a masters degree in zoology. She is passionate about exploring and writing on various subjects including environment, life sciences, jewelry, fashion and education. She is also an active theater and radio artiste, a dancer by passion and a social worker who is associated with a couple of local and international NGOs. Kanika lives in the beautiful city of Jaipur, India."}]}},"_links":{"self":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":5,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":4472,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/327\/revisions\/4472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media\/328"}],"wp:attachment":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/categories?post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/tags?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}