{"id":626,"date":"2016-01-29T13:37:09","date_gmt":"2016-01-29T19:37:09","guid":{"rendered":"http:\/\/grownuptech.com\/?p=626"},"modified":"2024-08-12T18:43:02","modified_gmt":"2024-08-12T18:43:02","slug":"math-behind-good-password","status":"publish","type":"post","link":"https:\/\/oakwoodexperience.com\/staging\/2633\/math-behind-good-password\/","title":{"rendered":"The Math Behind a Good Password"},"content":{"rendered":"<div class=\"getty embed image\" style=\"background-color: #fff; display: inline-block; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; color: #a7a7a7; font-size: 11px; width: 100%; max-width: 509px;\">\n<div style=\"padding: 0; margin: 0; text-align: left;\"><a style=\"color: #a7a7a7; text-decoration: none; font-weight: normal !important; border: none; display: inline-block;\" href=\"http:\/\/www.gettyimages.com\/detail\/182174076\" target=\"_blank\" rel=\"noopener\">Embed from Getty Images<\/a><\/div>\n<div style=\"overflow: hidden; position: relative; height: 0; padding: 66.601179% 0 0 0; width: 100%;\"><iframe loading=\"lazy\" style=\"display: inline-block; position: absolute; top: 0; left: 0; width: 100%; height: 100%; margin: 0;\" src=\"\/\/embed.gettyimages.com\/embed\/182174076?et=uU-pigLbQCRPv2y9NS9H8w&amp;sig=GlT3XbsToBKqBg9kY_MLnwcMFq-fKH_85CXrFZuRB6c=\" width=\"509\" height=\"339\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/div>\n<p style=\"margin: 0;\">\n<\/div>\n<p>This post is actually a preface to another one I&#8217;m in the middle of right now, on password managers. But I wanted to take a minute and explain why your workplace insists on bizarre <a class=\"zem_slink\" title=\"Password\" href=\"http:\/\/en.wikipedia.org\/wiki\/Password\" target=\"_blank\" rel=\"wikipedia noopener\">passwords<\/a>, and how you can capitalize on that in your personal life.<\/p>\n<h3>Why are there password requirements?<\/h3>\n<p>When you have to change passwords, it can be a real challenge coming up with one that is compliant with your organization&#8217;s password requirements that you can still remember. \u00a0If the company is enforcing standard <a class=\"zem_slink\" title=\"Password strength\" href=\"http:\/\/en.wikipedia.org\/wiki\/Password_strength\" target=\"_blank\" rel=\"wikipedia noopener\">password strength<\/a> requirements, you need to have at least one capital letter, at least one <a class=\"zem_slink\" title=\"Letter case\" href=\"http:\/\/en.wikipedia.org\/wiki\/Letter_case\" target=\"_blank\" rel=\"wikipedia noopener\">lower-case letter<\/a>, at least one digit, at least one &#8220;special character&#8221; (but some <a class=\"zem_slink\" title=\"Special characters\" href=\"http:\/\/en.wikipedia.org\/wiki\/Special_characters\" target=\"_blank\" rel=\"wikipedia noopener\">special characters<\/a> are not allowed). For the love of all sanity, WHY?????<\/p>\n<p>Here&#8217;s why:<\/p>\n<p>Imagine a password that you could create using only one character, a lower-case letter. That password could be guessed in no more than 26 attempts, and likely fewer than that. Add the possibility that that one character could be upper-case and it would still take more more than 52 attempts to guess it. Add digits 0 through 9 to the possibilities and would still take only 62 guesses at most. Also allowing all 32 special characters gives you 94 possibilities of guessing that one character.\u00a0That may sound like a lot, but it still only takes a few seconds per attempt.<\/p>\n<h3>This is why your password needs to be weird<\/h3>\n<p>So combining several characters together exponentially increases the effort needed to break that password. For example, if your password had to have two characters and only two characters, now there are 188 possible combinations, and that will take a human a lot longer to decode that password. Another character adds another 94 possibilities, for a total of 272. Now, a computer trying to figure this password out would take very little time using a &#8220;brute force&#8221; attack, which is just trying the possible combinations of characters in sequence, and the bulk of the time would be in waiting for the answering server to respond. However, most people make passwords they can remember, which means they have a word in them. Sophisticated software conducts &#8220;<a class=\"zem_slink\" title=\"Dictionary attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Dictionary_attack\" target=\"_blank\" rel=\"wikipedia noopener\">dictionary attacks<\/a>&#8221; looking for words in the password, and getting cutesy with character substitution, like using t3ch13 for &#8220;techie&#8221; won&#8217;t fool a computer engaged in this kind of attack.<\/p>\n<p>So for every character you add to your password, you increase the complexity of it and make it harder for an attacker to guess. \u00a0For more on how to create a strong, secure password that you can remember without writing it down, <a href=\"https:\/\/grownuptech.com\/can-you-create-a-secure-password\/\" target=\"_blank\" rel=\"noopener\">see my post on that here.