{"id":52935,"date":"2025-10-01T08:23:07","date_gmt":"2025-10-01T05:23:07","guid":{"rendered":"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/"},"modified":"2025-10-01T08:23:08","modified_gmt":"2025-10-01T05:23:08","slug":"why-salt-matters-in-hosting-and-website-security","status":"publish","type":"post","link":"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/","title":{"rendered":"Why Salt Matters in Hosting and Website Security"},"content":{"rendered":"<p><\/p>\n<article><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#What_a_salt_is_and_why_it_matters_for_websites\" >What a salt is and why it matters for websites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#How_salts_protect_against_common_attacks\" >How salts protect against common attacks<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Why_salts_arent_the_whole_story\" >Why salts aren&#8217;t the whole story<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Best_practices_for_generating_storing_and_using_salts\" >Best practices for generating, storing, and using salts<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Practical_checklist\" >Practical checklist<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Salts_and_hosting_operational_considerations\" >Salts and hosting: operational considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Using_salts_beyond_password_storage\" >Using salts beyond password storage<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Common_mistakes_to_avoid\" >Common mistakes to avoid<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#How_to_recover_and_respond_if_credentials_leak\" >How to recover and respond if credentials leak<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Summary\" >Summary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#FAQs\" >FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Do_salts_need_to_be_secret\" >Do salts need to be secret?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#How_long_should_a_salt_be\" >How long should a salt be?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Whats_the_difference_between_a_salt_and_a_pepper\" >What&#8217;s the difference between a salt and a pepper?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Should_I_implement_salting_myself_or_use_a_library\" >Should I implement salting myself or use a library?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/infinitydomainhosting.com\/kb\/why-salt-matters-in-hosting-and-website-security\/#Can_salts_protect_session_tokens_or_API_keys\" >Can salts protect session tokens or API keys?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_a_salt_is_and_why_it_matters_for_websites\"><\/span>What a salt is and why it matters for websites<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      <a href=\"https:\/\/infinitydomainhosting.com\/kb\/how-to-configure-2fa-step-by-step\/\">A<\/a> salt is a random value added to a password (or other secret input) before hashing. It sounds simple, but that small change dramatically alters the security profile of stored credentials. When attackers obtain a hashed password database, unsalted hashes let them use precomputed tables or compare identical hashes across accounts to find weak or reused passwords. Salting makes each hash unique and forces attackers to do work per-password instead of looking up matches in bulk.\n    <\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_salts_protect_against_common_attacks\"><\/span>How salts protect against common attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      The two classic problems salts address are rainbow-table attacks and identical-hash detection. <a href=\"https:\/\/hostadvice.com\/how-to\/web-hosting\/how-to-create-rainbow-tables-in-kali\/\" target=\"_blank\" rel=\"noopener\">rainbow tables<\/a> are large, precomputed lists of hash outputs for common passwords; without salts an attacker can search those tables to recover many plaintext passwords quickly. If each password is salted with a different random value, an attacker must compute cracking efforts individually for every account, which raises the cost dramatically. Salts also prevent two users who chose the same password from producing the same stored value, hiding password reuse and making mass compromise harder.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Why_salts_arent_the_whole_story\"><\/span>Why salts aren&#8217;t the whole story<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>\n      Salts improve resilience but do not replace slow hashing algorithms and other defensive measures. A proper key derivation function like bcrypt, scrypt, or Argon2 uses a salt and also deliberately slows hashing so that brute-force attempts become expensive. Salts don&#8217;t need to be secret,if an attacker gets your database they will probably get the salts too,so you must combine salts with work factors, secure algorithms, and good <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> practices to reduce overall risk.\n    <\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_practices_for_generating_storing_and_using_salts\"><\/span>Best practices for generating, storing, and using salts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      Generating salts correctly is critical. Use a cryptographically secure random number generator provided by your platform rather than predictable inputs like usernames, timestamps, or simple counters. Ideally, produce at least 16 bytes (128 bits) of randomness; many implementations use 128\u2013256 bits to be safe. Store the salt together with the hash so you can verify passwords, typically in the same table row as the hashed password or in a clearly associated column.