{"id":21358,"date":"2023-09-05T12:01:56","date_gmt":"2023-09-05T12:01:56","guid":{"rendered":"https:\/\/zebpay.com\/au\/?p=21358"},"modified":"2023-09-05T12:01:57","modified_gmt":"2023-09-05T12:01:57","slug":"cybersecurity-and-cbdc-intersection","status":"publish","type":"post","link":"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection","title":{"rendered":"Safeguarding Digital Transactions: Exploring the Intersection of CBDCs and Cybersecurity"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Understanding_CBDCs\" title=\"Understanding CBDCs\">Understanding CBDCs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#What_Security_threats_can_CBDCs_possibly_face\" title=\"What Security threats can CBDCs possibly face?\">What Security threats can CBDCs possibly face?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Vital_Components_of_CBDC_Cybersecurity\" title=\"Vital Components of CBDC Cybersecurity\">Vital Components of CBDC Cybersecurity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Regulatory_Frameworks_and_Best_Practices\" title=\"Regulatory Frameworks and Best Practices\">Regulatory Frameworks and Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Building_Resilient_CBDC_Systems\" title=\"Building Resilient CBDC Systems\">Building Resilient CBDC Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Balancing_Security_and_Accessibility\" title=\"Balancing Security and Accessibility\">Balancing Security and Accessibility<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Future_Trends_and_Innovations\" title=\"Future Trends and Innovations\">Future Trends and Innovations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Summary_and_Conclusions\" title=\"Summary and Conclusions\">Summary and Conclusions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#Frequently_Asked_Questions_FAQs\" title=\"Frequently Asked Questions (FAQs)\">Frequently Asked Questions (FAQs)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#What_is_a_CBDC_and_how_does_it_differ_from_traditional_currency\" title=\"What is a CBDC, and how does it differ from traditional currency?\">What is a CBDC, and how does it differ from traditional currency?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#How_can_CBDCs_enhance_digital_transaction_security\" title=\"How can CBDCs enhance digital transaction security?\">How can CBDCs enhance digital transaction security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#What_are_the_major_cybersecurity_risks_associated_with_CBDCs\" title=\"What are the major cybersecurity risks associated with CBDCs?\">What are the major cybersecurity risks associated with CBDCs?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/zebpay.com\/au\/blog\/cybersecurity-and-cbdc-intersection\/#How_are_central_banks_addressing_the_challenges_of_CBDC_cybersecurity\" title=\"How are central banks addressing the challenges of CBDC cybersecurity?\">How are central banks addressing the challenges of CBDC cybersecurity?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<p>Central Bank Digital Currency, or CBDC, adoption has risen steadily over the past years. It has the potential to revolutionize cross-border payments, but a global framework and coordination between countries are vital for its wider adoption. Governments or countries have two significant challenges: first, how and which type of CBDCs to create, and second, a universal infrastructure for different CBDCs to interact. CBDCs can transform cross-border payments if countries can overcome these two challenges.<\/p>\n\n\n\n<p>Cybersecurity is the practice of protecting digital networks from hacks or unauthorized attacks. Businesses and individuals invest heavily in it and are looking for new ways to improve their cybersecurity to protect their digital assets and data from hackers. Cybersecurity has become essential for companies and governments, especially in a progressively digital-centered world. Cybersecurity is not just about protecting against data breaches but also about maintaining customer trust, preventing legal actions, and protecting reputations.<\/p>\n\n\n\n<p>Countries are increasingly adopting CBDCs into their mainstream economic and financial systems. These CBDCs are accumulating sensitive user data at an unprecedented rate. Sensitive data in the wrong hands can lead to breaches of private security details and the loss of money. CBDCs built without robust security protocols can lead to even more privacy and security threats in the financial system.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Understanding_CBDCs\"><\/span>Understanding CBDCs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>CBDCs are not pegged to a physical commodity and are digital forms of a country&#8217;s currency. They are issued by the central banks, which are responsible for setting monetary policies and supporting financial services. They can provide a secure infrastructure for online payments and remittances. <a href=\"https:\/\/zebpay.com\/au\/blog\/what-is-central-bank-digital-currency-cbdc\" target=\"_blank\" rel=\"noreferrer noopener\">CBDCs<\/a> can be integrated into existing payment systems and used for online and offline payments. As mentioned earlier, they can transform cross-border payments, a challenge for fiat money systems. Another vital advantage of CBDCs is that they can provide financial services to unbanked people.<\/p>\n\n\n\n<p>On the other hand, CBDCs can lead to increased surveillance of user payments, raising privacy concerns. There are risks associated with its integration with the current transaction systems. Additionally, the implementation of CBDCs could be a complex and costly process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Security_threats_can_CBDCs_possibly_face\"><\/span>What Security threats can CBDCs possibly face?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Online or cyber-attacks are malicious attacks by criminals attempting to access computer networks to steal sensitive information. Most global organizations are experiencing cyberattacks at an increasing rate each year. These online attacks are also increasingly sophisticated, and organizations must implement the latest and most upgraded security precautions and firewalls to keep their precious data safe.