

{"id":24570,"date":"2025-03-11T08:37:50","date_gmt":"2025-03-11T13:37:50","guid":{"rendered":"https:\/\/rud.is\/b\/?p=24570"},"modified":"2025-03-11T08:37:50","modified_gmt":"2025-03-11T13:37:50","slug":"xitter-hit-by-major-cyberattack","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/","title":{"rendered":"Xitter Hit by Major Cyberattack"},"content":{"rendered":"<p>On March 10, 2025, Xitter experienced major service disruptions throughout the day. Users couldn&#8217;t access the platform on both mobile apps and the website. Here&#8217;s what happened and why it matters.<\/p>\n<h2>What Happened?<\/h2>\n<p>X suffered multiple waves of outages starting early Monday morning:<\/p>\n<ul>\n<li>First wave: Around 6:00 AM Eastern Time, affecting about 20,000 users<\/li>\n<li>Second wave: Around 10:00 AM ET, with over 40,000 users reporting problems<\/li>\n<li>Third wave: Between 11:00 AM and noon, affecting nearly 30,000 users<\/li>\n<\/ul>\n<p>People trying to use Xitter saw loading symbols, error messages saying &#8220;Something went wrong. Try reloading,&#8221; or couldn&#8217;t access the service at all.<\/p>\n<h2>Who Was Behind It?<\/h2>\n<p>A pro-Palestinian hacking group called Dark Storm Team claimed responsibility for the attack. They posted on their Telegram channel: &#8220;Twitter has been taken offline by Dark Storm Team,&#8221; along with screenshots showing connection failures from different global locations.<\/p>\n<p>Dark Storm Team has been active since around 2023 and is known for targeting organizations in Israel, Europe, and the United States. According to security experts, the group specializes in DDoS attacks and has a pro-Palestinian orientation.<\/p>\n<h2>What Did Elon Musk Say?<\/h2>\n<p>Elon Musk, Xitter&#8217;s owner, acknowledged the attack several hours after it began: &#8220;There was (still is) a massive cyberattack against Xitter. We get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and\/or a country is involved.&#8221;<\/p>\n<p>Later, in an interview with Fox Business, Musk made a controversial claim connecting the attack to Ukraine: &#8220;We&#8217;re not sure exactly what happened but there was a massive cyberattack to try and bring down the Xitter system with IP addresses originating in the Ukraine area.&#8221; He provided no evidence to support this claim.<\/p>\n<h2>What Was the Reaction?<\/h2>\n<p>Cybersecurity experts expressed significant skepticism about Musk&#8217;s Ukraine claim:<\/p>\n<ul>\n<li>They pointed out that attack origin IP addresses can be easily masked or manipulated<\/li>\n<li>Attackers routinely route activities through compromised systems in other countries<\/li>\n<\/ul>\n<p>Ukrainian officials firmly denied any involvement. Oleksii Merezhko, chairman of Ukraine&#8217;s parliamentary Foreign Affairs Committee, stated that the Ukrainian government had &#8220;absolutely&#8221; no part in the alleged cyberattack on Xitter.<\/p>\n<p>Ed Krassenstein, who claimed to have communicated with Dark Storm&#8217;s leader, contradicted Musk&#8217;s assertion. According to screenshots shared online, the group responded to the Ukraine claim by saying: &#8220;Elon Musk must provide evidence for his claim, and we will provide evidence for ours.&#8221; They allegedly threatened further attacks, warning &#8220;We can attack again. A stronger attack this time, not only on Xitter but Tesla and others.&#8221;<\/p>\n<h2>What Type of Attack Was It?<\/h2>\n<p>The incident was a distributed denial-of-service (DDoS) attack. These attacks work by:<br \/>\n&#8211; Overwhelming a platform&#8217;s servers with excessive traffic<br \/>\n&#8211; Causing slowdowns or complete outages by exhausting available resources<br \/>\n&#8211; Using compromised devices (forming a &#8220;botnet&#8221;) to send overwhelming amounts of data<\/p>\n<p>Cybersecurity experts described this attack as &#8220;far beyond simple DoS attempts,&#8221; involving &#8220;full-scale DDoS assaults, combined with sophisticated botnet activity, credential stuffing, API abuse, and targeted application-layer attacks designed to cripple operations.&#8221;<\/p>\n<h2>How Did Xitter Respond?<\/h2>\n<p>Xitter implemented Cloudflare&#8217;s DDoS protection services to mitigate the impact. This defensive measure introduced captcha verification for suspicious IP addresses generating too many requests. By evening, the platform had largely recovered, though some users continued to experience intermittent issues.<\/p>\n<p>I&#8217;m not surprised Cloudflare helps protect Nazis, but it&#8217;d be nice to live in a universe where they all crawled back under their rocks for good.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 10, 2025, Xitter experienced major service disruptions throughout the day. Users couldn&#8217;t access the platform on both mobile apps and the website. Here&#8217;s what happened and why it matters. What Happened? X suffered multiple waves of outages starting early Monday morning: First wave: Around 6:00 AM Eastern Time, affecting about 20,000 users Second [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[775,681],"tags":[],"class_list":["post-24570","post","type-post","status-publish","format-standard","hentry","category-commentary","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Xitter Hit by Major Cyberattack - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Xitter Hit by Major Cyberattack - rud.is\" \/>\n<meta property=\"og:description\" content=\"On March 10, 2025, Xitter experienced major service disruptions throughout the day. Users couldn&#8217;t access the platform on both mobile apps and the website. Here&#8217;s what happened and why it matters. What Happened? X suffered multiple waves of outages starting early Monday morning: First wave: Around 6:00 AM Eastern Time, affecting about 20,000 users Second [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-11T13:37:50+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Xitter Hit by Major Cyberattack\",\"datePublished\":\"2025-03-11T13:37:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\"},\"wordCount\":575,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Commentary\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\",\"url\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\",\"name\":\"Xitter Hit by Major Cyberattack - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"datePublished\":\"2025-03-11T13:37:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Xitter Hit by Major Cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Xitter