{"id":2806,"date":"2025-09-12T09:15:01","date_gmt":"2025-09-12T09:15:01","guid":{"rendered":"https:\/\/www.peneveyre.com\/en\/?p=2806"},"modified":"2025-09-12T09:31:05","modified_gmt":"2025-09-12T09:31:05","slug":"the-swiss-e-id-navigating-digital-identity-technology-and-public-trust","status":"publish","type":"post","link":"https:\/\/www.peneveyre.com\/en\/2025\/09\/12\/the-swiss-e-id-navigating-digital-identity-technology-and-public-trust\/","title":{"rendered":"The Swiss e-ID: Navigating Digital Identity, Technology, and Public Trust"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.peneveyre.com\/en\/wp-content\/uploads\/sites\/3\/2025\/09\/swyiu_illustration@0.1x.jpg&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; title_text=&#8221;swyiu_illustration@0.1x&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; align=&#8221;center&#8221; z_index=&#8221;0&#8243; animation_direction=&#8221;top&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><!-- divi:heading --><\/p>\n<div>Governments worldwide, at their own pace, are increasingly digitizing their services to their respective citizens, or even for the tourists to visit their country. Common challenges are to accurately identify the people that want to benefit from a service, along with authenticating them (that are two different things !). Today, there are several private or public organizations trying to federate the consumer identities, such as the SwissPass for the public transportation, the SwissID used to get access, for example, to the Swiss Post, or the CH-Login by the Swiss Confederation to grant access to several federal administrations. At the cantonal level, in Vaud, the &#8220;IAM Portal&#8221; attempts to federate identities for the state collaborators and partners.<br \/>We already see here, in the context of authentication, that there are multiple initiatives or systems already in place.<br \/>But there is a common challenge to overcome when connected to any of these portals: how can a citizen proof his or her legal identity, or, in other words, his or her age, when ordering a license or other official document?<br \/>This is where an electronic identity comes into play. A secure electronic method designed to prove a person&#8217;s identity and access digital services.<br \/>In Switzerland, such project started several years ago, and the journey, however, has not been without its hurdles. A significant turning point occurred when the initial e-ID Act faced a popular vote in March 2021 and was rejected by 64.4% of voters (<a href=\"#ref-1\">1<\/a>). This rejection was largely driven by public concerns regarding the involvement of private companies in managing sensitive personal data.<br \/>From this rejection, the Swiss government worked on a new project, learning from the previous concerns, and shifting to a state-controlled e-ID issuance and trusted infrastructure.<br \/>This revised approach is submitted to a public vote, scheduled for the 28th of September.<br \/>Before you continue reading, a little <strong>disclaimer<\/strong>: this post is not to expose or express the opinion of the author and is not aimed at convincing the readers to a position or the other. Rather, this post aims at giving information about how the e-ID works, from both a user perspective, and in the backend. Nevertheless, it will try to address some of the concerns that the public may have.<\/div>\n<p><!-- \/divi:paragraph --><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<!-- divi:heading --><\/p>\n<h2>Defining Roles in the Swiss e-ID Ecosystem<\/h2>\n<div>The revised Swiss e-ID model meticulously separates the responsibilities of the various stakeholders, a design choice intended to build trust in the digital identity framework.\u00a0<\/div>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:paragraph -->[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.peneveyre.com\/en\/wp-content\/uploads\/sites\/3\/2025\/09\/introduction-ecosystem.png&#8221; title_text=&#8221;introduction-ecosystem&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>(image from : <a href=\"https:\/\/swiyu-admin-ch.github.io\/introduction\/\" target=\"_blank\" rel=\"noopener\">https:\/\/swiyu-admin-ch.github.io\/introduction\/<\/a>)<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>Firstly, the Confederation assumes the pivotal role as the sole issuer of the e-ID and is responsible for operating the <strong>secure trust infrastructure<\/strong> upon which the e-ID system is relying. The Confederation provides as well the &#8220;<strong>swiyu<\/strong>&#8221; wallet app, enabling users to manage their e-ID and other digital credentials (a credential is a fact about a subject, like the date of birth, the gender, or the AVS\/OASI number). Indeed, it is planned that the &#8220;swiyu&#8221; app will also hold communal, cantonal, or even third party (private entities) credentials.<br \/>Beyond the central governmental role, <strong>Issuers<\/strong> are recognized entities, such as cantons, municipalities, or private companies operating under strict federal regulations, which can issue <strong>Verifiable Credentials<\/strong> (credentials that can be checked for validity) within the e-ID ecosystem.<br \/>In contrast, <strong>Verifiers<\/strong>, also known as <strong>Relying Parties<\/strong>, are service providers, whether public or private, that check the validity of credentials for authentication or data access. While they are not directly controlled by the government regarding the type of information they request, they are mandated to comply with data protection laws.