{"id":1177,"date":"2025-06-03T04:11:28","date_gmt":"2025-06-03T04:11:28","guid":{"rendered":"https:\/\/moca.network\/blog\/?p=1177"},"modified":"2025-07-10T03:57:57","modified_gmt":"2025-07-10T03:57:57","slug":"what-are-verifiable-credentials","status":"publish","type":"post","link":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/","title":{"rendered":"Moca 101:\u00a0What Are Verifiable Credentials?"},"content":{"rendered":"\n<p><strong>Verifiable Credentials (VCs)<\/strong>&nbsp;are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.<\/p>\n\n\n\n<p>They serve as&nbsp;<strong>digital proofs of fact<\/strong>\u2014like age, membership, or achievement\u2014issued by trusted entities, held by users, and instantly verifiable by others, without manual checks or data exposure.<\/p>\n\n\n\n<p>What makes VCs powerful is that they are&nbsp;<strong>interoperable<\/strong>,&nbsp;<strong>privacy-preserving<\/strong>, and&nbsp;<strong>trust-minimized<\/strong>. Built on open standards (such as W3C), they enable systems where users decide what to share\u2014and only reveal what\u2019s necessary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-credential\"><strong>What is a Credential?<\/strong><\/h2>\n\n\n\n<p>A\u00a0<strong>credential<\/strong>\u00a0is any record that proves something about you.<br>In real life, that might be a passport, diploma, or loyalty card.<br>In digital environments, credentials can represent:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your identity (e.g. age, student status, country of residence)<\/li>\n\n\n\n<li>Your actions and achievements (e.g. completing a course, attending an event, ranking in a game, earning a community reward)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-it-works\">How It Works:<\/h3>\n\n\n\n<p><br><strong>Key Players<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Issuer<\/strong>: Structures and attests to the credential data on-chain.<\/li>\n\n\n\n<li><strong>User<\/strong>: Holds the credential privately, encrypted via their AIR Account.<\/li>\n\n\n\n<li><strong>Verifier<\/strong>: Can request proof of a claim (e.g. 18+) and receive a&nbsp;<strong><a href=\"https:\/\/moca.network\/blog\/what-is-a-zkproof\/\">zkProof<\/a><\/strong>\u2014confirmation without needing to see sensitive details.<\/li>\n<\/ul>\n\n\n\n<p>Credentials are issued by Issuers (like a university or government), hold by the Users, and can be shown to others (verifiers) when needed. Each credential includes a digital signature that proves it\u2019s real and hasn\u2019t been tampered with. Verifiers can check this signature without contacting the original issuer.<\/p>\n\n\n\n<p><strong>Example<\/strong>:&nbsp;<a href=\"https:\/\/base.easscan.org\/attestation\/view\/0x8f0b1e498d1cd0b3c6ebb797f7be0282dc3dacc9ce59c0102efb8e4a80b5d336\">Coinbase Verification on Base<\/a>&nbsp;lets users prove their residency status using attested credentials.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-it-matters\"><strong>Why it matters<\/strong><\/h2>\n\n\n\n<p>With&nbsp;<strong>verifiable credentials<\/strong>, users no longer need to overshare personal information just to prove who they are or what they\u2019ve done. Instead of exposing data, they can present cryptographic proof of specific claims\u2014preserving privacy while still building trust. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prove they\u2019re over 18 without revealing their full birthdate<\/li>\n\n\n\n<li>Show they contributed to a project without exposing their wallet history<\/li>\n\n\n\n<li>Receive recognition for actions, achievements, or participation, online or offline<\/li>\n<\/ul>\n\n\n\n<p>At the same time, platforms gain access to proof-backed user insights without needing to collect or store personal data. This enables a privacy-first approach to identity, access, and engagement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-real-world-use-cases\"><strong>Real-world use cases<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A gamer uses a tournament credential to unlock perks in another game<\/li>\n\n\n\n<li>A shopper earns a loyalty credential to access private sales<\/li>\n\n\n\n<li>A user attends an event and unlocks gated content<\/li>\n\n\n\n<li>A learner shares a credential when applying for a job or grant<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-moca-network-is-building\"><strong>What Moca Network Is Building<\/strong><\/h2>\n\n\n\n<p><strong>Moca Network is building the world\u2019s largest identity network<\/strong>\u2014connecting users, apps, and brands through&nbsp;<strong>privacy-first credentials<\/strong>&nbsp;that prove what matters and protect what doesn\u2019t.<\/p>\n\n\n\n<p>With&nbsp;<strong>AIR Kit<\/strong>, users can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Claim credentials from games, communities, and real-world apps without exposing personal data <\/li>\n\n\n\n<li>Use them across ecosystems for access, rewards, and recognition<\/li>\n\n\n\n<li>Stay in control of what they share<\/li>\n<\/ul>\n\n\n\n<p>With verifiable credentials, identity becomes reusable, private by design, and recognized across apps, games, and digital platforms. Users no longer need to start from scratch or repeat verification steps. Instead, they unify a trusted identity that proves what matters seamlessly.