{"id":25067,"date":"2021-07-23T12:30:00","date_gmt":"2021-07-23T20:30:00","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=25067"},"modified":"2022-04-13T12:23:05","modified_gmt":"2022-04-13T20:23:05","slug":"how-to-encrypt-files","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/","title":{"rendered":"Up Your Security Game by Learning to Encrypt Files"},"content":{"rendered":"\n<p>One recurring theme that crops up in a number of fairy tales is \u201cfairy gold\u201d: A human is paid for his services in gold, or perhaps thinks he has stolen a life-changing fortune in gold from the land of the fairies, only to find that in the morning \u2014 or when it\u2019s handled by humans \u2014 it disappears, or changes to something worthless.&nbsp;<\/p>\n\n\n\n<p>For identity thieves, your personal identification is the pot of gold at the end of the proverbial rainbow.&nbsp; Encrypting your files makes them the \u201cfairy gold\u201d of identity theft by changing them into unreadable gibberish.&nbsp; Learning how to encrypt files is relatively straightforward, and it provides a valuable measure of protection against scammers and fraud artists.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Encryption?<\/h2>\n\n\n\n<p>When you were a kid, did you play around with secret codes?&nbsp; They were popular enough at one point that \u201csecret decoder rings\u201d \u2014 a common promotional gimmick \u2014 became a catchphrase.&nbsp; The idea is pretty simple: You take the original plain-text message, rearrange the letters according to a system that only you and the recipient of the message know, and send it.&nbsp; Casual snoops won\u2019t (in theory) be able to read it, though that depends on how well you\u2019ve set up your code.&nbsp;<\/p>\n\n\n\n<p>Those plain ol\u2019 paper coding systems, or <em>ciphers<\/em>, can be surprisingly secure.&nbsp; The best version uses what\u2019s called a \u201c<a href=\"https:\/\/www.cryptomuseum.com\/crypto\/otp\/index.htm\">one-time pad<\/a>,\u201d a list of random numbers that\u2019s given to both the sender and receiver.&nbsp; Each character of the original message is converted to a number, then each character in turn has a number from the one-time pad added to it (they\u2019re in sequence; if your message has 25 characters you\u2019ll only use the first 25 numbers).&nbsp; Only someone with the same page of the same pad can decrypt the message, and they\u2019re destroyed after a single use.&nbsp; These were, and still occasionally are, used by for-real spies for secure messaging.&nbsp;<\/p>\n\n\n\n<p>Encryption on your modern devices uses the same basic principle: Your files are translated through an <em>encryption key<\/em> (the digital equivalent of a one-time pad) and only authorized users who have the key can decrypt the messages.&nbsp; There are lots of current and former <a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-what-is-encryption.html\">encryption standards<\/a> for computers, if you really want to geek out on them, but it\u2019s not necessary.&nbsp; All you <em>really<\/em> need to know is that current devices and OSs use current encryption standards, and that they\u2019re very good indeed.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What You Should Be Encrypting<\/h2>\n\n\n\n<p>If you regularly travel away from home for business or pleasure, you likely have a list of valuables you attend to before you leave: things that get hidden, things that get locked up or put in storage for safekeeping.&nbsp; You need to think of the contents of your computer or phone in the same way.&nbsp; What are the most valuable or sensitive pieces of information on your devices, the ones that could cause you the most harm if they fall into the wrong hands?&nbsp;<\/p>\n\n\n\n<p>Anything relating to your finances should be at the top of the list, and so should any legal documents.&nbsp; Those are rich in the kind of information identity thieves thrive on.&nbsp; You might not think of photos, but they\u2019re important as well: Identity thieves can use those to create fake identification in your name, or set up fake social media or dating app accounts for phishing purposes.&nbsp; If any of your photos are somewhat risque, scammers might blackmail you with the threat of releasing them.&nbsp; Your passwords, usernames and other login credentials are especially sensitive, because with those attackers can gain access to your accounts.&nbsp;<\/p>\n\n\n\n<p>Anything work-related is important as well, especially if your devices contain your clients\u2019 (or your suppliers\u2019) information.&nbsp; Your company may already have measures in place, so you\u2019ll need to speak with your company\u2019s security or IT people about that.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Encrypt Files<\/h2>\n\n\n\n<p>There are a couple of ways to encrypt files.&nbsp; One is to simply identify any files that are especially sensitive, and encrypt them individually.&nbsp; That\u2019s often done directly through the app or program itself.&nbsp; <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/protect-a-document-with-a-password-05084cc3-300d-4c1a-8416-38d3e37d6826\">In MS Word<\/a>, for example, you\u2019d open the File menu, choose Info and then Protect Document, and then \u201cEncrypt with Password.\u201d&nbsp; Enter a password of up to 15 characters, and you\u2019re done.