{"id":67112,"date":"2023-12-12T16:15:30","date_gmt":"2023-12-12T21:15:30","guid":{"rendered":"https:\/\/fidodev.wpengine.com\/?page_id=67112"},"modified":"2025-10-16T18:21:18","modified_gmt":"2025-10-16T22:21:18","slug":"fido-alliance-public-policy-submissions","status":"publish","type":"page","link":"https:\/\/fidoalliance.org\/fido-alliance-public-policy-submissions\/","title":{"rendered":"Government &#038; Public Policy"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>As technology evolves, policy needs to evolve with it.<\/strong><\/h2>\n\n\n\n<p>The global market is bursting with innovation around authentication technology \u2013 but some solutions are better equipped to meet the security and usability needs in government.<\/p>\n\n\n\n<p>Through its working groups and member public policy leads, the FIDO Alliance engages in meaningful discussion with policymakers around the world on how FIDO specifications offer newer, better options for strong authentication, and recommends associated policy updates.<\/p>\n\n\n\n<p>FIDO Alliance\u2019s key points for policymakers include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Two-factor authentication no longer brings higher burdens or cost.<\/strong>&nbsp;While this statement was true of older traditional MFA technology, FIDO specifically addresses these cost and usability issues and enables simpler, stronger authentication capabilities that governments, businesses and consumers can easily adopt at scale<\/li>\n\n\n\n<li><strong>Technology is now mature enough to enable two secure, distinct authentication factors in a single device.&nbsp;<\/strong>The evolution of mobile devices \u2013 in particular, hardware architectures that offer highly robust and isolated execution environments (such as TEE, SE and TPM) \u2013 has allowed these devices to achieve high-grade security without the need for a physically distinct token. This has already been recognized by the U.S. government and the European Banking Authority (EBA)<\/li>\n\n\n\n<li><strong>As governments promote or require strong authentication, make sure it is the \u201cright\u201d authentication.&nbsp;<\/strong>Governments should not build rules around \u201cold\u201d authentication technologies that can hinder adoption by imposing significant costs and burdens on the user, nor should they build rules around authentication technologies that have security and privacy issues that put users at risk<\/li>\n<\/ul>\n\n\n\n<p>Policymakers working on authentication requirements can request a briefing from the FIDO Alliance by filling out the form&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/fidoalliance.org\/contact\/\" target=\"_blank\">here<\/a>.<\/p>\n\n\n\n<p>Governments all around the world are deploying FIDO. Learn about them on the&nbsp;<a href=\"https:\/\/fidoalliance.org\/fido-government-deployments-and-recognitions\/\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Government Deployments<\/a>&nbsp;page.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FIDO Alliance Public Policy Submissions<\/h2>\n\n\n\n<p><br><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/10\/FIDO-Alliance-Comments-to-US-Treasury-RFC-on-Illicit-Finance-October-2025.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Comments to the U.S. Department of the Treasury<\/a> (October 2025): In this input document, the FIDO Alliance comments to the U.S. Department of the Treasury: Innovative Methods To Detect Illicit Activity Involving Digital Assets\u00a0.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/04\/FIDO-Alliance-letter-to-DG-FISMA-April-2025.pdf\">FIDO Alliance Input to DG-FISMA<\/a> (April 2025): In this input document, the FIDO Alliance comments to DG-FISMA\u2019s: Second Payment Services Directive (PSD2) and create a new Payment Services Regulation (PSR).<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FIDO-Alliance-Letter-to-RBI-Dec-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to Reserve Bank of India (RBI)<\/a> (December 2024): In this input document, the FIDO Alliance comments to Reserve Bank of India (RBI): Draft Framework for Comments on Alternative Authentication Mechanisms for Digital Payment Transactions.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FIDO-Alliance-Response-ENISA-Draft-NIS2-Guidance-Dec-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to ENISA<\/a> (December 2024): In this input document, the FIDO Alliance comments to ENISA: Draft Implementing Guidance for NIS2 Security Measures.<\/p>\n\n\n\n<p>FIDO Alliance Input to NIST&nbsp;(October 2024) and&nbsp;<a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/10\/FIDO-Alliance-Comments-sp800-63-4-suite-2pd-10.7.24.xlsx\" target=\"_blank\" rel=\"noreferrer noopener\">Comment Template<\/a>: In this input document, the FIDO Alliance comments to NIST \u2013 SP 800-63-4 Suite (Second Public Draft).<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/09\/FIDO-response-to-EC-on-EUDI-Draft-Acts-9.9.24.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to European Commission<\/a> (September 2024): In this input document, the FIDO Alliance comments to the European Commission: Draft Implementing Act \u2013&nbsp;European Digital Identity Wallets: Integrity and Core Functionalities.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/08\/FIDO-Alliance-Response-NIS2-Draft-Requirements-July-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to European Commission<\/a> (July 2024): In this input document, the FIDO Alliance comments to the European Commission: NIS2 Directive Draft Requirements.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/04\/FIDO-Alliance-Input-to-Ministry-of-Economy-Trade-and-Industry-METI-IOT-Certification-April-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to METI<\/a> (April 2024): In this input document, the FIDO Alliance comments to Ministry of Economy, Trade and Industry (METI): IoT Product Security Conformity Assessment Scheme Policy Draft.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/01\/FIDO-Alliance-Letter-Turkey-BRSA-1.31.2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to BRSA<\/a> (January 2024): In this input document, the FIDO Alliance comments to Turkish Banking Regulation and Supervision Agency\u2019s (BRSA) Circular 2023\/1.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/01\/FIDO-Alliance-Comments-Draft-SP-800-171r3.