{"id":637,"date":"2025-06-16T11:02:10","date_gmt":"2025-06-16T11:02:10","guid":{"rendered":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/"},"modified":"2025-06-16T11:02:10","modified_gmt":"2025-06-16T11:02:10","slug":"how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety","status":"publish","type":"post","link":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/","title":{"rendered":"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety"},"content":{"rendered":"<p>Whoa! I get that you want your coins locked down. My instinct said: start with the device, not the app. At first I thought the neatest trick was &#8220;keep a seed and forget it,&#8221; but I learned that attitude gets people hacked. Hardware wallets are great, though\u2014they&#8217;re not magic. They reduce attack surface, but only if you use them the right way and keep thinking like an adversary.<\/p>\n<p>Really? Okay, so check this out\u2014there are layers to security, and most users only cover the top layer. Consider the physical supply chain. Get devices from reputable sellers. Buy from the manufacturer or an authorized retailer. If the box looks tampered with, send it back. Sounds basic, but people skip it.<\/p>\n<p>Here&#8217;s the thing. Firmware matters. Keep your device firmware current. Updates patch vulnerabilities and add new coin support, and skipping them is like leaving your front door unlocked overnight. However, be judicious: verify firmware sources and follow vendor instructions carefully to avoid fake updates or malicious prompts.<\/p>\n<p>Short story\u2014my first Ledger arrived with the shrink wrap intact. I breathed a sigh of relief. Then I realized I had no plan for my recovery phrase beyond &#8220;write it down.&#8221; That was messy. So I made a better plan. I tested both seed backups and passphrase options. On one hand passphrases add a strong privacy and security layer, though actually they also add complexity and a single point of failure if you forget them.<\/p>\n<img decoding=\"async\" src=\"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg\" alt=\"Hardware wallet on a table next to a notebook and a coffee cup \u2014 casual setup with focus on physical security\" \/>\n<h2>Practical Checklist and Workflow (with a tool I actually use)<\/h2>\n<p>I&#8217;ll be honest\u2014tools help. I use a desktop companion app for portfolio checks and non-custodial trades, and one that has a decent UX for firmware and accounts. If you want a place to start, the Ledger Live ecosystem is familiar to many, and you can find it here: <a href=\"https:\/\/sites.google.com\/cryptowalletuk.com\/ledger-live\/\">https:\/\/sites.google.com\/cryptowalletuk.com\/ledger-live\/<\/a>. But remember, the app is a convenience layer, not your vault&#8217;s brain.<\/p>\n<p>First step: create a threat model. Think about who might want your keys. Family? Scammers? Nation\u2011state actors? Each threat gets different mitigations. For casual retail investors, simple offline storage and a safe are fine. For higher net worth, consider multisig across geographically separated hardware devices and trusted co-signers. I&#8217;m biased toward multisig for serious amounts\u2014it&#8217;s extra work, but worth it.<\/p>\n<p>Short and clear: never store your seed phrase digitally. No photos. No cloud backups. No syncing to your phone. It seems strict, but it prevents a whole class of remote attacks. If you need redundancy, use metal backups or multiple geographically separated copies in secure locations.<\/p>\n<p>My approach to passphrases is cautious. Use them if you can handle the cognitive load. A passphrase can create hidden wallets and effectively give plausible deniability, but forget it and the funds are gone forever. So practice, test restores, and keep a recovery SOP. Practice is the unsung hero here\u2014do trial recoveries in a safe environment before you rely on them for real funds.<\/p>\n<p>Now about trading and portfolio management. Keep hot funds on a separate device or software wallet. That way, trading amounts are insulated from long-term holdings. Use hardware wallets for cold storage and only connect them when you absolutely must sign a transaction. This is the basic separation of duties approach that actually works in practice.<\/p>\n<p>Hmm&#8230; something felt off when I saw folks use a hardware wallet and then paste their seed into an online exchange for convenience. Don&#8217;t do that. Ever. Exchanges are custodial; if you control the seed, you control the coins. If you give it to someone else\u2014even briefly\u2014you&#8217;ve surrendered your security model.<\/p>\n<p>Longer thought: when managing a portfolio that spans many tokens and chains, complexity multiplies risk because each additional chain requires software, bridging tools, or smart contract interactions, any of which can have bugs or scams; therefore, evaluate whether holding a given token deserves the operational overhead, and prefer widely audited bridges or native bridges maintained by reputable teams when moving assets.<\/p>\n<p>Here&#8217;s what bugs me about many &#8220;security guides&#8221;: they treat humans like ideal actors. Humans forget. Humans lose things. So build workflows around human limitations. Make checklists. Use two-person checks for big transfers. Set transfer limits that require a second sign-off. These organizational controls reduce the &#8220;oops&#8221; factor, especially if you trade actively.<\/p>\n<p>Also\u2014use price alerts and watchlists in your ledger companion or exchange accounts, but don\u2019t autotrade through risky dApps with your main cold wallet connected. Autonomy is great. Reckless autonomy is not. Be deliberate with what gets permissioned to sign transactions.