<\/a> \u00a0But stay tuned for how to use strong secure passwords that you don&#8217;t have to remember, and that you don&#8217;t have to create. Should be ready in just a few more days.<\/p>\n<h6 class=\"zemanta-related-title\" style=\"font-size: 1em;\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul zemanta-article-ul-image\" style=\"margin: 0; padding: 0; overflow: hidden;\">\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/resources.infosecinstitute.com\/password-security-complexity-vs-length\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/i.zemanta.com\/noimg_55_80_80.jpg?w=1290\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/resources.infosecinstitute.com\/password-security-complexity-vs-length\/\" target=\"_blank\" rel=\"noopener\">Password Security: Complexity vs. Length<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/www.sciencetext.com\/pre-year-resolution.html\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/i.zemanta.com\/noimg_98_80_80.jpg?w=1290\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/www.sciencetext.com\/pre-year-resolution.html\" target=\"_blank\" rel=\"noopener\">Pre-year Resolution<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/www.techweekeurope.co.uk\/security\/security-management\/kaspersky-stop-sharing-passwords-182513\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/i.zemanta.com\/364749164_80_80.jpg?w=1290\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/www.techweekeurope.co.uk\/security\/security-management\/kaspersky-stop-sharing-passwords-182513\" target=\"_blank\" rel=\"noopener\">Kaspersky: Stop Telling Other People Your Passwords<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Embed from Getty Images This post is actually a preface to another one I&#8217;m in the middle of right now, on password managers. But I wanted to take a minute and explain why your workplace insists on bizarre passwords, and how you can capitalize on that in your personal life. Why are there password requirements?&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,9],"tags":[354,406,105,462,665,767,768,769,853,883,221,1026,1049,1050],"class_list":["post-626","post","type-post","status-publish","format-standard","hentry","category-recentrelevant","category-basics","tag-brute-force-attack","tag-computers","tag-cybersecurity","tag-dictionary-attack","tag-letter-case","tag-passphrase","tag-password","tag-password-strength","tag-randomness","tag-risk","tag-security","tag-user-computing","tag-web-safety","tag-website"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Math Behind a Good Password - Oakwood Experience<\/title>\n<meta name=\"description\" content=\"Why do websites and companies make it so difficult to create and use a password? I&#039;ll explain why longer and weirder is better in today&#039;s post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oakwoodexperience.com\/math-behind-good-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Math Behind a Good Password - Oakwood Experience\" \/>\n<meta property=\"og:description\" content=\"Why do websites and companies make it so difficult to create and use a password? I&#039;ll explain why longer and weirder is better in today&#039;s post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oakwoodexperience.com\/math-behind-good-password\/\" \/>\n<meta property=\"og:site_name\" content=\"Oakwood Experience\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563885192881\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-29T19:37:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T18:43:02+00:00\" \/>\n<meta name=\"author\" content=\"Nancy Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/x.com\/oakwood92297\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/\"},\"author\":{\"name\":\"Nancy Jones\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\"},\"headline\":\"The Math Behind a Good Password\",\"datePublished\":\"2016-01-29T19:37:09+00:00\",\"dateModified\":\"2024-08-12T18:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"keywords\":[\"Brute-force attack\",\"computers\",\"cybersecurity\",\"Dictionary attack\",\"Letter case\",\"Passphrase\",\"password\",\"Password strength\",\"Randomness\",\"risk\",\"security\",\"User (computing)\",\"web safety\",\"website\"],\"articleSection\":[\"Recent and Relevant\",\"The Basics of How Things Work\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/\",\"name\":\"The Math Behind a Good Password - Oakwood Experience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\"},\"datePublished\":\"2016-01-29T19:37:09+00:00\",\"dateModified\":\"2024-08-12T18:43:02+00:00\",\"description\":\"Why do websites and companies make it so difficult to create and use a password? I'll explain why longer and weirder is better in today's post.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/math-behind-good-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/oakwoodexperience.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Math Behind a Good Password\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"name\":\"Oakwood Experience\",\"description\":\"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.