<br \/>Last and far from being the least, the <strong>Users<\/strong>, comprising citizens and residents, can voluntarily apply for and use the e-ID free of charge. A cornerstone of the system is that users retain full control over their data, empowered to choose precisely what information they share through selective disclosure. In addition, the credentials will be stored in the hands of the users, namely the Identity wallet app, &#8220;swiyu&#8221;.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<!-- divi:heading --><\/p>\n<h2>The Swiss Trust Infrastructure and Operational Flow<\/h2>\n<div>Several key principles underpin the technical design of the Swiss e-ID.<br \/>The Swiss e-ID is built upon the swiyu <strong>Trust Infrastructure<\/strong>, designed for the secure management of digital identities and credentials.\u00a0<\/div>\n<p><!-- \/divi:paragraph -->[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.peneveyre.com\/en\/wp-content\/uploads\/sites\/3\/2025\/09\/introduction-components.jpg&#8221; title_text=&#8221;introduction-components&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>(image from : <a href=\"https:\/\/swiyu-admin-ch.github.io\/introduction\/\" target=\"_blank\" rel=\"noopener\">https:\/\/swiyu-admin-ch.github.io\/introduction\/<\/a>)<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>The core components of this infrastructure include the swiyu <strong>Base Registry<\/strong>, which handles the public keys and manages the onboarding and offboarding processes for the issuers and verifiers entities.<br \/>In parallel, the swiyu <strong>Trust Registry<\/strong> stores and maintains the validity of the Base Registry identifiers, validated by the <a href=\"https:\/\/www.bj.admin.ch\/bj\/en\/home.html\" target=\"_blank\" rel=\"noopener\">FOJ<\/a> (<a href=\"https:\/\/www.bj.admin.ch\/bj\/en\/home.html\" target=\"_blank\" rel=\"noopener\">Federal Office of Justice<\/a>). For this, it stores the <strong>trust statement<\/strong> linking the technical identifiers with the legal entities in the real world.<br \/>The user interface is the swiyu Wallet App, a state-provided digital wallet where users securely store, manage, and utilize their e-ID and other verifiable credentials. To facilitate broad adoption and integration, the federal government also provides <strong>Generic Issuer<\/strong> and <strong>Generic Verifier<\/strong> Implementations, which are reference software for credential issuance and verification.<br \/>For the service provider to verify a credential, the swiyu Check mobile app, provided by the <a href=\"https:\/\/www.bit.admin.ch\/en\" target=\"_blank\" rel=\"noopener\">FOITT<\/a> (<a href=\"https:\/\/www.bit.admin.ch\/en\" target=\"_blank\" rel=\"noopener\">Federal Office of Information Technology, Systems and Telecommunications<\/a>), is used to verify the user&#8217;s credentials in the physical world (at a government office for example). Here, it is important to understand that the user is able to check the credentials that are being verified, and to choose whether he or she accepts to share these credentials with the verifier.<br \/>The e-ID infrastructure adopts the <strong>Privacy by Design<\/strong> (i.e. ensuring privacy at every stage of the design, development, deployment and operations) model, ensuring minimal data flows and decentralized data storage to safeguard personal information. Towards such model, a key concept is the separation of the technical identifiers in the <strong>Base Registry<\/strong> from the legal entity names in the <strong>Trust Registry<\/strong>, limiting the risk of data leaks in case of an incident.<br \/>Furthermore, c<strong>redentials are device-bound<\/strong>, meaning they are tied to the user&#8217;s device to prevent unauthorized extraction and misuse.<br \/>Speaking about the operational flow, when a user wishes to authenticate with a service, the e-ID issues a one-time cryptographic token for that specific interaction, rather than sharing a reusable document. This drastically limits the system to track individual usages of the e-ID.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><!-- divi:heading --><\/p>\n<h2>Some limitations<\/h2>\n<div>By the time the e-ID will be proposed to the public, there are doubts that some important capabilities ensuring complete privacy will be implemented.<br \/>The first one is about <strong>unlinkability<\/strong>. In other words, to prevent the linking of different transactions performed with the e-ID, thus ensuring user activity cannot be traced across various services.<br \/>Another current challenge is the <strong>zero-knowledge proofs<\/strong> (<strong>ZKPs<\/strong>), that is being able to prove that a fact is true without disclosing the underlying data making this fact true. This requires advanced cryptographic tools, and, for example, enables verifiers to check an information (e.g., being over 18) without revealing the details like their exact age or birth date.<\/div>\n<p><!-- \/divi:paragraph --><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<!-- divi:heading --><\/p>\n<h2>Analyzing Criticisms of the Swiss e-ID<\/h2>\n<div>Back in 2021, the main arguments against the previous e-ID project proposal and about digital identities in general originated from the involvement of the private sector in the core infrastructure. And, in times where governments and the economy demand for more digital sovereignty, and not relying upon the GAFAs, it largely resonates in the political areas.