<\/p>\n<p>On supply chain control: consider buying the same brand device in multiples and storing them separately. That way if one is compromised during shipping, you have a fallback. It\u2019s not cheap, but neither is losing six figures to a tampered device. And when setting up new devices, do so in a minimal environment\u2014airplane mode on your phone, no untrusted USB hubs, and verified vendor software.<\/p>\n<p>Short: multisig is your friend. Seriously. A 2-of-3 or 3-of-5 scheme spreads risk. One hardware wallet is a single point of compromise. With multisig, an attacker needs to compromise multiple independent keys. That reduces catastrophic loss vectors and forces attackers to escalate effort, which often deters them entirely.<\/p>\n<p>Longer thought: implementing multisig raises UX and recovery complexity, and also requires trust in the software orchestration layer. Choose mature multisig frameworks, practice restores for each signer, and document the recovery procedure for your heirs or custodian structure; if you skip this documentation, you might make your multisig as unhelpful as no security at all because no one can coordinate a recovery in a crisis.<\/p>\n<p>For active traders who still favor high security, consider a tiered asset approach: keep high-liquidity trading funds on a hot wallet but insulated behind hardware-backed approvals, maintain medium-term holdings in a watch-only setup synced to your portfolio manager, and cold-store long-term assets in air-gapped wallets with metal backups. This segmentation eases daily operations while preserving long-term safety.<\/p>\n<p>One practical tactic I use: a &#8220;graylist&#8221; of approved addresses. Before sending large transfers, test with a small amount and verify on both the device and the receiving side. This reduces mistakes with pasted addresses and mitigates clipboard malware risks. It\u2019s a tiny habit but saves a lot of heartache.<\/p>\n<p>Hmm\u2014I&#8217;m not 100% sure about universal best practices for every token&#8217;s smart contract quirks, but a general rule of thumb is to prefer audited contracts and to avoid granting infinite approvals to DeFi contracts unless you absolutely trust them; revoke allowances periodically. Tools can automate revocations, but again\u2014do it with hardware confirmations where possible.<\/p>\n<p>Short aside (oh, and by the way&#8230;): insurance exists for crypto, though it&#8217;s limited and expensive. It&#8217;s an extra layer, not a panacea. If your holdings justify it, research policies carefully for coverage, exclusions, and custody requirements. Most insurers require strong custody practices to underwrite a policy.<\/p>\n<p>When teaching friends, I follow a simple mantra: make the path to doing the right thing the easiest path. If the secure option is cumbersome, people won&#8217;t use it. So automate where safe, script checklists for cold storage restores, and set daily habits like verifying seed pens are intact. Habits beat rules every time.<\/p>\n<div class=\"faq\">\n<h2>Common Questions<\/h2>\n<div class=\"faq-item\">\n<h3>What if I lose my hardware wallet?<\/h3>\n<p>Use your recovery phrase to restore on a new device. If you used a passphrase, you will need that exact passphrase too. Practice restores first. Consider multisig as a way to avoid single device dependency.<\/p>\n<\/div>\n<div class=\"faq-item\">\n<h3>Should I use a passphrase?<\/h3>\n<p>Only if you can manage it reliably. A passphrase protects against seed theft, but forgetting it is irreversible. If you use one, store it separate from your seed and test recovery steps in a safe way.<\/p>\n<\/div>\n<div class=\"faq-item\">\n<h3>Is Ledger Live safe?<\/h3>\n<p>Ledger Live is a widely used companion app for managing accounts and installing firmware, but treat it as convenience software. The device still signs transactions offline. For downloads and updates, use official sources and verify integrity.<\/p>\n<\/div>\n<\/div>\n<p>Okay\u2014so here&#8217;s the wrap, not that boring &#8220;in conclusion&#8221; thing. Protecting crypto is mostly about aligning your tools to your threat model, practicing recovery steps until they&#8217;re muscle memory, and adding redundancy where it makes sense. I&#8217;m biased toward hardware plus multisig for real capital, but that\u2019s my take. Keep learning, keep testing, and don&#8217;t get complacent\u2014security is a practice, not a setting. Somethin&#8217; to sleep on, and then act on.<\/p>\n<p><!--wp-post-meta--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whoa! I get that you want your coins locked down. My instinct said: start with the device, not the app. At first I thought the neatest trick was &#8220;keep a seed and forget it,&#8221; but I learned that attitude gets people hacked. Hardware wallets are great, though\u2014they&#8217;re not magic. They reduce attack surface, but only&#8230;  <a href=\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/\" class=\"more-link\" title=\"Read How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-637","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety - Lisa R Howard PLLC<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety - Lisa R Howard PLLC\" \/>\n<meta property=\"og:description\" content=\"Whoa! I get that you want your coins locked down. My instinct said: start with the device, not the app. At first I thought the neatest trick was &#8220;keep a seed and forget it,&#8221; but I learned that attitude