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"Verifiable Credentials (VCs)&nbsp;are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled&hellip;","protected":false},"author":1,"featured_media":1278,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[27],"tags":[102,88,86,98,90,100,84,96,94,92],"ppma_author":[45],"class_list":{"0":"post-1177","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-moca-101","8":"tag-blockchain-credentials","9":"tag-decentralized-identity","10":"tag-digital-identity","11":"tag-identity-infrastructure","12":"tag-on-chain-identity","13":"tag-privacy-preserving-credentials","14":"tag-verifiable-credentials","15":"tag-web3-identity","16":"tag-zero-knowledge-proofs","17":"tag-zkproof","18":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.8 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Moca 101:\u00a0What Are Verifiable Credentials? - Moca Blog<\/title>\n<meta name=\"description\" content=\"Verifiable Credentials (VCs)\u00a0are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Moca 101:\u00a0What Are Verifiable Credentials?\" \/>\n<meta property=\"og:description\" content=\"Verifiable Credentials (VCs)\u00a0are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\" \/>\n<meta property=\"og:site_name\" content=\"Moca Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-03T04:11:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-10T03:57:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Moca Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Moca_Network\" \/>\n<meta name=\"twitter:site\" content=\"@Moca_Network\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Moca Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\"},\"author\":{\"name\":\"Moca Team\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f\"},\"headline\":\"Moca 101:\u00a0What Are Verifiable Credentials?\",\"datePublished\":\"2025-06-03T04:11:28+00:00\",\"dateModified\":\"2025-07-10T03:57:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\"},\"wordCount\":530,\"publisher\":{\"@id\":\"https:\/\/moca.network\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png\",\"keywords\":[\"blockchain credentials\",\"decentralized identity\",\"digital identity\",\"identity infrastructure\",\"on-chain identity\",\"privacy-preserving credentials\",\"verifiable credentials\",\"Web3 identity\",\"zero-knowledge proofs\",\"zkProof\"],\"articleSection\":[\"Moca 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\",\"url\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\",\"name\":\"Moca 101:\u00a0What Are Verifiable Credentials? - Moca Blog\",\"isPartOf\":{\"@id\":\"https:\/\/moca.network\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png\",\"datePublished\":\"2025-06-03T04:11:28+00:00\",\"dateModified\":\"2025-07-10T03:57:57+00:00\",\"description\":\"Verifiable Credentials (VCs)\u00a0are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.\",\"breadcrumb\":{\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage\",\"url\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png\",\"contentUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/moca.network\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Moca 101:\u00a0What Are Verifiable Credentials?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/moca.network\/blog\/#website\",\"url\":\"https:\/\/moca.network\/blog\/\",\"name\":\"Moca Academy\",\"description\":\"Moca Blog: Redefining Digital Identity, Reputation &amp; Ownership\",\"publisher\":{\"@id\":\"https:\/\/moca.network\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/moca.network\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/moca.network\/blog\/#organization\",\"name\":\"Moca Network\",\"url\":\"https:\/\/moca.network\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png\",\"contentUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png\",\"width\":714,\"height\":241,\"caption\":\"Moca Network\"},\"image\":{\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Moca_Network\",\"http:\/\/discord.gg\/MocaverseNFT\",\"https:\/\/t.me\/Mocaverse\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f\",\"name\":\"Moca Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/moca.network\/blog\/#\/schema\/person\/image\/ddc1d4a8b64db3bd75ced557acf8b6a9\",\"url\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png\",\"contentUrl\":\"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png\",\"caption\":\"Moca Team\"},\"sameAs\":[\"https:\/\/moca.network\/en\"],\"url\":\"https:\/\/moca.network\/blog\/author\/moca\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Moca 101:\u00a0What Are Verifiable Credentials? - Moca Blog","description":"Verifiable Credentials (VCs)\u00a0are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/","og_locale":"en_US","og_type":"article","og_title":"Moca 101:\u00a0What Are