{"id":10966,"date":"2025-04-11T17:03:47","date_gmt":"2025-04-11T15:03:47","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=10966"},"modified":"2025-04-11T17:03:47","modified_gmt":"2025-04-11T15:03:47","slug":"slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/","title":{"rendered":"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics"},"content":{"rendered":"\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\"><i>The intent of this post is not to assert that Ethereum will substitute Dagger with Slasher as its primary mining methodology. Instead, Slasher serves as a strategic asset in our arsenal should proof of stake mining gain considerable traction or if a persuasive rationale emerges for a transition. Additionally, Slasher could also benefit other cryptocurrencies aiming to operate independently of Ethereum. Special acknowledgment to tacotime for some inspiration, and to Jack Walker for suggestions on enhancements.<!-- --><\/i><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Proof of stake mining has been an area of significant interest for the cryptocurrency community for an extended period. The first coin based on proof-of-stake, PPCoin, was introduced by Sunny King in 2012 and has persistently remained among the top five alternative currencies <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/coinmarketcap.com\/\">by market capitalization<!-- --><\/a> since that time. And this is justified; proof of stake offers several benefits over proof of work as a mining approach. To begin with, proof of stake is considerably more eco-friendly; while proof of work necessitates miners to essentially waste computational power on unproductive calculations to secure the network, proof of stake simulates this waste, ensuring no actual energy or resources are squandered in reality. Secondly, there are concerns regarding centralization. Proof of work has predominantly been controlled by specialized hardware (\u201capplication-specific integrated circuits\u201d \/ ASICs), presenting a significant risk that a single dominant player like Intel or a prominent bank could monopolize the market. Memory-hard mining algorithms such as Scrypt and now <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"http:\/\/wiki.ethereum.org\/index.php\/Dagger\">Dagger<!-- --><\/a> partially mitigate this issue, but not completely. Once more, proof of stake, if effectively implemented, could be an almost flawless solution.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Conversely, proof of stake as currently executed in nearly all currencies exhibits a fundamental shortcoming: as one prominent Bitcoin developer articulated, \u201cthere\u2019s nothing at stake\u201d. The implications of this statement become evident when we scrutinize the dynamics involved during an attempted 51% attack, which proof-of-work mechanisms are intended to thwart. During a 51% attack, an attacker A transmits a transaction from A to B, waits for its confirmation in block K1 (with parent K), collects a product from B, and then promptly creates another block K2 atop K \u2013 including a transaction directing the same bitcoins back from A to A. At that moment, there exist two blockchains, one stemming from block K1 and another from K2. If B can append blocks to K2 at a faster rate than the entire legitimate network can add to K1, then the K2 blockchain will prevail \u2013 making it seem as if the payment from A to B never took place. The essence of proof of work is to necessitate a certain computational effort to generate a block, so that for K2 to outpace K1, B would need to possess more computational power than the entire legitimate network combined.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">In the context of proof of stake, it does not require computational power to create a work \u2013 rather, it requires capital. In PPCoin, each \u201ccoin\u201d has a probability per second of being the fortunate coin that earns the right to generate a new valid block, meaning the more coins one possesses, the swifter they can generate new blocks over time. Therefore, a successful 51% attack, theoretically, necessitates not greater computing power than the legitimate network, but more capital than the legitimate network. However, this highlights the distinction between proof of work and proof of stake: in proof of work, a miner can only mine on one fork at any given time, ensuring the legitimate network supports the authentic blockchain instead of an attacker&#8217;s chain. Conversely, in proof of stake, once a fork occurs, miners will hold capital in both forks simultaneously, thus allowing them to mine both forks. In fact, if even a remote possibility exists that the attack might prosper, miners have the incentive to mine on both. If a miner possesses a substantial number of coins, they will aim to counteract attacks to maintain their coins&#8217; value; however, in an environment with numerous small miners, network security could potentially collapse due to a classic public goods dilemma, where no single miner has a significant influence on the outcome, leading every miner to act purely \u201cselfishly\u201d.<!-- --><\/p>\n<p><!-- --><\/p>\n<h3 class=\"chakra-heading css-145upk7\" id=\"the-solution\">The Solution<!-- --><\/h3>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Some analysts argue that the above reasoning could undermine all proof of stake, at least without a component of proof of work supplementing it. And within a framework where each chain is solely conscious of itself, this assertion is demonstrably accurate. However, a clever workaround actually exists, and it has largely gone unexamined: make the chain cognizant of other chains. Consequently, if a miner is discovered mining across two chains simultaneously, that miner can face penalties. Yet, how to accomplish this within a PPCoin-like framework is not straightforward. The rationale is as follows: mining is inherently a random endeavor. In other words, a miner possessing 0.1% of the stake has a 0.1% probability of mining a valid block on block K1, and a 0.1% probability of mining a valid block on block K2, but merely a 0.0001% probability of mining valid blocks on both. In such a scenario, the miner can simply withhold the second block \u2013 since mining is probabilistic, this allows the miner to still reap 99.9% of the benefits of mining on the second chain.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The subsequent proposal delineates an algorithm, which we have termed Slasher to reflect its strictly punitive nature, aimed at circumventing this predicament. The design description provided here utilizes address balances for transparency, but it can readily be adapted to function with \u201cunspent transaction outputs,\u201d or any other comparable abstraction utilized by other currencies.<!-- --><\/p>\n<p><!