{"id":38044,"date":"2024-11-01T16:00:00","date_gmt":"2024-11-01T14:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=38044"},"modified":"2025-08-30T01:01:26","modified_gmt":"2025-08-29T22:01:26","slug":"what-is-fully-homomorphic-encryption-fhe","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-is-fully-homomorphic-encryption-fhe\/","title":{"rendered":"What is fully homomorphic encryption (FHE)?"},"content":{"rendered":"<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What encryption methods exist in Web2 and Web3?<\/h2>\n<p>People encounter data protection both at home and at work. The encryption process runs automatically and so <span data-descr=\"hundreds of milliseconds\" class=\"old_tooltip\">quickly<\/span> that most never notice it. For a few seconds a padlock appears in a browser\u2019s address bar, or online-banking security prompts pop up.<\/p>\n<p>Most forms of encryption are designed to meet everyday needs\u2014keeping personal data safe across devices. The most popular approaches:<\/p>\n<ul class=\"wp-block-list\">\n<li><em>AES (Advanced Encryption Standard).<\/em> Uses a single key for encryption and decryption. Employed to protect data on smartphones, computers, cloud services, banking systems, VPNs and Wi\u2011Fi (WPA2\/WPA3);<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>RSA (Rivest, Shamir, Adleman).<\/em> An asymmetric algorithm that uses a key pair\u2014a public key to encrypt data and a private key to decrypt it. Used in electronic signatures, email services, web browsers and the HTTPS protocol to establish secure connections via SSL\/TLS;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>TLS (Transport Layer Security).<\/em> Protects connections between client and server much like the above but combines symmetric and asymmetric methods: RSA for key exchange, AES for data encryption;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>End-to-End Encryption (E2EE).<\/em> The end-to-end method used in WhatsApp, Signal and Telegram. It protects data from eavesdropping on the servers it traverses, and is also used by some email services and video-conferencing tools;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>SHA (Secure Hash Algorithm).<\/em> A family of cryptographic hash functions for creating digital signatures and ensuring data integrity. Bitcoin uses SHA\u2011256, which transforms input into a unique fixed-length string (a hash) for authenticity checks;<\/li>\n<li><em>ECC (Elliptic Curve Cryptography).<\/em> Used to encrypt data on mobile devices, in secure internet connections and in cryptocurrencies. It relies on elliptic-curve maths to create small yet robust keys. An ECDSA implementation was chosen by <a href=\"https:\/\/forklog.com\/en\/news\/who-is-satoshi-nakamoto\">\u0421\u0430\u0442\u043e\u0448\u0438 \u041d\u0430\u043a\u0430\u043c\u043e\u0442\u043e<\/a> when bitcoin was created in 2008. In 2021 the <a href=\"https:\/\/forklog.com\/en\/news\/what-is-taproot\">Taproot<\/a> upgrade added more advanced <a href=\"https:\/\/forklog.com\/en\/news\/what-are-schnorr-signatures-and-how-are-they-used-in-bitcoin\">Schnorr signatures<\/a>. They raised security and enabled simpler <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-multisignature-what-is-a-ring-signature\">multisignature<\/a> schemes, but fell short on anonymity\u2014senders and recipients of coins remain under the gaze of analytics firms.<\/li>\n<\/ul>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What is fully homomorphic encryption (FHE)?<\/h2>\n<p>Blockchain\u2019s strengths are decentralisation and transparency; its big weakness is thin anonymity. Developers behind <a href=\"https:\/\/forklog.com\/en\/news\/what-is-monero-xmr\">Monero<\/a>, <a href=\"https:\/\/forklog.com\/en\/news\/what-is-zcash-zec\">Zcash<\/a> and the bitcoin mixer <a href=\"https:\/\/forklog.com\/en\/news\/indexed-finance-hacker-funnels-stolen-funds-through-tornado-cash\">Tornado Cash<\/a> have faced regulatory pressure for trying to enhance user privacy.<\/p>\n<p>In recent years <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-zero-knowledge-proof\">ZKP<\/a> technology has gained traction, eliminating the need to hand data to a third party. Startups <a href=\"https:\/\/forklog.com\/en\/news\/what-is-zksync\">zkSync<\/a>, <a href=\"https:\/\/forklog.com\/en\/news\/polygon-zkevm-resumes-operations-after-outage\">Polygon zkEVM<\/a>, <a href=\"https:\/\/forklog.com\/en\/news\/scroll-token-surges-50-following-binance-listing\">Scroll<\/a> and <a href=\"https:\/\/forklog.com\/en\/news\/starkware-aims-to-scale-bitcoin-with-zk-stark-technology\">StarkWare<\/a> not only tackle blockchain scalability but also help obscure a user\u2019s identity.<\/p>\n<p>Another way to boost anonymity and data safety is homomorphic encryption. First proposed in 1978 by the authors of RSA, it allows mathematical operations on data without decrypting it.<\/p>\n<p>Several flavours of homomorphic encryption exist, differing by the operations they support and their computational power:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>partially homomorphic encryption (<span data-descr=\"Partially Homomorphic Encryption\" class=\"old_tooltip\">PHE<\/span>).