{"id":128633,"date":"2015-07-31T16:39:03","date_gmt":"2015-07-31T16:39:03","guid":{"rendered":"https:\/\/globalfreedomofexpression.columbia.edu\/wp\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium.jpg"},"modified":"2015-07-31T16:39:03","modified_gmt":"2015-07-31T16:39:03","slug":"computer-security-exploit-000055689534_medium-2","status":"inherit","type":"attachment","link":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/home-page\/computer-security-exploit-000055689534_medium-2\/","title":{"rendered":"Computer-security-Exploit-000055689534_Medium"},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false},"class_list":["post-128633","attachment","type-attachment","status-inherit","hentry"],"acf":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-300x200.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-300x200.jpg 300w, https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-1024x682.jpg 1024w, https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium.jpg 1698w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":1698,"height":1131,"file":"2014\/10\/Computer-security-Exploit-000055689534_Medium.jpg","sizes":{"thumbnail":{"file":"Computer-security-Exploit-000055689534_Medium-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-150x150.jpg"},"medium":{"file":"Computer-security-Exploit-000055689534_Medium-300x200.jpg","width":300,"height":200,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-300x200.jpg"},"large":{"file":"Computer-security-Exploit-000055689534_Medium-1024x682.jpg","width":1024,"height":682,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-1024x682.jpg"},"expert":{"file":"Computer-security-Exploit-000055689534_Medium-600x600.jpg","width":600,"height":600,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-600x600.jpg"},"expert-sm":{"file":"Computer-security-Exploit-000055689534_Medium-200x200.jpg","width":200,"height":200,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-200x200.jpg"},"map":{"file":"Computer-security-Exploit-000055689534_Medium-800x640.jpg","width":800,"height":640,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium-800x640.jpg"},"full":{"file":"Computer-security-Exploit-000055689534_Medium.jpg","width":1698,"height":1131,"mime_type":"image\/jpeg","source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium.jpg"}},"image_meta":{"aperture":5.6,"credit":"","camera":"Canon EOS M","caption":"","created_timestamp":1420936925,"copyright":"","focal_length":"47","iso":"1600","shutter_speed":"0.0125","title":"","orientation":1}},"post":152020,"source_url":"https:\/\/globalfreedomofexpression.columbia.edu\/wp-content\/uploads\/2014\/10\/Computer-security-Exploit-000055689534_Medium.jpg","_links":{"self":[{"href":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/wp-json\/wp\/v2\/media\/128633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/wp-json\/wp\/v2\/comments?post=128633"}],"wp:attached-to":[{"embeddable":true,"post_type":"page","id":152020,"href":"https:\/\/globalfreedomofexpression.columbia.edu\/ar\/wp-json\/wp\/v2\/pages\/152020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}