\n    <\/p>\n<p><\/p>\n<p>\n      For implementation, prefer modern password-hashing libraries that handle salt generation and storage for you. For example, bcrypt, scrypt, and Argon2 automatically generate and embed a salt in their output format. If you use PBKDF2 or a custom scheme, make sure you explicitly generate a unique random salt per password, record the salt and iteration count, and choose sufficiently large iteration\/work values.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Practical_checklist\"><\/span>Practical checklist<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<ul><\/p>\n<li>Generate a unique cryptographically secure random salt for each password.<\/li>\n<p><\/p>\n<li>Use a slow KDF (bcrypt, scrypt, Argon2, or high-iteration PBKDF2) with a configurable work factor.<\/li>\n<p><\/p>\n<li>Store salt, hash, and algorithm parameters together so verification is reproducible.<\/li>\n<p><\/p>\n<li>Avoid deterministic or user-derived salts like usernames or user IDs.<\/li>\n<p><\/p>\n<li>Rotate policies (work factor) over time; increase cost as hardware improves.<\/li>\n<p>\n    <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Salts_and_hosting_operational_considerations\"><\/span>Salts and <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a>: operational considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      Salt strategy touches <a href=\"https:\/\/hostadvice.com\/\" target=\"_blank\" rel=\"noopener\">hosting<\/a> because how you manage databases, backups, and secrets determines whether salts and related secrets remain secure. Since salts themselves are not secret, they can safely be stored in the database. However, you must protect the systems that hold the hashed values and salts from unauthorized access. Control access with strong credentials, network segmentation, and least-privilege policies. Backups that include hashes and salts must be protected with encryption and access controls just like the live database.\n    <\/p>\n<p><\/p>\n<p>\n      For additional protection, some teams choose to use a pepper in addition to a salt. A pepper is a server-held secret stored outside the database,often in an environment variable, secrets manager, or HSM,and combined with the password before hashing. Because peppers are secret, they raise the bar if the database is leaked, but they add operational complexity: you must protect, rotate, and backup the pepper securely. Treat peppers as real secrets; if they\u2019re stored on the same <a href=\"https:\/\/www.a2hosting.com\/\" target=\"_blank\" rel=\"noopener\">host<\/a> or in the same backups as the database, they stop adding meaningful protection.\n    <\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Using_salts_beyond_password_storage\"><\/span>Using salts beyond password storage<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      Salts have useful applications outside simple password hashing. Any time you derive keys from predictable inputs, adding a salt prevents attackers from precomputing results. Examples include API key derivation, password-based encryption, and token generation. For session IDs and CSRF tokens, the right approach is to use strong randomness directly rather than relying on deterministic salted hashes; a salt can be part of the input where you need to combine a secret and an identifier, but for tokens prioritize unpredictability and short lifetimes.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Common_mistakes_to_avoid\"><\/span>Common mistakes to avoid<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<ul><\/p>\n<li>Reusing the same salt for all passwords,this defeats the main benefit of per-user uniqueness.<\/li>\n<p><\/p>\n<li>Using short or predictable salts (e.g., incremental IDs, timestamps).<\/li>\n<p><\/p>\n<li>Relying solely on salts without employing slow hashing algorithms.<\/li>\n<p><\/p>\n<li>Storing a pepper in the same place as the database backups.<\/li>\n<p>\n    <\/ul>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_recover_and_respond_if_credentials_leak\"><\/span>How to recover and respond if credentials leak<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      If a breach occurs, salts can slow attackers but won&#8217;t stop determined adversaries if they also have the hashed values and sufficient compute power. Response should include forcing password resets, increasing logging and monitoring, and hardening hosting controls. Consider accelerating a <a href=\"https:\/\/infinitydomainhosting.com\/index.php?rp=\/knowledgebase\/208\/How-to-migrate-your-website-to-a-new-hosting-provider.html\">migration<\/a> to a stronger hash\/work factor for all stored passwords: when a user next authenticates, re-hash their password with the new parameters and a fresh salt. If you used a pepper correctly, rotating it after a breach is also wise, but do not rely on rotation alone,assume the attacker had the hashed salts and address the breach comprehensively.\n    <\/p>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<p>\n      Salts are a simple but essential tool in the web security toolbox. They break precomputed attacks and hide password reuse by ensuring each stored password hash is unique. To get the protection salts offer, generate them with a cryptographic random generator, use a unique salt per password, combine them with slow hashing algorithms, and protect <a href=\"https:\/\/hostadvice.com\/tools\/whois\/\" target=\"_blank\" rel=\"noopener\">the hosting<\/a> environment and backups. Consider a pepper for extra defense if you have robust secret management, but never treat salts as a complete substitute for strong algorithms and good operational security.\n    <\/p>\n<p><!