<\/strong> Allows only one mathematical operation on ciphertexts\u2014addition or multiplication. RSA and ElGamal support only multiplication; the Paillier cryptosystem supports addition;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>somewhat homomorphic encryption (<span data-descr=\"Somewhat Homomorphic Encryption\" class=\"old_tooltip\">SWHE<\/span>).<\/strong> Supports only a limited number of additions and multiplications before the ciphertext becomes too \u201cnoisy\u201d, threatening distorted results. SWHE underpinned the first FHE constructions;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>fully homomorphic encryption (FHE).<\/strong> The most powerful form, supporting an arbitrary number of additions and multiplications on encrypted data.\u00a0<\/li>\n<\/ul>\n<p>For example, Alice wants to send Bob a Christmas recipe along with the groceries. She uses a third party, hiring a courier named John. She encrypts the family recipe, leaving only the shopping list visible. Alice uses a private key, and the algorithm performs multiplications and additions, adding \u201cnoise\u201d. John does the shopping and delivers the goods along with the recipe to Bob. Knowing the key, Bob decrypts the data with the FHE algorithm\u2014by applying the inverse mathematical operations.<\/p>\n<p>FHE hides what is transmitted or processed. That is its key distinction from ZKP, which focuses on the anonymity of the party who holds the data and performs the operation\u2014the user\u2019s identity.\u00a0<\/p>\n<p>In 2020 Ethereum co-founder Vitalik Buterin <a href=\"https:\/\/vitalik.eth.limo\/general\/2020\/07\/20\/homomorphic.html\" target=\"_blank\" rel=\"noopener\" title=\"\">published a paper<\/a> on applying FHE to blockchains.\u00a0<\/p>\n<p><em>\u201cFully homomorphic encryption has long been considered one of the holy grails of cryptography. Its potential is impressive: it is a type of encryption that allows a third party to perform computations on encrypted data and obtain an encrypted result, which can be passed back to someone who has the key to decrypt the original data, while the third party cannot decrypt either the data or the result\u201d<\/em>, Buterin wrote.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">How has fully homomorphic encryption evolved?<\/h2>\n<p>In 1982 Shafi Goldwasser and Silvio Micali proposed an encryption system homomorphic with respect to multiplication that could encrypt a single bit. An improved system with similar principles was presented in 1999 by Pascal Paillier.<\/p>\n<p>The RSA and ElGamal schemes were early PHE examples and supported only one operation\u2014insufficient for complex tasks. In 2005 the Boneh\u2013Goh\u2013Nissim (BGN) cryptosystem <span data-descr=\"Was based on the use of bilinear pairings on elliptic curves\" class=\"old_tooltip\">became the first<\/span> to allow an unlimited number of additions and a single multiplication.\u00a0<\/p>\n<p>In 2009 Craig Gentry, a Stanford graduate student and IBM intern, proposed an FHE scheme. It can be used to preserve data confidentiality during any kind of processing in untrusted environments\u2014cloud or distributed computing.\u00a0<\/p>\n<p>Gentry\u2019s FHE scheme is based on <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A0%D0%B5%D1%88%D1%91%D1%82%D0%BA%D0%B0_(%D0%B0%D0%BB%D0%B3%D0%B5%D0%B1%D1%80%D0%B0)\" target=\"_blank\" rel=\"noopener\" title=\"\">lattices<\/a> and introduces \u201cnoise\u201d that grows with each operation. He addressed this via <span data-descr=\"The core idea of bootstrapping is to \u2018refresh\u2019 the ciphertext before the noise accumulates to an uncontrollable level\" class=\"old_tooltip\">bootstrapping<\/span>\u2014partial decryption followed by re-encryption. This innovative construction was computationally exorbitant and hampered early prototypes.<\/p>\n<p>In 2011 cryptographers proposed a simpler FHE approach based on the Learning With Errors (<span data-descr=\"Learning With Errors\" class=\"old_tooltip\">LWE<\/span>) problem and its ring version, Ring\u2011LWE. The Brakerski\u2013Fan\u2013Vercauteren (B\/FV) approach effectively controlled noise growth. Through modulus switching it increased the number of operations that could be performed before refresh. These advances improved efficiency in specific use cases.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">How is FHE used in Web3?<\/h2>\n<p>FHE has potential in cloud computing, finance, media, medicine and elsewhere where data confidentiality matters. Combined with ZKP solutions or used on its own, it can raise user privacy in DeFi, <a href=\"https:\/\/forklog.com\/en\/news\/tokens-for-noise-and-a-web3-alternative-to-google-maps-the-most-interesting-depin-projects\">DePIN<\/a>, and AI with a blockchain focus.<\/p>\n<p>Applications of FHE in <a href=\"https:\/\/forklog.com\/en\/news\/what-is-web3\">Web3<\/a>:\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li><em>multi\u2011party computation (<span data-descr=\"Multi-Party Computation\" class=\"old_tooltip\">MPC<\/span>).