<\/p>\n\n\n\n<p>CBDCs increase the centralization of data as they store all the transaction data of citizens in a centralized data repository. This ledger can contain sensitive information like user digital account credentials, which can be financial data of the entire country. Phishing attacks have skyrocketed and are growing increasingly every year. Some phishing attacks download software to harvest user credentials, while others prompt users to enter sensitive information. Some criminals can also impersonate CBDC support teams and con users into allowing them to control their accounts or steal login credentials. Cybersecurity threats can be mitigated through technical design choices, but every CBDC design has trade-offs regarding security, performance, usability, and privacy.&nbsp;<\/p>\n\n\n\n<p>Read more: <a href=\"https:\/\/zebpay.com\/au\/blog\/pros-and-cons-of-central-bank-digital-currencies-cbdc\" target=\"_blank\" rel=\"noreferrer noopener\">Pros and Cons of CBDCs<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Vital_Components_of_CBDC_Cybersecurity\"><\/span>Vital Components of CBDC Cybersecurity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Robust encryption techniques are a vital component of CBDC cybersecurity. End-to-end encryption can ensure only involved parties can access transaction data, preventing unauthorized or illegal access. CBDC cybersecurity systems can implement anonymous transaction features, where users&#8217; transaction details are not linked to their identities. Digital transaction anonymity can be achieved through blind signatures and <a href=\"https:\/\/zebpay.com\/au\/blog\/what-are-zk-proofs\" target=\"_blank\" rel=\"noreferrer noopener\">zero-knowledge proofs<\/a>.<\/p>\n\n\n\n<p>Another vital component of CBDC cybersecurity is implementing robust AML\/KYC procedures to create digital wallets. Many countries are adopting a two-tier system of CBDCs where they exist in the current traditional system. Commercial banks can take on the responsibility of completing the AML and KYC processes. They link the unique identifier to the digital wallet and can enforce a robust AML\/KYC process.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Regulatory_Frameworks_and_Best_Practices\"><\/span>Regulatory Frameworks and Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"384\" src=\"https:\/\/zebpay.com\/au\/wp-content\/uploads\/2023\/09\/Regulatory-Frameworks-and-Best-Practices-1024x384.jpg\" alt=\"Regulatory Frameworks and Best Practices\" class=\"wp-image-21360\" srcset=\"https:\/\/zebpay.com\/au\/wp-content\/uploads\/2023\/09\/Regulatory-Frameworks-and-Best-Practices-1024x384.jpg 1024w, https:\/\/zebpay.com\/au\/wp-content\/uploads\/2023\/09\/Regulatory-Frameworks-and-Best-Practices-300x113.jpg 300w, https:\/\/zebpay.com\/au\/wp-content\/uploads\/2023\/09\/Regulatory-Frameworks-and-Best-Practices-768x288.jpg 768w, https:\/\/zebpay.com\/au\/wp-content\/uploads\/2023\/09\/Regulatory-Frameworks-and-Best-Practices.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>Countries take a fragmented approach to building their CBDCs, which can result in cross-border cybersecurity issues. Understandably, countries are first focusing on domestic use, but large economies can play a role in framing universal regulations to safeguard citizens from cross-border cybersecurity risks. Policymakers should develop rules where the CBDC is interoperable with its current financial infrastructure. These regulations can increase the resilience of the current economic infrastructure.<\/p>\n\n\n\n<p>Countries should coordinate and work with each other to form a universal CBDC regulation and standard setting to protect themselves from cyber threats, especially from cross-border payments. Countries should learn from past security threats to their existing systems and build robust security systems. They should engineer security features from the beginning for all CBDC use cases. Security features like continuous testing, identity authentication, and regular audits should be implemented to counter cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Building_Resilient_CBDC_Systems\"><\/span>Building Resilient CBDC Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Central banks must combat cyberattacks on an unprecedented scale when deploying CBDCs. So it is imperative to build resilient CBDC systems to protect against continuous cyber threats. Some strategies to build a resilient system include securing millions of endpoints connecting users, businesses, and banks to form a great web of online connections. Another method can involve providing intermediaries who can better anticipate fraud and other financial cyberattacks. Central banks should also develop a system to monitor global security threats in real-time, quickly respond to threats and develop plans for recovery after experiencing a cyberattack.<\/p>\n\n\n\n<p>CBDCs must implement robust security measures to defend themselves from unauthorized or illegal access, online threats, and hacks. They must deploy security measures like robust encryption protocols, secure key management, and multi-factor authentication. CBDC infrastructures should be carefully planned to ensure resiliency against network disruptions or system failures. They can also implement transaction monitoring mechanisms to prevent illicit activities by criminals. They should also go through periodic audits to support regulatory compliance.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Balancing_Security_and_Accessibility\"><\/span>Balancing Security and Accessibility<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The user interface of CBDC applications should be easy to use to complete a transaction. Central banks should incorporate features that facilitate easy accessibility, inclusion, and simplicity when designing the user interface of CBDC applications. They should also develop CBDC systems compatible with various devices, such as smartphones and other digital platforms, to ensure accessibility across different user segments. CBDC can provide financial services to the unbanked population by making its services accessible through a simple internet connection.