{"id":237345,"date":"2024-11-23T07:22:02","date_gmt":"2024-11-23T07:22:02","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/?p=237345"},"modified":"2024-11-24T11:13:43","modified_gmt":"2024-11-24T11:13:43","slug":"passkey-vs-2fa","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/","title":{"rendered":"Passkey Vs 2FA &#8211; 7 Key Differences You Should Know"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Are you still relying on passwords for your online security, or have you considered the game-changing alternatives like passkey vs 2FA? While many still cling to traditional methods, understanding the crucial differences between these authentication strategies could redefine how you protect your digital identity. Passkeys eliminate passwords entirely, while 2FA still depends on them, which may expose you to vulnerabilities.<\/p>\n<p>With passkeys enabling a seamless login experience through biometric authentication and 2FA requiring a secondary verification step that complicates access, the choice becomes even more significant. Additionally, passkeys utilize public-key cryptography, drastically diminishing risks from phishing and replay attacks.<\/p>\n<p>As the adoption rate of passkeys continues to climb, it&#8217;s clear that a shift towards more secure methods is underway. Curious to learn more about how these options stack up against each other and what it means for your online safety? There&#8217;s a lot to explore!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Key_Takeaways\" >Key Takeaways<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Presence_of_Passwords\" >Presence of Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Authentication_Process\" >Authentication Process<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Security_Against_Attacks\" >Security Against Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#User_Convenience\" >User Convenience<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Technical_Implementation\" >Technical Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Industry_Adoption_and_Support\" >Industry Adoption and Support<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Future_Outlook\" >Future Outlook<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#How_Do_Passkeys_Impact_User_Privacy_Compared_to_2FA\" >How Do Passkeys Impact User Privacy Compared to 2FA?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Are_Passkeys_Compatible_With_All_Devices_and_Platforms\" >Are Passkeys Compatible With All Devices and Platforms?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#What_Happens_if_I_Lose_My_Device_With_Passkeys\" >What Happens if I Lose My Device With Passkeys?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Can_Passkeys_Be_Used_for_Offline_Authentication\" >Can Passkeys Be Used for Offline Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#How_Does_User_Education_Affect_Passkey_Adoption\" >How Does User Education Affect Passkey Adoption?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/passkey-vs-2fa\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Takeaways\"><\/span>Key Takeaways<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Passkeys eliminate passwords entirely, reducing risks associated with password-related vulnerabilities, while 2FA still relies on traditional passwords.<\/li>\n<li>Passkeys utilize biometric authentication and public-key cryptography, providing a higher level of security compared to 2FA&#8217;s reliance on codes sent via SMS or email.<\/li>\n<li>The login process with passkeys is streamlined and user-friendly, whereas 2FA involves additional steps that can complicate user experience.<\/li>\n<li>Passkeys sync across devices, ensuring consistent access, while 2FA may require multiple devices or apps for code retrieval.<\/li>\n<li>Growing industry support for passkeys indicates a shift toward more secure, user-friendly authentication methods, with 2FA potentially declining in usage.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Presence_of_Passwords\"><\/span>Presence of Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When comparing the presence of passwords in passkeys and 2FA, you&#8217;ll notice a stark difference. Passkeys eliminate the need for passwords altogether, making your authentication process more secure. Without passwords, you&#8217;re less susceptible to phishing attacks and data breaches. Additionally, <a href=\"https:\/\/www.keepersecurity.com\/blog\/2024\/06\/18\/passkeys-vs-two-factor-authentication-2fa-whats-the-difference\/\" target=\"_blank\" rel=\"nofollow noopener\">passkeys are phishing-resistant<\/a> by design, further enhancing your security.<\/p>\n<p>In contrast, 2FA relies on a password as its first factor, leaving you vulnerable to password-related threats, even with an extra security layer. With 2FA, your passwords must be stored on servers, which can pose a risk if those servers are compromised. You also need to remember and enter your passwords correctly for the system to work, adding friction to your user experience. Furthermore, the use of <a href=\"https:\/\/blog.1password.com\/passkeys-2fa-totp-differences\/\" target=\"_blank\" rel=\"nofollow noopener\">traditional passwords<\/a> in 2FA can lead to replay attacks if they are stolen.<\/p>\n<p>On the other hand, passkeys use biometric authentication or device passcodes, streamlining the login process and enhancing security without the hassle of remembering passwords.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Process\"><\/span>Authentication Process<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In the domain of digital security, the authentication process plays an essential role in safeguarding your accounts. Understanding the differences between passkeys and two-factor authentication (2FA) can enhance your user experience considerably.<\/p>\n<p>Here&#8217;s how they differ in their authentication processes:<\/p>\n<ol>\n<li><strong>Single vs. Multiple Steps<\/strong>: Passkeys streamline verification into a single action, while 2FA adds an extra step beyond your password.