Verifiable Credentials?","og_description":"Verifiable Credentials (VCs)\u00a0are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.","og_url":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/","og_site_name":"Moca Blog","article_published_time":"2025-06-03T04:11:28+00:00","article_modified_time":"2025-07-10T03:57:57+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential-1024x576.png","type":"image\/png"}],"author":"Moca Team","twitter_card":"summary_large_image","twitter_creator":"@Moca_Network","twitter_site":"@Moca_Network","twitter_misc":{"Written by":"Moca Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#article","isPartOf":{"@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/"},"author":{"name":"Moca Team","@id":"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f"},"headline":"Moca 101:\u00a0What Are Verifiable Credentials?","datePublished":"2025-06-03T04:11:28+00:00","dateModified":"2025-07-10T03:57:57+00:00","mainEntityOfPage":{"@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/"},"wordCount":530,"publisher":{"@id":"https:\/\/moca.network\/blog\/#organization"},"image":{"@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png","keywords":["blockchain credentials","decentralized identity","digital identity","identity infrastructure","on-chain identity","privacy-preserving credentials","verifiable credentials","Web3 identity","zero-knowledge proofs","zkProof"],"articleSection":["Moca 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/","url":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/","name":"Moca 101:\u00a0What Are Verifiable Credentials? - Moca Blog","isPartOf":{"@id":"https:\/\/moca.network\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage"},"image":{"@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png","datePublished":"2025-06-03T04:11:28+00:00","dateModified":"2025-07-10T03:57:57+00:00","description":"Verifiable Credentials (VCs)\u00a0are tamper-proof digital records that prove facts about a person, organization, or object\u2014verified cryptographically and controlled by the user.","breadcrumb":{"@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#primaryimage","url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png","contentUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/06\/04_What-Are-Verifiable-Credential.png","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/moca.network\/blog\/what-are-verifiable-credentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/moca.network\/blog\/"},{"@type":"ListItem","position":2,"name":"Moca 101:\u00a0What Are Verifiable Credentials?"}]},{"@type":"WebSite","@id":"https:\/\/moca.network\/blog\/#website","url":"https:\/\/moca.network\/blog\/","name":"Moca Academy","description":"Moca Blog: Redefining Digital Identity, Reputation &amp; Ownership","publisher":{"@id":"https:\/\/moca.network\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/moca.network\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/moca.network\/blog\/#organization","name":"Moca Network","url":"https:\/\/moca.network\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png","contentUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2025\/04\/Moca_Network.png","width":714,"height":241,"caption":"Moca Network"},"image":{"@id":"https:\/\/moca.network\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Moca_Network","http:\/\/discord.gg\/MocaverseNFT","https:\/\/t.me\/Mocaverse"]},{"@type":"Person","@id":"https:\/\/moca.network\/blog\/#\/schema\/person\/4967195d277ce1b51c96615646ccf18f","name":"Moca Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/moca.network\/blog\/#\/schema\/person\/image\/ddc1d4a8b64db3bd75ced557acf8b6a9","url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png","contentUrl":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png","caption":"Moca Team"},"sameAs":["https:\/\/moca.network\/en"],"url":"https:\/\/moca.network\/blog\/author\/moca\/"}]}},"authors":[{"term_id":45,"user_id":1,"is_guest":0,"slug":"moca","display_name":"Moca Team","avatar_url":{"url":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png","url2x":"https:\/\/moca.network\/blog\/wp-content\/uploads\/2026\/03\/cropped-symbol-mark.png"},"author_category":"1","first_name":"Moca","last_name":"Team","user_url":"https:\/\/moca.network\/en","job_title":"","description":""}],"_links":{"self":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts\/1177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/comments?post=1177"}],"version-history":[{"count":14,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts\/1177\/revisions"}],"predecessor-version":[{"id":1381,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/posts\/1177\/revisions\/1381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/media?parent=1177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/categories?post=1177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/tags?post=1177"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/moca.network\/blog\/wp-json\/wp\/v2\/ppma_author?post=1177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}