{"id":1,"name":"fman","url":"http:\/\/apex-security.blog","description":"","link":"https:\/\/apex-security.blog\/?author=1","slug":"fman","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/c2272dac57e764854c7b79c602126dee0d10ab58f59730bbba40490027aa2e1c?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/c2272dac57e764854c7b79c602126dee0d10ab58f59730bbba40490027aa2e1c?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/c2272dac57e764854c7b79c602126dee0d10ab58f59730bbba40490027aa2e1c?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/apex-security.blog\/index.php?rest_route=\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/apex-security.blog\/index.php?rest_route=\/wp\/v2\/users"}]}}