&nbsp;<\/p>\n\n\n\n<p>A second option encrypts your actual drive, in whole or in part, creating the digital equivalent of a safe with a combination lock.&nbsp; Files you choose to encrypt are saved to that \u201cvault\u201d by your OS (OSX\u2019s <a href=\"https:\/\/globalnews.ca\/news\/7815631\/covid-vaccine-household-transmission-study\/\">FileVault<\/a> or Windows\u2019 <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/device-encryption-in-windows-10-ad5dcf4b-dbe0-2331-228f-7925c2a3012d\">BitLocker<\/a>, for example) or by <a href=\"https:\/\/www.kaspersky.com\/blog\/encrypt-your-data\/1889\/\">third-party apps<\/a>.&nbsp; If you opt to encrypt the whole device or drive, <em>everything<\/em> is encrypted.&nbsp; Alternatively (in some apps or OSs), you can create a separate folder, which looks and acts like a USB thumb drive or a small second hard drive, and save chosen files to it.&nbsp;<\/p>\n\n\n\n<p>In each case, you choose a password or some other form of \u201ckey\u201d in order to decrypt the files.&nbsp; If you forget or lose that key, you\u2019ll lose access to all of the files and data you\u2019ve encrypted.&nbsp; On the other hand, if someone learns or guesses your password, they\u2019ll have <em>gained<\/em> access to all of your files.&nbsp; The bottom line?&nbsp; Your password is really, really important.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Securing Your Encrypted Files<\/h2>\n\n\n\n<p>Keeping your encrypted files secure requires two things: a password that\u2019s really strong (and therefore difficult to break), and one you can absolutely, positively, for-sure remember.&nbsp; Unfortunately, as a rule, the better your password the harder it is to remember.&nbsp;<\/p>\n\n\n\n<p>There are plenty of guides to creating <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/cloud-security\/how-to-create-a-strong-password-you-actually-remember\/\">strong but memorable passwords<\/a>, so find a method that works for you and create one.&nbsp; Of course, if you use multiple devices you\u2019ll need multiple passwords, so the best option might be to invest in a cross-platform <a href=\"https:\/\/www.spokeo.com\/compass\/best-ways-to-store-passwords\/\">password management app<\/a> (there are lots of good ones).&nbsp; Then you\u2019ll only need to remember the password that locks your password manager, and from there you can just look up the rest.&nbsp; As a bonus, it\u2019ll also remember everything from the combination on your gym locker to your online passwords, so you can finally develop that good habit of using a different password for every site.<\/p>\n\n\n\n<p>You can also strengthen your security by using a second method to verify that it\u2019s really you.&nbsp; You\u2019ll be familiar with this method, thanks to sites and apps that require you to enter a texted code in order to gain access.&nbsp; That\u2019s called multi-factor authentication (MFA) or two-factor authentication (2FA).&nbsp; Text messages aren\u2019t necessarily the best way to go, mind you.&nbsp; Most devices offer some form of biometric authorization, in the form of a fingerprint reader or facial recognition, and that\u2019s more secure.&nbsp; You can also use a hardware key, which must be tapped or inserted in order to gain access.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Encrypting Files Protect You?&nbsp;<\/h2>\n\n\n\n<p>Scammers can gain access to your devices and data in a truly staggering number of ways, from eavesdropping on the public wi-fi at your local coffee shop, to <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails-2\/\">phishing attacks<\/a> that trick you into installing malicious software, to physically stealing your phone in the few seconds when you have your back turned.&nbsp;<\/p>\n\n\n\n<p>Any attack is only successful when criminals have your data.&nbsp; By encrypting the files containing your data, you\u2019ve made sure that simply gaining <em>access<\/em> to your data doesn\u2019t <em>give<\/em> them your data.&nbsp; It\u2019s like giving them canned goods, but no can opener.&nbsp; It\u2019s not that encryption can\u2019t sometimes be defeated (just as you can open a can with a rock if you need to), but it takes a lot of time and some sophisticated tools and skills, which most scammers don\u2019t have.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fight Identity Theft with Spokeo Protect<\/h2>\n\n\n\n<p>Encryption on its own isn\u2019t a magic bullet.&nbsp; Scammers can still find your data through a variety of other means, so you\u2019ll still need to understand the <a href=\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen-2\/\">signs of identity theft<\/a> and know what to do about it.&nbsp; <meta charset=\"utf-8\"><a href=\"https:\/\/www.spokeo.com\/identity-theft-protection\">Spokeo Protect<\/a>, the new identity protection solution offered by Spokeo, can act as your first line of defense. It helps users safeguard their credit, financial accounts, social security number, medical insurance and much more. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sources<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Crypto Museum: <a href=\"https:\/\/www.cryptomuseum.com\/crypto\/otp\/index.htm\">One-Time Pad<\/a><\/li><li>Norton: <a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-what-is-encryption.html\">What is Encryption and How Does it Protect Your Data?