--KB_CAT_BLOCK--><\/p>\n<figure class=\"kb-cat-placeholder\" style=\"margin:1.75rem 0;display:block;\">\n<div class=\"kb-cat-wrap\" style=\"position:relative; overflow:hidden; border-radius:12px; box-shadow:0 10px 36px rgba(0,0,0,0.14);\"><img src=\"https:\/\/infinitydomainhosting.com\/kb\/assets\/img\/cat-default.webp\" alt=\"Why Salt Matters in Hosting and Website Security\" loading=\"lazy\" decoding=\"async\" style=\"max-width:100%;height:auto;display:block;border-radius:12px;box-shadow:0 8px 28px rgba(0,0,0,0.12);\" \/><\/p>\n<div class=\"kb-cat-gradient\" style=\"position:absolute; inset:0; background:linear-gradient(180deg, rgba(9,23,60,0.66) 0%, rgba(11,30,70,0.45) 40%, rgba(11,30,70,0.15) 100%);\"><\/div>\n<div class=\"kb-cat-textbox\" style=\"position:absolute; inset:auto 5% 7% 5%; color:#fff; text-align:center; display:flex; flex-direction:column; gap:.4rem; align-items:center; justify-content:flex-end;\">\n<div class=\"kb-cat-title\" style=\"font-weight:800; font-size:clamp(20px,3.6vw,34px); line-height:1.2; letter-spacing:.2px; text-shadow:0 1px 2px rgba(0,0,0,.35);\">Why Salt Matters in Hosting and Website Security<\/div>\n<div class=\"kb-cat-meta\" style=\"opacity:1; font-weight:600; font-size:clamp(13px,2.6vw,16px); line-height:1.45; text-shadow:0 1px 2px rgba(0,0,0,.28);\">What a salt is and why it matters for websites A salt is a random value added to a password (or other secret input) before hashing. It sounds simple, but\u2026<\/div>\n<div class=\"kb-cat-desc\" style=\"opacity:1; font-weight:500; font-size:clamp(12px,2.4vw,15px); line-height:1.5; max-width:900px; text-wrap:balance; text-shadow:0 1px 2px rgba(0,0,0,.25);\">AI<\/div>\n<\/div>\n<\/div>\n<\/figure>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Do_salts_need_to_be_secret\"><\/span>Do salts need to be secret?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>\n      No. Salts do not need to be secret,security comes from their uniqueness and randomness, not from secrecy. Because salts are stored with hashes, assume an attacker can see them and design your hashing and hosting strategy accordingly.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_long_should_a_salt_be\"><\/span>How long should a salt be?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>\n      Aim for at least 16 bytes (128 bits) of randomness; using 128\u2013256 bits is common and safe. The key is sufficient entropy so salts cannot be guessed or brute-forced easily.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Whats_the_difference_between_a_salt_and_a_pepper\"><\/span>What&#8217;s the difference between a salt and a pepper?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>\n      A salt is per-password, random, and usually stored with the hash. A pepper is a secret value kept out of the database (for example, in an HSM or secrets manager) and combined with the password before hashing. A pepper can provide extra security if <a href=\"https:\/\/www.a2hosting.com\/wordpress-hosting\/managed\/\" target=\"_blank\" rel=\"noopener\">managed<\/a> correctly, but it adds operational complexity.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Should_I_implement_salting_myself_or_use_a_library\"><\/span>Should I implement salting myself or use a library?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>\n      Use a reputable library or framework that handles salts and hashing for you. Modern libraries for bcrypt, Argon2, and scrypt generate salts, select safe defaults, and provide clear upgrade paths. DIY implementations often make dangerous mistakes.\n    <\/p>\n<p><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_salts_protect_session_tokens_or_API_keys\"><\/span>Can salts protect session tokens or API keys?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><\/p>\n<p>\n      For tokens and API keys, prefer unpredictable random values generated by a secure RNG and short lifetimes; salts can be useful when deriving keys from other inputs, but direct randomness is generally better for session identifiers and one-off tokens.\n    <\/p>\n<p>\n  <\/article>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What a salt is and why it matters for websites A salt is a random value added to a password (or other&hellip;<\/p>\n","protected":false},"author":1,"featured_media":52936,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[8,9405,4593,9,1,4594,3,5,10,11,7,88,2],"tags":[586,7918,13231,677,10591,13143,13305,11181,13304,13778,13390,10660,10668,10447,581,13777],"class_list":["post-52935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security","category-ai","category-databases","category-domains","category-general","category-networking","category-php-scripts","category-seo","category-servers","category-support","category-web-design","category-web-hosting","category-wordpress","tag-authentication","tag-cryptography","tag-hashing","tag-hosting","tag-hosting-security","tag-password-hashing","tag-password-salting","tag-password-security","tag-salt","tag-salted-hashes","tag-salting","tag-security-best-practices","tag-server-security","tag-web-security","tag-website-security","tag-why-salt-matters-in-hosting-and-website-security"],"_links":{"self":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/52935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/comments?post=52935"}],"version-history":[{"count":1,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/52935\/revisions"}],"predecessor-version":[{"id":52937,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/posts\/52935\/revisions\/52937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/media\/52936"}],"wp:attachment":[{"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/media?parent=52935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/categories?post=52935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infinitydomainhosting.com\/kb\/wp-json\/wp\/v2\/tags?post=52935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}