<br \/>And, the Confederation learned from this lesson, and largely addressed it in the law by making the Confederation responsible for issuance and infrastructure, thus correcting the previous approach.<br \/>We can&#8217;t agree more that it is a key advancement to make the project to be accepted by the citizens.<br \/>Another important concern is about privacy and surveillance. The critics come from a fear that a centralized identity system, no matter how well protected, could become a tool for surveillance or profiling by the government. This draws parallels to systems like China&#8217;s &#8220;social score&#8221;.<br \/>While the Swiss e-ID design targets for unlinkability (see above) and uses privacy by design concepts, officials state the government will not track individual usage. This concern is partially valid as a vigilance point.<br \/>The possibility of security risks and data breaches leading to hacking and identity theft is an inherent and valid concern for any digital system. Nowadays the risk already exists, with the increasing digitalization of the state and its affiliate organizations information systems. Think about the number of systems storing your AVS (OASI in English) number. Specifically to the e-ID, the Swiss government is responding by implementing robust security measures, including open-sourcing its code and planning a bug bounty program in 2025, to address these risks transparently.<br \/>Experiences made with the Covid-pass several years ago raise a concern about access to the state services in the future for citizens not having, or not willing to have, an e-ID. In the Covid times, both generational and technological barrier prevented people from going to restaurants or leisure services if they didn&#8217;t have the SwissCovid app on a mobile.<br \/>The <a href=\"https:\/\/www.admin.ch\/gov\/en\/start\/documentation\/votes\/20250928\/e-id-act.html\" target=\"_blank\" rel=\"noopener\">LeID<\/a>, and also the Federal Council in a <a href=\"https:\/\/www.eid.admin.ch\/en\/e-id-botschaft-e\" target=\"_blank\" rel=\"noopener\">dispatch of the November 22nd 2023<\/a>, state that the use of the e-ID is not mandatory, free of charge, and that the service providers accepting the e-ID must also accept the physical IDs (ID card, passport, etc.). Detractors say, &#8220;for the time being&#8221;, but what about the future, where potentially service providers might eventually make it inconvenient to use traditional alternatives.<br \/>The final answer is unknown, but the concern about old-aged people or citizens who are not technology savvy and therefore hindered from accessing digital service would likely not be in the best means even without the e-ID, thus not a huge concern.<br \/>This is a valid practical concern the government must continually address through inclusive access strategies and by ensuring that traditional identity methods remain viable and accessible for all citizens.<br \/>Finally, skepticism exists regarding the government&#8217;s IT competence in managing complex digital projects. Historically, several government IT projects have faced challenges.<br \/>For this, Beat Jens, heading the department implementing the e-ID, <a href=\"https:\/\/www.24heures.ch\/surveillance-abus-vol-de-donnees-beat-jans-defend-le-id-917127390907\" target=\"_blank\" rel=\"noopener\">responded recently<\/a> that the e-ID project is in good progress, and is going to be delivered on time and in budget, expecting the e-ID to be available 1 year after the poll.<\/div>\n<p><!-- \/divi:paragraph -->[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>Other Digital ID Implementations<\/h2>\n<p>As introduced at the beginning of this post, <a href=\"https:\/\/www.beyondencryption.com\/blog\/countries-most-innovative-digital-id-systems\" target=\"_blank\" rel=\"noopener\">numerous countries<\/a> have implemented or are developing their own digital ID systems, each with different characteristics.<br \/>For instance, <strong>Estonia<\/strong> launched its digital ID infrastructure in 2002. It revolves around a mandatory digital ID card using Public Key Infrastructure (PKI) technology, allowing secure authentication and digital signatures. It has been made mandatory to all Estonians to have such digital ID.<br \/>In contrast with Switzerland, <strong>Sweden<\/strong>&#8216;s BankID, launched in 2003, is primarily a private-sector initiative built through a consortium of banks.<br \/>In <strong>Germany<\/strong>, the government introduced electronic ID cards in 2010, including a chip storing personal information and biometric data. It can be used on government portals, tax filing, and digital document signing. While designed for interoperability, it has faced challenges related to complexity and public awareness.<br \/>Outside the European continent, <strong>India<\/strong>&#8216;s Aadhaar system, launched in 2009, is a massive undertaking serving 1.3 billion citizens. It assigns a unique 12-digit identification number based on biometric and demographic data. It is highly centralized which raises significant privacy concerns.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>Conclusion<\/h2>\n<p>The Swiss e-ID project marks a significant step toward digitalizing public services and enhancing interactions for its citizens. By integrating lessons from the 2021 referendum and firmly rooting the project in state control, privacy-by-design principles, and through open-source, Switzerland aims at proposing a robust and trusted digital identity system. And this, despite the legitimate concerns regarding privacy, security, and universal access.