<\/em> Protocols split computation into parts executed by different nodes. With FHE mechanics, each part can remain encrypted, adding confidentiality to inputs;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>data protection. <\/em>Storing information in encrypted form alongside <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-smart-contract\">smart contracts<\/a> grants access only to legitimate users;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>cloud computing. <\/em>FHE lets you send encrypted data to cloud services for processing without revealing it to the provider. For example, share encrypted financial information with an accountant and receive a private report back;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>protection against maximal extractable value (<\/em><a href=\"https:\/\/forklog.com\/en\/news\/what-is-mev-in-ethereum\"><em>MEV<\/em><\/a><em>).<\/em> MEV bots seek high\u2011value transactions and insert their own before they are processed, pocketing profits. If transactions cannot be analysed thanks to FHE, frontrunning can be eliminated;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>privacy for Web3 participants.<\/em> Lets DeFi users, <a href=\"https:\/\/forklog.com\/en\/news\/what-is-restaking-and-how-to-make-money-from-it\">restaking<\/a> validators and DePIN infrastructure providers encrypt their information;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>machine learning on encrypted data.<\/em> With FHE, encrypted data can be entrusted to AI. That is useful in medicine, where patient records must be protected yet can train models for diagnosis;<\/li>\n<li><em>voting. <\/em>With FHE, ballots can be encrypted, preserving privacy and preventing manipulation of political elections or <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-dao-decentralised-autonomous-organisation\">DAO<\/a> votes.<\/li>\n<\/ul>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">Which companies are implementing FHE?<\/h2>\n<p>After Gentry\u2019s 2009 scheme, tech giants began to experiment. For firms such as IBM and Google, being first to protect cloud customers\u2019 data mattered.\u00a0<\/p>\n<p>Over the first decade, many leading players shipped their own offerings. They focused on key management and cloud computation with FHE protection. IBM released the <a href=\"https:\/\/github.com\/homenc\/HElib\" target=\"_blank\" rel=\"noopener\" title=\"\">HElib<\/a> development library, followed by <a href=\"https:\/\/www.ibm.com\/products\/guardium-data-encryption\" target=\"_blank\" rel=\"noopener\" title=\"\">IBM Guardium Data Encryption<\/a>\u2014a suite of data\u2011security services with advanced technologies, including FHE variants.<\/p>\n<p>At the end of 2022 Google open\u2011sourced two FHE\u2011based tools. Its privacy\u2011enhancing technologies (PET) include Magritte, an AI video\u2011blurring service that saves editors time, and FHE Transpiler for developers. The former helps obscure unwanted content; the latter is relevant to work on encrypted data in finance, government and healthcare.<\/p>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">\u00a0How are startups advancing FHE in Web3?<\/h2>\n<p>After Vitalik Buterin\u2019s essay on the merits of FHE, developers began to bring the technology to the Ethereum network. Early projects such as <strong>Zama<\/strong> appeared in 2020.<\/p>\n<p>The French firm introduced a fully homomorphic, <a href=\"https:\/\/forklog.com\/en\/news\/what-is-the-ethereum-virtual-machine-evm\">EVM<\/a>\u2011compatible solution\u2014fhEVM. It performs computations on encrypted data, adding privacy features to smart contracts and dapps.<\/p>\n<p>The Zama team <a href=\"https:\/\/www.zama.ai\/introduction-to-homomorphic-encryption\" target=\"_blank\" rel=\"noopener\" title=\"\">believes<\/a> it can help forge a new, unified internet\u2011connection standard, HTTPZ\u2014data permanently encrypted not only in transit but also while being computed on. In March 2024 the crypto company <a href=\"https:\/\/forklog.com\/en\/news\/institutional-bulletin-zama-secures-73-million-avail-raises-27-million\">closed a Series A round<\/a> of $73m. It was led by Multicoin Capital, Protocol Labs and Filecoin.\u00a0\u00a0\u00a0\u00a0<\/p>\n<p><strong>Fhenix<\/strong> focuses on FHE for the Ethereum blockchain, building on Zama\u2019s fhEVM. In partnership with EigenLayer and <a href=\"https:\/\/www.fhenix.io\/scaling-confidential-compute-with-celestia-underneath\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Celestia<\/a> it is creating a <a href=\"https:\/\/www.blog.eigenlayer.xyz\/fhenix\/\" target=\"_blank\" rel=\"noopener\" title=\"\">coprocessor<\/a> stack to cut the computational costs of FHE.\u00a0<\/p>\n<p>Another strand of Fhenix\u2019s work is the first FHE layer\u2011two (<a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-layer%e2%80%912-solution-in-blockchain\">L2<\/a>) solution. The optimistic <a href=\"https:\/\/forklog.com\/en\/news\/what-are-rollups-and-how-do-they-scale-ethereum\">rollup<\/a> for Ethereum is built on Arbitrum Stack. In June 2024 the team <a href=\"https:\/\/x.com\/FhenixIO\/status\/1798028604212957326\">announced<\/a> the Helium testnet and a $15m Series A.