-- --><\/p>\n<ol role=\"list\" class=\"css-13a5a39\">\n<li class=\"css-cvpopp\">Blocks are mined through proof of work. Nevertheless, we introduce one adjustment. When establishing a block K, a miner must incorporate the value H(n) for some random n generated by the miner. The miner must claim the reward by submitting a transaction revealing n between block K+100 and K+900. The proof of work reward should be minimal, ideally promoting energy consumption equivalent to roughly 1% of that of Bitcoin. The target block interval is set at 30 seconds.<!-- --><\/li>\n<li class=\"css-cvpopp\">Let\u2019s assume the total monetary supply is M, and n[i] represents the n value at block i. At block K+1000, an address A with balance B acquires a \u201csigning privilege\u201d if sha256(n[K] + n[K+1] + &#8230; + n[K+99] + A) <\/li>\n<li class=\"css-cvpopp\">At block K+2000, miners holding signing privileges from block K are granted the chance to sign the block. The quantity of signatures will determine the comparative length of one blockchain against another. A signature will reward the signer with a significantly larger bounty than the proof of work reward, and this bounty will unlock at block K+3000.<!-- --><\/li>\n<li class=\"css-cvpopp\">Imagine that a user identifies two signatures created by address A on two separate blocks with height K+2000. That node can subsequently publish a transaction containing these two signatures, and if this transaction is included prior to block K+3000, it eliminates the corresponding reward for that signature and grants 33% to the user who reported the cheating.<!-- --><\/li>\n<\/ol>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The crux of this architecture lies in how the signing privileges are allocated: rather than being randomly assigned based on the previous block, the signing privilege derives from the block two thousand blocks earlier. Thus, in the event of a fork, a miner fortunate on one chain will also correspondingly benefit on the other, entirely eliminating the probabilistic dual-mining threat possible with PPCoin. Another perspective is that since Slasher utilizes proof-of-stake-2000-blocks-ago as opposed to proof-of-stake at present, and given that forks will almost certainly not persist for 2000 blocks, there exists effectively one currency supply available for mining, thus establishing \u201csomething at stake.\u201d The penalty of losing the block reward guarantees that each node remains diligent in signing only one block for each block number.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">Employing 100 pre-committed random numbers is an idea borrowed from provably fair gambling protocols; the concept is that powerful miners are incapable of attempting to generate multiple blocks and publishing solely those assigning their own stake a signing privilege, as they remain unaware of what any other random data utilized in determining stakeholder status is at the time they produce their blocks.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">This system is not purely proof-of-stake; a minimal element of proof-of-work will be necessary to maintain a temporal interval between blocks. However, a 51% attack on the proof of work would be largely inconsequential, as proof of stake signing is the singular deciding factor regarding which blockchain prevails. Furthermore, energy consumption from proof of work can be significantly reduced to 95-99%, addressing environmental concerns related to proof of work.<!-- --><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The intent of this post is not to assert that Ethereum will substitute Dagger with Slasher as its primary mining methodology. Instead, Slasher serves as a strategic asset in our arsenal should proof of stake mining gain considerable traction or if a persuasive rationale emerges for a transition. Additionally, Slasher could also benefit other cryptocurrencies<\/p>\n","protected":false},"author":3,"featured_media":10967,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[2089],"class_list":{"0":"post-10966","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-return-a-list-of-comma-separated-tags-from-this-title-slasher-a-punitive-proof-of-stake-algorithm"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"The intent of this post is not to assert that Ethereum will substitute Dagger with Slasher as its primary mining methodology. Instead, Slasher serves as a strategic asset in our arsenal should proof of stake mining gain considerable traction or if a persuasive rationale emerges for a transition. Additionally, Slasher could also benefit other cryptocurrencies\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-11T15:03:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"468\" \/>\n\t<meta property=\"og:image:height\" content=\"193\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/\",\"name\":\"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg\",\"datePublished\":\"2025-04-11T15:03:47+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg\",\"width\":468,\"height\":193},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/","og_locale":"it_IT","og_type":"article","og_title":"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics - WSJ-Crypto","og_description":"The intent of this post is not to assert that Ethereum will substitute Dagger with Slasher as its primary mining methodology. Instead, Slasher serves as a strategic asset in our arsenal should proof of stake mining gain considerable traction or if a persuasive rationale emerges for a transition. Additionally, Slasher could also benefit other cryptocurrencies","og_url":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/","og_site_name":"WSJ-Crypto","article_published_time":"2025-04-11T15:03:47+00:00","og_image":[{"width":468,"height":193,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg","type":"image\/jpeg"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"7 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/","url":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/","name":"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg","datePublished":"2025-04-11T15:03:47+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/04\/slasher.jpg","width":468,"height":193},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/04\/11\/slasher-an-innovative-take-on-punitive-proof-of-stake-mechanics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Slasher: An Innovative Take on Punitive Proof-of-Stake Mechanics"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=10966"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10966\/revisions"}],"predecessor-version":[{"id":10969,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10966\/revisions\/10969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/10967"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=10966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=10966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=10966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}