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Future_Trends_and_Innovations\"><\/span>Future Trends and Innovations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Governments are continuously exploring CBDCs&#8217; benefits to their financial systems and economies. They are exploring the adoption of CBDCs to deliver monetary policies, drive digital innovation, and increase financial inclusion. As technology evolves, new cyberattacks will emerge, and online attacks will become even more complex. Countries should have robust and up-to-date security protocols to mitigate these online attacks. Developers are working to develop new security systems to mitigate quantum security attacks. Recently, countries have given importance to data protection and are continuously upgrading encryption systems to withstand evolving security attacks.<\/p>\n\n\n\n<p>Read more: <a href=\"https:\/\/zebpay.com\/au\/blog\/differences-between-cbdc-and-crypto\" target=\"_blank\" rel=\"noreferrer noopener\">CBDC vs Crypto<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Summary_and_Conclusions\"><\/span>Summary and Conclusions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Central banks are exploring the best and most secure methods to operate in an increasingly digital world. CBDC adoption has many benefits and offers new ways of working for financial institutions and other participants in the economy. Central banks should build robust CBDC systems that can withstand various evolving cyberattacks. They should also develop a risk management system and security-related policies. They need to replicate the integrity and technical resilience of the existing financial system to gain public confidence for more adoption.<\/p>\n\n\n\n<p>To stay up to date with the latest crypto news, visit <a href=\"https:\/\/zebpay.com\/au\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">ZebPay blogs<\/a>. Click on the button below to trade on ZebPay.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color wp-element-button\" href=\"https:\/\/connect.zebpay.com\/account\/login?returnUrl=%2Fconnect%2Fauthorize%2Fcallback%3Fclient_id%3Deee7baaa-9d6c-43f1-9eb6-8174f62cd244%26redirect_uri%3Dhttps%253A%252F%252Fzebpay.com%252Fapp%26response_type%3Did_token%2520token%26scope%3Dopenid%2520profile%2520wallet%253Atransactions%253Aread%2520trade%253Aread%2520trade%253Acreate%2520wallet%253Aaddress%253Acreate%2520wallet%253Aaddress%253Aread%2520wallet%253Atransactions%253Asend%26state%3D583880462e8047298282bdacb6577d37%26nonce%3D6568ed59c8cf4e5d9e09c2f34dc8d711\" target=\"_blank\" rel=\"noreferrer noopener\">Trade now<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions_FAQs\"><\/span>Frequently Asked Questions (FAQs)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1693899265749\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><span class=\"ez-toc-section\" id=\"What_is_a_CBDC_and_how_does_it_differ_from_traditional_currency\"><\/span>What is a CBDC, and how does it differ from traditional currency?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>CBDC is a digital form of a country&#8217;s traditional currency and is not pegged to a physical commodity.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1693899280531\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><span class=\"ez-toc-section\" id=\"How_can_CBDCs_enhance_digital_transaction_security\"><\/span>How can CBDCs enhance digital transaction security?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>CBDCs can enhance digital transaction security through features like multi-factor authentication and end-to-end encryption.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1693899306634\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><span class=\"ez-toc-section\" id=\"What_are_the_major_cybersecurity_risks_associated_with_CBDCs\"><\/span>What are the major cybersecurity risks associated with CBDCs?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>The major cybersecurity risks with CBDCs is that most public data is saved in a central repository which can be a prime target for cybercriminals.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1693899319285\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><span class=\"ez-toc-section\" id=\"How_are_central_banks_addressing_the_challenges_of_CBDC_cybersecurity\"><\/span>How are central banks addressing the challenges of CBDC cybersecurity?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Central banks are building robust CBDC infrastructure while implementing strong security measures like end-to-end encryption.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Central Bank Digital Currency, or CBDC, adoption has risen steadily over the past years. It has the potential to revolutionize cross-border payments, but a global framework and coordination between countries are vital for its wider adoption. Governments or countries have two significant challenges: first, how and which type of CBDCs to create, and second, a [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":21361,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[16],"class_list":["post-21358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto","tag-crypto"],"acf":[],"_links":{"self":[{"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/posts\/21358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/comments?post=21358"}],"version-history":[{"count":2,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/posts\/21358\/revisions"}],"predecessor-version":[{"id":21363,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/posts\/21358\/revisions\/21363"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/media\/21361"}],"wp:attachment":[{"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/media?parent=21358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/categories?post=21358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zebpay.com\/au\/wp-json\/wp\/v2\/tags?post=21358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}