{"id":26388,"date":"2022-04-19T15:22:00","date_gmt":"2022-04-19T13:22:00","guid":{"rendered":"https:\/\/perseus.de\/brute-force-attack\/"},"modified":"2026-03-30T09:30:24","modified_gmt":"2026-03-30T07:30:24","slug":"brute-force-attack","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/brute-force-attack\/","title":{"rendered":"Brute Force Attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26388\" class=\"elementor elementor-26388 elementor-22148\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8a073f8 e-con-full e-flex e-con e-child\" data-id=\"8a073f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Brute Force Attack\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3afec575 e-flex e-con-boxed e-con e-parent\" data-id=\"3afec575\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1f2850b8 e-con-full e-flex e-con e-child\" data-id=\"1f2850b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>&#8220;Brute force&#8221; translates as &#8220;brute force&#8221;. In IT, this brute force corresponds to a less sophisticated approach: indiscriminate trial and error. In a &#8220;brute force&#8221; attack, an attempt is made to guess passwords or keys by calculating and trying out as many character combinations as possible in the shortest possible time.  <\/p><h4> <\/h4><h4>What does &#8220;brute force&#8221; attack mean in detail?<\/h4><p>&#8220;Brute force&#8221; attacks are carried out automatically. This allows you to calculate and try out a large number of character combinations in a very short time: Due to high computing power, up to 2 billion possible passwords can be calculated per second. A standard computer can calculate about 1 billion possible combinations per second. The more complex a password is, the more time it takes to calculate a brute force attack and the greater the chance that this attack will fail. The more different types of characters are used and the longer the password, the more complex it is.    <\/p><p>Starting from a calculator that calculates 1 billion possible combinations per second:<\/p><ul><li>An 8-character password consisting only of numbers (e.g. a date of birth) can be calculated in 0.1 seconds at the latest. With 9 characters: 1 second. <\/li><li>An 8-character password consisting of uppercase and lowercase letters can be guessed in 15 hours at the latest. With 9 characters: 33 days. <\/li><li>An 8-character password made up of numbers, uppercase and lowercase letters, and special characters takes up to 84 days of computing time. With 9 characters: 22 years. <\/li><li>Many brute force attacks also use lists of common passwords (e.g., 123456, admin)<\/li><\/ul><p> <\/p><p>Please keep in mind: It is unlikely, but possible, that your password happens to be one of the first calculated possibilities in a brute force attack. The more complex your password is, the less likely it is. <\/p><h4> <\/h4><h4>Where do I encounter the topic of &#8220;brute force&#8221; in my everyday work?<\/h4><p>In principle, you will encounter it with every password you use. Pay attention to how they are put together. The more complex they are, the better protected you and your company are from a brute force attack.  <\/p><h4> <\/h4><h4>What can I do to improve my security?<\/h4><ul><li>Use strong passwords. The longer and the more different types of characters (numbers, uppercase letters, lowercase letters, special characters), the better. <\/li><li>Replace easy-to-guess passwords (123456, admin, ilovexxx, etc.) with complex passwords<\/li><li>Mix multiple types of characters wherever you can (numbers, uppercase letters, lowercase letters, special characters).<\/li><li>Don&#8217;t be brief. The longer your password, the better. <\/li><li>If necessary, use a password manager to manage these complex passwords<\/li><li>Wherever possible, use two-factor authentication offered. As a result, cybercriminals encounter another hurdle even after calculating your password. <\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-152c32e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"152c32e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Brute Force Attack &#8220;Brute force&#8221; translates as &#8220;brute force&#8221;. In IT, this brute force corresponds to a less sophisticated approach: indiscriminate trial and error. In a &#8220;brute force&#8221; attack, an attempt is made to guess passwords or keys by calculating and trying out as many character combinations as possible in the shortest possible time. What [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"tags":[],"class_list":["post-26388","post","type-post","status-publish","format-standard","hentry","category-cyber-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Brute Force Attack - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/brute-force-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brute Force Attack - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Brute Force Attack &#8220;Brute force&#8221; translates as &#8220;brute force&#8221;. In IT, this brute force corresponds to a less sophisticated approach: indiscriminate trial and error. In a &#8220;brute force&#8221; attack, an attempt is made to guess passwords or keys by calculating and trying out as many character combinations as possible in the shortest possible time. What [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/brute-force-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:30:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Brute Force Attack\",\"datePublished\":\"2022-04-19T13:22:00+00:00\",\"dateModified\":\"2026-03-30T07:30:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/\"},\"wordCount\":433,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyber Glossary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/\",\"name\":\"Brute Force Attack - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:22:00+00:00\",\"dateModified\":\"2026-03-30T07:30:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/brute-force-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brute Force Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brute Force Attack - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/brute-force-attack\/","og_locale":"en_US","og_type":"article","og_title":"Brute Force Attack - Perseus Technologies","og_description":"Brute Force Attack &#8220;Brute force&#8221; translates as &#8220;brute force&#8221;. In IT, this brute force corresponds to a less sophisticated approach: indiscriminate trial and error. In a &#8220;brute force&#8221; attack, an attempt is made to guess passwords or keys by calculating and trying out as many character combinations as possible in the shortest possible time. What [&hellip;]","og_url":"https:\/\/perseus.de\/en\/brute-force-attack\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:22:00+00:00","article_modified_time":"2026-03-30T07:30:24+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/brute-force-attack\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Brute Force Attack","datePublished":"2022-04-19T13:22:00+00:00","dateModified":"2026-03-30T07:30:24+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/brute-force-attack\/"},"wordCount":433,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyber Glossary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/brute-force-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/brute-force-attack\/","url":"https:\/\/perseus.de\/en\/brute-force-attack\/","name":"Brute Force Attack - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:22:00+00:00","dateModified":"2026-03-30T07:30:24+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/brute-force-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/brute-force-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Brute Force Attack"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26388"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26388\/revisions"}],"predecessor-version":[{"id":26389,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26388\/revisions\/26389"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}