gets people hacked. Hardware wallets are great, though\u2014they&#8217;re not magic. They reduce attack surface, but only... Read more &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/\" \/>\n<meta property=\"og:site_name\" content=\"Lisa R Howard PLLC\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-16T11:02:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg\" \/>\n<meta name=\"author\" content=\"lisahoward\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"lisahoward\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/\",\"url\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/\",\"name\":\"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety - Lisa R Howard PLLC\",\"isPartOf\":{\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg\",\"datePublished\":\"2025-06-16T11:02:10+00:00\",\"author\":{\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/#\/schema\/person\/1bfc009bf88fa8655facab6fb588ca5f\"},\"breadcrumb\":{\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#primaryimage\",\"url\":\"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg\",\"contentUrl\":\"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fire.h50.us\/~lisahoward\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/#website\",\"url\":\"https:\/\/fire.h50.us\/~lisahoward\/\",\"name\":\"Lisa R Howard PLLC\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fire.h50.us\/~lisahoward\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/#\/schema\/person\/1bfc009bf88fa8655facab6fb588ca5f\",\"name\":\"lisahoward\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fire.h50.us\/~lisahoward\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e34e890d2092595bd906cc95dd257fc98d4b68cb4544a524465b697062db9a66?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e34e890d2092595bd906cc95dd257fc98d4b68cb4544a524465b697062db9a66?s=96&d=mm&r=g\",\"caption\":\"lisahoward\"},\"sameAs\":[\"http:\/\/localhost\/lisahoward\"],\"url\":\"https:\/\/fire.h50.us\/~lisahoward\/author\/lisahoward\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety - Lisa R Howard PLLC","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety - Lisa R Howard PLLC","og_description":"Whoa! I get that you want your coins locked down. My instinct said: start with the device, not the app. At first I thought the neatest trick was &#8220;keep a seed and forget it,&#8221; but I learned that attitude gets people hacked. Hardware wallets are great, though\u2014they&#8217;re not magic. They reduce attack surface, but only... Read more &raquo;","og_url":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/","og_site_name":"Lisa R Howard PLLC","article_published_time":"2025-06-16T11:02:10+00:00","og_image":[{"url":"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg","type":"","width":"","height":""}],"author":"lisahoward","twitter_card":"summary_large_image","twitter_misc":{"Written by":"lisahoward","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/","url":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/","name":"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety - Lisa R Howard PLLC","isPartOf":{"@id":"https:\/\/fire.h50.us\/~lisahoward\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#primaryimage"},"image":{"@id":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#primaryimage"},"thumbnailUrl":"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg","datePublished":"2025-06-16T11:02:10+00:00","author":{"@id":"https:\/\/fire.h50.us\/~lisahoward\/#\/schema\/person\/1bfc009bf88fa8655facab6fb588ca5f"},"breadcrumb":{"@id":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#primaryimage","url":"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg","contentUrl":"https:\/\/www.criptonoticias.com\/wp-content\/uploads\/2023\/06\/ledger-Live-criptomonedas-Staking-1140x570.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/fire.h50.us\/~lisahoward\/how-i-harden-my-crypto-practical-hardware-wallet-strategies-for-maximum-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fire.h50.us\/~lisahoward\/"},{"@type":"ListItem","position":2,"name":"How I Harden My Crypto: Practical Hardware\u2011Wallet Strategies for Maximum Safety"}]},{"@type":"WebSite","@id":"https:\/\/fire.h50.us\/~lisahoward\/#website","url":"https:\/\/fire.h50.us\/~lisahoward\/","name":"Lisa R Howard PLLC","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fire.h50.us\/~lisahoward\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/fire.h50.us\/~lisahoward\/#\/schema\/person\/1bfc009bf88fa8655facab6fb588ca5f","name":"lisahoward","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fire.h50.us\/~lisahoward\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e34e890d2092595bd906cc95dd257fc98d4b68cb4544a524465b697062db9a66?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e34e890d2092595bd906cc95dd257fc98d4b68cb4544a524465b697062db9a66?s=96&d=mm&r=g","caption":"lisahoward"},"sameAs":["http:\/\/localhost\/lisahoward"],"url":"https:\/\/fire.h50.us\/~lisahoward\/author\/lisahoward\/"}]}},"_links":{"self":[{"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/posts\/637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/comments?post=637"}],"version-history":[{"count":0,"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/posts\/637\/revisions"}],"wp:attachment":[{"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/media?parent=637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/categories?post=637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fire.h50.us\/~lisahoward\/wp-json\/wp\/v2\/tags?post=637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}