\",\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/oakwoodexperience.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\",\"name\":\"Oakwood Experience\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"width\":1000,\"height\":885,\"caption\":\"Oakwood Experience\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\",\"name\":\"Nancy Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"caption\":\"Nancy Jones\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61563885192881\",\"https:\\\/\\\/www.instagram.com\\\/southernfriedyanqui\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/feed\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/x.com\\\/oakwood92297\",\"https:\\\/\\\/www.youtube.com\\\/@nancyjones6235\"],\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/author\\\/nancyjones36507\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Math Behind a Good Password - Oakwood Experience","description":"Why do websites and companies make it so difficult to create and use a password? I'll explain why longer and weirder is better in today's post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/","og_locale":"en_US","og_type":"article","og_title":"The Math Behind a Good Password - Oakwood Experience","og_description":"Why do websites and companies make it so difficult to create and use a password? I'll explain why longer and weirder is better in today's post.","og_url":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/","og_site_name":"Oakwood Experience","article_author":"https:\/\/www.facebook.com\/profile.php?id=61563885192881","article_published_time":"2016-01-29T19:37:09+00:00","article_modified_time":"2024-08-12T18:43:02+00:00","author":"Nancy Jones","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/x.com\/oakwood92297","twitter_misc":{"Written by":"Nancy Jones","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/#article","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/"},"author":{"name":"Nancy Jones","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3"},"headline":"The Math Behind a Good Password","datePublished":"2016-01-29T19:37:09+00:00","dateModified":"2024-08-12T18:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"keywords":["Brute-force attack","computers","cybersecurity","Dictionary attack","Letter case","Passphrase","password","Password strength","Randomness","risk","security","User (computing)","web safety","website"],"articleSection":["Recent and Relevant","The Basics of How Things Work"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/oakwoodexperience.com\/math-behind-good-password\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/","url":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/","name":"The Math Behind a Good Password - Oakwood Experience","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/#website"},"datePublished":"2016-01-29T19:37:09+00:00","dateModified":"2024-08-12T18:43:02+00:00","description":"Why do websites and companies make it so difficult to create and use a password? I'll explain why longer and weirder is better in today's post.","breadcrumb":{"@id":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oakwoodexperience.com\/math-behind-good-password\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/oakwoodexperience.com\/math-behind-good-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oakwoodexperience.com\/"},{"@type":"ListItem","position":2,"name":"The Math Behind a Good Password"}]},{"@type":"WebSite","@id":"https:\/\/oakwoodexperience.com\/#website","url":"https:\/\/oakwoodexperience.com\/","name":"Oakwood Experience","description":"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.","publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oakwoodexperience.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/oakwoodexperience.com\/#organization","name":"Oakwood Experience","url":"https:\/\/oakwoodexperience.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","contentUrl":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","width":1000,"height":885,"caption":"Oakwood Experience"},"image":{"@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3","name":"Nancy Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","caption":"Nancy Jones"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563885192881","https:\/\/www.instagram.com\/southernfriedyanqui\/","https:\/\/www.linkedin.com\/feed\/","https:\/\/x.com\/https:\/\/x.com\/oakwood92297","https:\/\/www.youtube.com\/@nancyjones6235"],"url":"https:\/\/oakwoodexperience.com\/staging\/2633\/author\/nancyjones36507\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/comments?post=626"}],"version-history":[{"count":1,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/626\/revisions"}],"predecessor-version":[{"id":1582,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/626\/revisions\/1582"}],"wp:attachment":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/media?parent=626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/categories?post=626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/tags?post=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}