<\/p>\n<p><strong>Inco Network<\/strong> is a modular, fhEVM\u2011compatible network designed as a privacy stack for Web3 developers. The team offers combined solutions using FHE, MPC and TEE and promotes confidentiality\u2011as\u2011a\u2011service (CaaS).<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco-1024x576.png\" alt=\"Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco\" class=\"wp-image-244305\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco-1024x576.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco-300x169.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco-768x432.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco-1536x864.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/Varianty-primeneniya-konfidentsialnyh-vychislenii-ot-Inco.-Dannye-Inco.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Use cases for confidential computing from Inco. Source: <a href=\"https:\/\/docs.inco.org\/introduction\/novel-use-cases\" target=\"_blank\" rel=\"noopener\" title=\"\">Inco<\/a>.<\/figcaption><\/figure>\n<p>On 28 October 2024, USDC co\u2011issuer Circle, in partnership with Inco Network, <a href=\"https:\/\/forklog.com\/en\/news\/circle-unveils-privacy-solution-for-erc-20-tokens\">unveiled a solution<\/a> called the Confidential ERC\u201120 Framework to mask transactions. It allows existing tokens in EVM\u2011compatible networks to be <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-wrapped-token\">wrapped<\/a> into a confidential form with FHE support.<\/p>\n<p>The launch of the third phase of the Paillier testnet is slated for Q4 2024, with mainnet expected in the first half of 2025.<\/p>\n<p>According to <a href=\"https:\/\/cryptorank.io\/ico\/inco-network#funding-rounds\" target=\"_blank\" rel=\"noopener\" title=\"\">CryptoRank<\/a>, in February 2024 the company raised about $4.5m in a seed round led by 1kx, Circle and P2 Ventures (Polygon Ventures).<\/p>\n<p><strong>Mind Network<\/strong> is a restaking layer that uses FHE in AI networks and Proof\u2011of\u2011Stake (<a href=\"https:\/\/forklog.com\/en\/news\/proof-of-stake-how-it-works-and-why-it-is-so-popular\">PoS<\/a>). It can preserve validator anonymity during voting and reward distribution. Mind Network also plans to use FHE for confidential cross\u2011chain transactions based on CCIP from <a href=\"https:\/\/forklog.com\/en\/news\/what-is-chainlink-link\">Chainlink<\/a>.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"318\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network-1024x318.png\" alt=\"Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network\" class=\"wp-image-244307\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network-1024x318.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network-300x93.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network-768x239.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network-1536x477.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/Shema-restei-kinga-s-ispolzovaniem-FHE.-Dannye-Mind-Network.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Restaking scheme using FHE. Source: <a href=\"https:\/\/www.mindnetwork.xyz\/\">Mind Network<\/a>.<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-text-wrappers-cards single_card\">\n<h2 class=\"card_label\">What are FHE\u2019s drawbacks?<\/h2>\n<p>FHE is a promising and potentially in\u2011demand technology with many applications, but it also has weaknesses:<\/p>\n<ul class=\"wp-block-list\">\n<li><em>cost of use.<\/em> Encrypting and decrypting data with FHE is more computationally expensive than with other methods;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>implementation complexity.<\/em> At an early stage of development, FHE schemes are not yet standardised, making them hard for developers to use in dapps;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><em>data volume.<\/em> FHE generates large payloads, filling block space and potentially slowing networks and raising fees.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How homomorphic encryption is used in Web3.<\/p>\n","protected":false},"author":1,"featured_media":38045,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"2","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2115],"class_list":["post-38044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-technical-foundations"],"aioseo_notices":[],"amp_enabled":true,"views":"237","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/38044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=38044"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/38044\/revisions"}],"predecessor-version":[{"id":38046,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/38044\/revisions\/38046"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/38045"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=38044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=38044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=38044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}