Hit by Major Cyberattack - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"Xitter Hit by Major Cyberattack - rud.is","og_description":"On March 10, 2025, Xitter experienced major service disruptions throughout the day. Users couldn&#8217;t access the platform on both mobile apps and the website. Here&#8217;s what happened and why it matters. What Happened? X suffered multiple waves of outages starting early Monday morning: First wave: Around 6:00 AM Eastern Time, affecting about 20,000 users Second [&hellip;]","og_url":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/","og_site_name":"rud.is","article_published_time":"2025-03-11T13:37:50+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Xitter Hit by Major Cyberattack","datePublished":"2025-03-11T13:37:50+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/"},"wordCount":575,"commentCount":3,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Commentary","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/","url":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/","name":"Xitter Hit by Major Cyberattack - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2025-03-11T13:37:50+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2025\/03\/11\/xitter-hit-by-major-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Xitter Hit by Major Cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-6oi","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":187,"url":"https:\/\/rud.is\/b\/2011\/02\/23\/herding-firesheep\/","url_meta":{"origin":24570,"position":0},"title":"Herding [Fire]sheep","author":"hrbrmstr","date":"2011-02-23","format":false,"excerpt":"By now, many non-IT and non-Security folk have heard of Firesheep, a tool written by @codebutler which allows anyone using Firefox on unprotected networks to capture and hjijack active sessions to popular social media sites (and other web sites). The sidebar\/extension puts an attactive and easy-to-understand GUI over a process\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":127,"url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-automated-incident-reporting\/","url_meta":{"origin":24570,"position":1},"title":"Metricon: Automated Incident Reporting","author":"hrbrmstr","date":"2011-02-14","format":false,"excerpt":"Speaker: Juhaniu Eronen \"The Autoreporter Project\" - Background Goal: make finland mostly harmless to the rest of the internet (that's actually in the law - Protection of Privacy in Electronic Comms\/Finland) \u00a0 \/me: I'll need to put some verbiage around this tonight to give you a good picture of what\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11483,"url":"https:\/\/rud.is\/b\/2018\/09\/12\/the-evolution-of-data-literacy-at-the-u-s-department-of-energy-finding-power-grid-cyber-attacks-in-a-data-haystack\/","url_meta":{"origin":24570,"position":2},"title":"The Evolution of Data Literacy at the U.S. Department of Energy + Finding Power Grid Cyber Attacks in a Data Haystack","author":"hrbrmstr","date":"2018-09-12","format":false,"excerpt":"I was chatting with some cyber-mates at a recent event and the topic of cyber attacks on the U.S. power-grid came up (as it often does these days). The conversation was brief, but the topic made its way into active memory and resurfaced when I saw today's Data Is Plural\u2026","rel":"","context":"In &quot;data wrangling&quot;","block_context":{"text":"data wrangling","link":"https:\/\/rud.is\/b\/category\/data-wrangling\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/09\/2002.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/09\/2002.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/09\/2002.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/09\/2002.png?resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/09\/2002.png?resize=1050%2C600 3x"},"classes":[]},{"id":633,"url":"https:\/\/rud.is\/b\/2011\/11\/14\/dnschanger-detector\/","url_meta":{"origin":24570,"position":3},"title":"DNSChanger Detector","author":"hrbrmstr","date":"2011-11-14","format":false,"excerpt":"The FBI made a tool to help you determine if you were a victim of the DNSChanger malware. If you're like many casual Internet users, you have no idea how to get the information to plug into the input box. Unfortunately, the security model of most modern browsers makes it\u2026","rel":"","context":"In &quot;Browsers&quot;","block_context":{"text":"Browsers","link":"https:\/\/rud.is\/b\/category\/browsers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11392,"url":"https:\/\/rud.is\/b\/2018\/08\/16\/updates-to-the-sergeant-apache-drill-connector-package-apache-drill-1-14-0-release\/","url_meta":{"origin":24570,"position":4},"title":"Updates to the sergeant (Apache Drill connector) Package &#038; a look at Apache Drill 1.14.0 release","author":"hrbrmstr","date":"2018-08-16","format":false,"excerpt":"Apache Drill 1.14.0 was recently released, bringing with it many new features and a temporary incompatibility with the current rev of the MapR ODBC drivers. The Drill community expects new ODBC drivers to arrive shortly. The sergeant? is an alternative to ODBC for R users as it provides a dplyr\u2026","rel":"","context":"In &quot;Apache Drill&quot;","block_context":{"text":"Apache Drill","link":"https:\/\/rud.is\/b\/category\/apache-drill\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11648,"url":"https:\/\/rud.is\/b\/2018\/11\/14\/use-github-vulnerability-alerts-to-keep-users-of-your-r-packages-safe\/","url_meta":{"origin":24570,"position":5},"title":"Use GitHub Vulnerability Alerts to Keep Users of Your R Packages Safe","author":"hrbrmstr","date":"2018-11-14","format":false,"excerpt":"Despite their now inherent evil status, GitHub has some tools other repository aggregators do not. One such tool is the free vulnerability alert service which will scan repositories for outdated+vulnerable dependencies. Now, \"R\" is nowhere near a first-class citizen in the internet writ large, including software development tooling (e.g. the\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/11\/Screen-Shot-2018-11-14-at-08.43.14.png?fit=1200%2C424&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/24570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=24570"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/24570\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=24570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=24570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=24570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}