<\/li>\n<li><strong>User Interaction<\/strong>: With passkeys, you authenticate using your device&#8217;s locking mechanism, like biometrics or a PIN, without needing additional actions like checking emails. This method of authentication offers the advantage of <a href=\"https:\/\/www.passkeys.com\/passkey-vs-mfa\" target=\"_blank\" rel=\"nofollow noopener\">enhanced security<\/a> by reducing user friction.<\/li>\n<li><strong>Verification Factors<\/strong>: Passkeys utilize possession-based factors (your device) and inherence-based factors (biometrics), whereas 2FA often relies on knowledge-based factors (passwords) plus a second factor, such as a one-time code.<\/li>\n<li><strong>Automation<\/strong>: Passkey authentication is automated, eliminating the need for manual code entry, which enhances security and simplifies the process.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Security_Against_Attacks\"><\/span>Security Against Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Understanding how passkeys and 2FA protect against attacks is essential for enhancing your digital security.<\/p>\n<p>Passkey security stands out as it eliminates passwords, making your accounts far less vulnerable to password-related attacks. Unlike 2-factor authentication, which still relies on potentially compromised passwords, passkeys use public-key cryptography, guaranteeing that your private key never leaves your device. This greatly reduces the risk of unauthorized access and phishing-resistant MFA enhances your protection against social engineering attacks.<\/p>\n<p>Moreover, passkeys generate unique, signed challenges for each authentication attempt, effectively preventing replay attacks. Traditional passwords and some 2FA methods are susceptible to these attacks, but passkeys guarantee that authentication data can&#8217;t be reused.<\/p>\n<p>While time-based one-time passwords (TOTP) provide some protection, they can still be intercepted, leaving you vulnerable.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"User_Convenience\"><\/span>User Convenience<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>User convenience plays an essential role in digital security, and passkeys greatly enhance this aspect. By streamlining the login process and integrating seamlessly across devices, passkeys provide a superior user experience compared to traditional 2FA methods. Here&#8217;s how they stand out:<\/p>\n<ol>\n<li><strong>Simplified Login Process<\/strong>: Passkeys eliminate the need for passwords or extra codes, reducing the time and effort required to log in. There&#8217;s no need to check emails or SMS for codes, minimizing user friction.<\/li>\n<li><strong>Convenience Across Devices<\/strong>: Passkeys sync within large ecosystems, ensuring a uniform login experience regardless of the device you&#8217;re using. You won&#8217;t need to manage multiple 2FA methods.<\/li>\n<li><strong>Biometric Authentication<\/strong>: Many passkeys utilize biometric authentication, like Face ID or Touch ID, making login faster and more user-friendly. You won&#8217;t have to remember passwords, reducing user error.<\/li>\n<li><strong>Password Manager Compatibility<\/strong>: Passkeys can be managed through password managers, simplifying the changeover from traditional passwords. They automatically suggest passkeys, enhancing overall convenience.<\/li>\n<\/ol>\n<p>With these features, passkeys not only provide an additional layer of security but also improve recovery options and access recovery mechanisms, making your digital life easier.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Technical_Implementation\"><\/span>Technical Implementation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Passkeys and 2FA differ considerably in their technical implementation, influencing how users authenticate themselves online. A passkey utilizes passwordless authentication, relying on biometric data or device passcodes, while 2FA enhances security by adding a second factor to the traditional username and password login.<\/p>\n<p>With passkeys, public-key cryptography plays a vital role; the private key remains secure on your device, and a public key is stored by the service, making it resistant to phishing attacks.<\/p>\n<p>In contrast, 2FA methods often involve generating one-time codes via SMS, email, or authenticator apps. While these add a layer of security, they can be vulnerable to interception and phishing attacks. The <a href=\"https:\/\/logmeonce.com\/schedule-login\/\">cryptographic principles underlying passkeys utilize asymmetric encryption<\/a>, ensuring that replay attacks are nearly impossible.<\/p>\n<p>Integration and compatibility are also notable; passkeys work seamlessly across devices using FIDO2 and the WebAuthn API, simplifying the login process.<\/p>\n<p>On the other hand, 2FA can introduce friction with additional steps and devices needed for authentication. Overall, passkeys offer a more streamlined and secure authentication mechanism compared to traditional two-factor authentication methods.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Industry_Adoption_and_Support\"><\/span>Industry Adoption and Support<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The growing momentum behind passkey adoption reflects a notable shift in how digital authentication is approached across various industries. Major players like Google, Microsoft, and Apple are leading the charge, with over 100 websites now supporting passkey authentication. E-commerce sites, in particular, have embraced this technology for enhanced digital security.<\/p>\n<p>Here are some key aspects of industry adoption and support:<\/p>\n<ol>\n<li><strong>Wide Adoption<\/strong>: 20% of the world&#8217;s top 100 websites now support passkeys, including Amazon and PayPal.<\/li>\n<li><strong>User Awareness<\/strong>: Awareness among consumers has risen to 57%, with 62% of those aware choosing to adopt passkeys.<\/li>\n<li><strong>E-commerce Dominance<\/strong>: E-commerce sites account for 42% of passkey usage, noticeably reducing password resets and improving security measures.<\/li>\n<li><strong>Sector Growth<\/strong>: Financial services and social media apps are quickly integrating passkey protocols, aiding in the battle against online scams.