{"id":2141,"date":"2021-07-26T12:00:00","date_gmt":"2021-07-26T16:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2141"},"modified":"2021-07-25T15:00:45","modified_gmt":"2021-07-25T19:00:45","slug":"computers-are-hard-windows-hello-duped","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/","title":{"rendered":"Computers Are Hard: Windows Hello Duped"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-microsoft-s-windows-hello-was-fooled-by-researchers-using-a-high-quality-photo-and-black-frame-full-findings-will-be-presented-at-black-hat-las-vegas\">Microsoft&#8217;s Windows Hello was fooled by researchers using a high-quality photo and black frame. Full findings will be presented at Black Hat Las Vegas.<\/h2>\n\n\n\n<p>Computers are hard. We often use metaphors within the construction industry to compare in the software development process, but the complexities that lie within software R&amp;D are far more intricate than can be described with a metaphor. It\u2019s not just about the software itself, but also the infrastructure it runs on. When infrastructure has a vulnerability, the consequences are dire. If we\u2019re using the construction metaphor, it\u2019s akin to building atop quicksand, eventually the whole thing is going to collapse. Or, just as problematic, breaking a water main trying to fix the road. The damage in both cases is widespread and severe.<\/p>\n\n\n\n<p>When Microsoft released Windows Hello, its facial recognition system, it showcased the company\u2019s efforts to move to a password-less society. Passwords are the bane of every IT department around the globe, it\u2019s one of the weakest parts of security because it is controlled by humans. Passwords are increasingly hard to remember because we have so many of them, and it is incredibly common for passwords to be reused on different sites. It\u2019s one of the biggest reasons <a href=\"https:\/\/www.pwvconsultants.com\/blog\/password-managers-keep-your-information-secure\/\" target=\"_blank\" rel=\"noreferrer noopener\">we always recommend a password manager<\/a> so that employees don\u2019t have to remember passwords. The system simply logs them in automatically or autofills their credentials.<\/p>\n\n\n\n<p>Biometrics have been the subject of many research studies to determine levels of security, and that\u2019s exactly what security firm CyberArk was doing with Windows Hello when they uncovered a way to trick the system into unlocking when it shouldn\u2019t. For Microsoft, Windows hardware is very diverse, so Windows Hello works with many third-party webcams. By contrast, Apple\u2019s FaceID only works with iPhones and iPads, it is not compatible with the Mac yet, that have more recent cameras installed. This is where CyberArk saw a potential problem.<\/p>\n\n\n\n<p>\u201cWe tried to find the weakest point in the facial recognition and what would be the most interesting from the attacker\u2019s perspective, the most approachable option,\u201d <a href=\"https:\/\/www.wired.com\/story\/windows-hello-facial-recognition-bypass\/\" target=\"_blank\" rel=\"noreferrer noopener\">says Omer Tsarfati<\/a>, a researcher at the security firm CyberArk. \u201cWe created a full map of the Windows Hello facial-recognition flow and saw that the most convenient for an attacker would be to pretend to be the camera, because the whole system is relying on this input.\u201d<\/p>\n\n\n\n<p>Because Microsoft works with so many third-party products, there is no way to guarantee that the webcam purchased by a consumer offers proper protection. Windows Hello is supposed to only work with webcams that have an infrared sensor along with a regular RGB sensor. But, as CyberArk found, the system doesn\u2019t even look at the RGB data. Which means the background of an image used doesn\u2019t matter, all the researchers needed was one straight-on infrared image of a target\u2019s face and one black frame. With those two things, the team manipulated a USB webcam to deliver an image, tricking Windows Hello into unlocking.<\/p>\n\n\n\n<p>Now, this wouldn\u2019t be easy to do in practice because you need physical access to the target\u2019s machine along with a high-quality infrared image of the target. The findings will be presented at this year\u2019s Black Hat event, and while MIcrosoft has already rolled out patches, it doesn\u2019t rule out the ability of an attacker to get in through a third-party camera. Someone will take this research and use it to find another way to bypass the technology.<\/p>\n\n\n\n<p>The more we try to keep our information private and secure, the more threat actors change their game in an attempt to get that information. Computers are hard, software R&amp;D is even harder. Using metaphors within the construction industry doesn\u2019t always do it justice, and even likening it to embroidery, where if you miss a stitch and don\u2019t catch it, you have to remove everything you\u2019ve done from that point and reconstruct it after fixing the miss, isn\u2019t quite accurate. Think of it more like a combination, hammer a nail on the first floor and cause a fire on the 12th floor, and the only way to fix it is to reconstruct the entire building.<\/p>\n\n\n\n<p>The Windows Hello facial recognition system was fooled by a machine because it didn\u2019t work like it was supposed to. Now we will wait and see if the water main breaks as more researchers and hackers try to find a way to break it all the way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computers are hard, Microsoft&#8217;s facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.<\/p>\n","protected":false},"author":1,"featured_media":2161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,2112,2387],"tags":[2113,2390,1887,1507,32,17,1972,2389,2388],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computers Are Hard: Windows Hello Duped - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Computers are hard, Microsoft&#039;s facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computers Are Hard: Windows Hello Duped\" \/>\n<meta property=\"og:description\" content=\"Computers are hard, Microsoft&#039;s facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-26T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-25T19:00:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Computers Are Hard: Windows Hello Duped\",\"datePublished\":\"2021-07-26T16:00:00+00:00\",\"dateModified\":\"2021-07-25T19:00:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\"},\"wordCount\":764,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg\",\"keywords\":[\"Computers Are Hard\",\"CyberArk\",\"Facial Recognition\",\"Microsoft\",\"Passwords\",\"Security\",\"Software Development\",\"webcam\",\"Windows Hello\"],\"articleSection\":[\"Application Security\",\"Computers Are Hard\",\"Facial Recognition\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\",\"name\":\"Computers Are Hard: Windows Hello Duped - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg\",\"datePublished\":\"2021-07-26T16:00:00+00:00\",\"dateModified\":\"2021-07-25T19:00:45+00:00\",\"description\":\"Computers are hard, Microsoft's facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computers Are Hard: Windows Hello Duped\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computers Are Hard: Windows Hello Duped - PWV Consultants","description":"Computers are hard, Microsoft's facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/","og_locale":"en_US","og_type":"article","og_title":"Computers Are Hard: Windows Hello Duped","og_description":"Computers are hard, Microsoft's facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-07-26T16:00:00+00:00","article_modified_time":"2021-07-25T19:00:45+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Computers Are Hard: Windows Hello Duped","datePublished":"2021-07-26T16:00:00+00:00","dateModified":"2021-07-25T19:00:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/"},"wordCount":764,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg","keywords":["Computers Are Hard","CyberArk","Facial Recognition","Microsoft","Passwords","Security","Software Development","webcam","Windows Hello"],"articleSection":["Application Security","Computers Are Hard","Facial Recognition"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/","url":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/","name":"Computers Are Hard: Windows Hello Duped - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg","datePublished":"2021-07-26T16:00:00+00:00","dateModified":"2021-07-25T19:00:45+00:00","description":"Computers are hard, Microsoft's facial recognition system, Windows Hello, was duped by a machine. Researchers use lack of RGB, trick webcam.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/07\/Windows-Hello-Duped-by-Machine-scaled.jpeg","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/computers-are-hard-windows-hello-duped\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Computers Are Hard: Windows Hello Duped"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2141"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2141"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2141\/revisions"}],"predecessor-version":[{"id":2166,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2141\/revisions\/2166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2161"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}