&nbsp;<\/a><\/li><li>Microsoft Support: <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/protect-a-document-with-a-password-05084cc3-300d-4c1a-8416-38d3e37d6826\">Protect a Document With a Password<\/a><\/li><li>Apple Support: <a href=\"https:\/\/support.apple.com\/en-ca\/guide\/security\/sece3bee0835\/web\">Encryption and Data Protection Overview<\/a><\/li><li>Microsoft Support: <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/device-encryption-in-windows-10-ad5dcf4b-dbe0-2331-228f-7925c2a3012d\">Device Encryption in Windows 10<\/a><\/li><li>Kaspersky: <a href=\"https:\/\/www.kaspersky.com\/blog\/encrypt-your-data\/1889\/\">Reasons to Encrypt Your Data<\/a><\/li><li>McAfee: <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/cloud-security\/how-to-create-a-strong-password-you-actually-remember\/\">How to Create a Strong Password You Actually Remember<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>One recurring theme that crops up in a number of fairy tales is \u201cfairy gold\u201d: A human is paid for his services in gold, or perhaps thinks he has stolen&hellip;<\/p>\n","protected":false},"author":112,"featured_media":25068,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[612,810],"tags":[],"class_list":["post-25067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-identity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Encrypt Files to Protect Your Personal Information | Spokeo<\/title>\n<meta name=\"description\" content=\"Getting access to your devices won\u2019t help scammers if they\u2019re full of encrypted files. Learn why you should encrypt your files, get a quick primer on how to do it, and how to incorporate this powerful technique into your overall online security routine.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Encrypt Files to Protect Your Personal Information | Spokeo\" \/>\n<meta property=\"og:description\" content=\"Getting access to your devices won\u2019t help scammers if they\u2019re full of encrypted files. Learn why you should encrypt your files, get a quick primer on how to do it, and how to incorporate this powerful technique into your overall online security routine.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T20:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T20:23:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/\",\"name\":\"How to Encrypt Files to Protect Your Personal Information | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1\",\"datePublished\":\"2021-07-23T20:30:00+00:00\",\"dateModified\":\"2022-04-13T20:23:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"Getting access to your devices won\u2019t help scammers if they\u2019re full of encrypted files. Learn why you should encrypt your files, get a quick primer on how to do it, and how to incorporate this powerful technique into your overall online security routine.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1\",\"width\":1170,\"height\":585},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Encrypt Files to Protect Your Personal Information | Spokeo","description":"Getting access to your devices won\u2019t help scammers if they\u2019re full of encrypted files. Learn why you should encrypt your files, get a quick primer on how to do it, and how to incorporate this powerful technique into your overall online security routine.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/","og_locale":"en_US","og_type":"article","og_title":"How to Encrypt Files to Protect Your Personal Information | Spokeo","og_description":"Getting access to your devices won\u2019t help scammers if they\u2019re full of encrypted files. Learn why you should encrypt your files, get a quick primer on how to do it, and how to incorporate this powerful technique into your overall online security routine.","og_url":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2021-07-23T20:30:00+00:00","article_modified_time":"2022-04-13T20:23:05+00:00","og_image":[{"width":1170,"height":585,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/","url":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/","name":"How to Encrypt Files to Protect Your Personal Information | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1","datePublished":"2021-07-23T20:30:00+00:00","dateModified":"2022-04-13T20:23:05+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"Getting access to your devices won\u2019t help scammers if they\u2019re full of encrypted files. Learn why you should encrypt your files, get a quick primer on how to do it, and how to incorporate this powerful technique into your overall online security routine.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/how-to-encrypt-files\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1","width":1170,"height":585},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPHowtoEncryptComputerFilestoProtectYourselffromIDTheft_1170x585.jpg?fit=1170%2C585&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6wj","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=25067"}],"version-history":[{"count":3,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25067\/revisions"}],"predecessor-version":[{"id":25072,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25067\/revisions\/25072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/25068"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=25067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=25067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=25067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}