<\/li>\n<\/ol>\n<p>The increase in user awareness and the rapid adoption across sectors highlight the importance of passkeys in reducing authentication friction and enhancing overall security.<\/p>\n<p>As you navigate these platforms, knowing about passkeys can streamline your experience and bolster your digital security.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Future_Outlook\"><\/span>Future Outlook<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With the rapid adoption of passkeys across various industries, the future looks promising for digital authentication. As these <a href=\"https:\/\/logmeonce.com\/how-logmeonce-works\/\">phishing-resistant solutions gain traction<\/a>, you can expect significant advancements in security measures and user experience.<\/p>\n<p>Passkeys, built on the FIDO2 specification, leverage public-key cryptography to enhance data protection and minimize vulnerabilities common in two-factor authentication.<\/p>\n<p>Technological advancements are improving biometric authentication, making passkeys the fastest and most seamless login method available. You&#8217;ll likely find that the integration with password managers simplifies the process, as users won&#8217;t need to manually enter codes or switch between apps. This reduction in friction can drive widespread adoption.<\/p>\n<p>Moreover, passkeys offer compliance advantages by aligning with evolving security standards, reducing the risk of non-compliance due to password-related vulnerabilities. Their unique nature\u2014generated for specific websites\u2014further decreases the attack surface, reinforcing security.<\/p>\n<p>As organizations embrace zero-trust architectures, the role of passkeys will become increasingly crucial, ensuring robust user authentication while meeting stringent data protection regulations.<\/p>\n<p>Fundamentally, the future of digital authentication is leaning toward passkeys, promising a safer and more efficient experience for users everywhere.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_Passkeys_Impact_User_Privacy_Compared_to_2FA\"><\/span>How Do Passkeys Impact User Privacy Compared to 2FA?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Passkeys enhance your privacy by keeping your authentication information on your device, ensuring it never leaves your control. Unlike 2FA, which may involve sharing codes, passkeys minimize exposure to potential breaches and phishing attacks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Passkeys_Compatible_With_All_Devices_and_Platforms\"><\/span>Are Passkeys Compatible With All Devices and Platforms?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Passkeys aren&#8217;t compatible with all devices and platforms. You&#8217;ll need devices that support biometric authentication and the FIDO2 standard. Check if your favorite apps and websites have adopted passkeys for seamless use.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_I_Lose_My_Device_With_Passkeys\"><\/span>What Happens if I Lose My Device With Passkeys?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you lose your device with passkeys, you&#8217;ll likely lose access to your accounts. You&#8217;ll need to follow the recovery process set by your service provider, which can be time-consuming and may require additional verification.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Passkeys_Be_Used_for_Offline_Authentication\"><\/span>Can Passkeys Be Used for Offline Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, you can use passkeys for offline authentication. Your device stores the private key, allowing you to authenticate without an internet connection. Just access your device with biometrics or a PIN for secure access.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_User_Education_Affect_Passkey_Adoption\"><\/span>How Does User Education Affect Passkey Adoption?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>User education considerably boosts passkey adoption. When you understand the benefits, security features, and ease of use, you&#8217;re more likely to embrace passkeys. Clear explanations and demonstrations help you feel comfortable and confident using them.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In conclusion, understanding the differences between passkeys and two-factor authentication (2FA) is essential for enhancing your online security. While both methods aim to protect your accounts, passkeys offer a more streamlined and user-friendly experience. They reduce reliance on passwords, making them less vulnerable to attacks. As technology evolves, adopting passkeys could be your best bet for a secure future.<\/p>\n<p>To take control of your online security, sign up and create a <a href=\"https:\/\/www.logmeonce.com\" target=\"_blank\" rel=\"noopener\">FREE account at LogMeOnce.com<\/a> to better manage your Passkeys. Stay informed and choose the method that best fits your needs for safer online interactions.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Just how do passkeys outperform 2FA in security and convenience? Discover the essential differences that could change your approach to online safety.<\/p>\n","protected":false},"author":5,"featured_media":237344,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19736],"tags":[1149,35477,7115],"class_list":["post-237345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-single-sign-on","tag-2fa","tag-key-differences","tag-passkey"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/237345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=237345"}],"version-history":[{"count":3,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/237345\/revisions"}],"predecessor-version":[{"id":237751,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/237345\/revisions\/237751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/237344"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=237345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=237345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=237345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}