<br \/>Hopefully, this blog post showed how the Swiss e-ID works, its potential weakness and concerns while trying to give answers to them.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<!-- divi:heading --><\/p>\n<h2>References<\/h2>\n<p><span style=\"font-family: Calibri; font-size: 11pt;\">(1)<\/span><a ref=\"https:\/\/www.ejpd.admin.ch\/ejpd\/fr\/home\/themes\/abstimmungen\/bgeid.html\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/www.ejpd.admin.ch\/ejpd\/fr\/home\/themes\/abstimmungen\/bgeid.html\" style=\"font-family: Calibri; font-size: 11pt;\">https:\/\/www.ejpd.admin.ch\/ejpd\/fr\/home\/themes\/abstimmungen\/bgeid.html<\/a><a id=\"ref-1\"><\/a><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">(2) <a href=\"https:\/\/swiyu-admin-ch.github.io\/\" target=\"_blank\" rel=\"noopener\">https:\/\/swiyu-admin-ch.github.io\/<\/a><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">(3) <a href=\"https:\/\/github.com\/swiyu-admin-ch\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/swiyu-admin-ch<\/a><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">(4) <a href=\"https:\/\/www.eid.admin.ch\/en\/blog-e\" target=\"_blank\" rel=\"noopener\">https:\/\/www.eid.admin.ch\/en\/blog-e<\/a><\/p>\n<p><!-- \/divi:paragraph -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In September this year, the Swiss citizens are going to vote for or against an e-ID Act aiming at proposing an electronic version of the ID card. But, how does it work ? What are the criticisms ? This blog post provides several answers to these questions<\/p>\n","protected":false},"author":1,"featured_media":2827,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:image {\"id\":2772,\"width\":\"546px\",\"height\":\"auto\",\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} -->\n<figure class=\"wp-block-image size-large is-resized\"><img src=\"https:\/\/www.peneveyre.com\/en\/wp-content\/uploads\/sites\/3\/2023\/09\/GettyImages-1268601565_res-1024x683.jpg\" alt=\"\" class=\"wp-image-2772\" style=\"width:546px;height:auto\"\/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph -->\n<p>Governments worldwide, at their own pace, are increasingly digitizing their services to their respective citizens, or even for the tourists to visit their country. Common challenges are to accurately identify the people that want to benefit from a service, along with authenticating them (that are two different things !). Today, there are several private or public organizations trying to federate the consumer identities, such as the SwissPass for the public transportation, the SwissID used to get access, for example, to the Swiss Post, or the CH-Login by the Swiss Confederation to grant access to several federal administrations. At the cantonal level, in Vaud, the \"IAM Portal\" attempts to federate identities for the state collaborators and partners.<br>We already see here, in the context of authentication, that there are multiple initiatives or systems already in place.<br>But there is a common challenge to overcome when connected to any of these portals: how can a citizen proof his or her legal identity, or, in other words, his or her age, when ordering a license or other official document?<br>This is where an electronic identity comes into play. A secure electronic method designed to prove a person's identity and access digital services.<br>In Switzerland, such project started several years ago, and the journey, however, has not been without its hurdles. A significant turning point occurred when the initial e-ID Act faced a popular vote in March 2021 and was rejected by 64.4% of voters. This rejection was largely driven by public concerns regarding the involvement of private companies in managing sensitive personal data.<br>From this rejection, the Swiss government worked on a new project, learning from the previous concerns, and shifting to a state-controlled e-ID issuance and trusted infrastructure.<br>This revised approach is submitted to a public vote, scheduled for the 28th of September.<br>Before you continue reading, a little disclaimer: this post is not to expose or express the opinion of the author and is not aimed at convincing the readers to a position or the other. Rather, this post aims at giving information about how the e-ID works, from both a user perspective, and in the backend. Nevertheless, it will try to address some of the concerns that the public may have.<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","footnotes":""},"categories":[14],"tags":[],"class_list":["post-2806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/posts\/2806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/comments?post=2806"}],"version-history":[{"count":16,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/posts\/2806\/revisions"}],"predecessor-version":[{"id":2843,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/posts\/2806\/revisions\/2843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/media\/2827"}],"wp:attachment":[{"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/media?parent=2806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/categories?post=2806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.peneveyre.com\/en\/wp-json\/wp\/v2\/tags?post=2806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}