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to NIST<\/a> (January 2024): In this input document, the FIDO Alliance comments to NIST SP 800-171r3: Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/11\/FIDO-Alliance-Comments-USG-Proposed-FAR-Clauses-for-Contractors.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to the USG Proposed FAR Clauses for Contractors<\/a>&nbsp;(November 2023): In this input document, the FIDO Alliance comments to FAR Case 2021\u2013019: Standardizing Cybersecurity Requirements for Unclassified Federal Information Systems.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/08\/FIDO-ALLIANCE-Response-to-NY-DFS-August-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to the New York Department of Financial Services (DFS)<\/a>&nbsp;(August 2023):<br>In this input document, the FIDO Alliance comments to DFS \u2013 Revised Proposed 2nd Amendment to Regulation 23 NYCRR 500 \u2013Cybersecurity Requirements for Financial Services Companies.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/06\/FIDO-ALLIANCE-Response-to-NIST-Draft-IAM-Roadmap-June-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to NIST<\/a>&nbsp;(June 2023):<br>In this input document, the FIDO Alliance comments to NIST \u2013 Identity and Access Management Roadmap (Draft).<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/04\/FIDO-ALLIANCE-Response-to-NIST-Draft-800-63-4-call-for-comments-April-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to NIST<\/a>&nbsp;(April 2023) and&nbsp;<a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/04\/FIDO-Comments-on-NIST-SP800-63-4-Draft-April-2023-v2.xlsx\" target=\"_blank\" rel=\"noreferrer noopener\">Comment Template<\/a>:<br>In this input document, the FIDO Alliance comments to NIST \u2013 SP 800-63-4 Digital Identity Guidelines (Draft).<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/01\/FIDO-ALLIANCE-Response-to-CFPB-SBREFA-RFI-on-Consumer-Data-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to CFPB<\/a>&nbsp;(January 2023):<br>In this input document, the FIDO Alliance comments to the&nbsp;CFPB \u2013 Small Business Advisory Review Panel on Required Rulemaking on Personal Financial Date Rights.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/01\/FIDO-ALLIANCE-Response-to-NY-DFS-January-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to DFS<\/a>&nbsp;(January 2023):<br>In this input document, the FIDO Alliance comments to the&nbsp;DFS \u2013 Proposed Cybersecurity Requirements for Financial Services Companies \u2013 23 NYCRR Part 500.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2022\/09\/FIDO-ALLIANCE-Response-to-NY-DFS-August-2022-1.pdf\">FIDO Alliance Input to DFS<\/a>&nbsp;(August 2022):<br>In this input document, the FIDO Alliance comments to the&nbsp;DFS \u2013 Proposed Cybersecurity Requirements for Financial Services Companies.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2022\/04\/FIDO-ALLIANCE-Response-to-SEC-April-2022.pdf\">FIDO Alliance Input to SEC<\/a>&nbsp;(April 2022):<br>In this input document, the FIDO Alliance comments to the SEC \u2013 Proposed Cybersecurity Risk Management Rules for Investment Advisers, Registered Investment Companies, and Business Development Companies.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/11\/FIDO-ALLIANCE-Response-to-FCC-SIM-Swap-NPRM-Nov-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to FCC<\/a>&nbsp;(November 2021):<br>In this input document, the FIDO Alliance comments to the FCC \u2013 NPRM on Rules to Prevent SIM Swapping and Port-Out Fraud.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/10\/FIDO-ALLIANCE-Response-to-NIST-IOT-Consumer-labelling-October-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to NIST<\/a>&nbsp;(October 2021):<br>In this input document, the FIDO Alliance comments on NIST\u2019s Consumer Labeling for IoT Devices.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/10\/FIDO-ALLIANCE-Inputs-to-the-EC-on-eIDAS-2.0-October-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to the European Commission<\/a>&nbsp;(October 2021):<br>In this input document, the FIDO Alliance comments on the European Commission \u2013 using FIDO Standards in eIDAS 2.0.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/10\/FIDO-Alliance-Input-to-CISA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to CISA<\/a>&nbsp;(October 2021):<br>In this input document, the FIDO Alliance comments on the Draft Zero Trust Maturity Model and Cloud Security Technical Reference Architecture.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/09\/FIDO-ALLIANCE-Response-to-OMB-Draft-ZT-Strategy-September-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to OMB<\/a>&nbsp;(September 2021):<br>In this input document, the FIDO Alliance comments on the Draft Federal Zero Trust Strategy published by the White House Office of Management and Budget (OMB).&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/02\/FIDO-ALLIANCE-Response-to-NIST-Feb-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to NIST<\/a>&nbsp;(February 2021):<br>In this input document, the FIDO Alliance comments on NIST\u2019s Draft Guidance for Federal Agencies and IoT Device Manufacturers.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/02\/FIDO-ALLIANCE-Response-to-CFPB-ANPR-on-Consumer-Data-Feb-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to the Consumer Financial Protection Bureau<\/a>&nbsp;(February 2021):<br>In this input document, the FIDO Alliance comments to the Consumer Financial Protection Bureau (CFPB) on Consumer Access to Financial Records.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2020\/10\/FIDO-ALLIANCE-Response-to-NIST-IOT-Onboarding-Draft-October-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to NIST<\/a>&nbsp;(October 2020):<br>In this input document, the FIDO Alliance comments on the NIST\u2019s draft on Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2020\/09\/FIDO-ALLIANCE-Response-to-EC-on-eIDAS-Inception-Impact-Assessment-September-2020-1-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to the European Commission<\/a>&nbsp;(September 2020):<br>In this input document, the FIDO Alliance comments on the European Commission\u2019s (EC) Inception Impact Assessment regarding the future of eIDAS.&nbsp;FIDO Alliance comments in four areas for the EC\u2019s consideration: 1. With regard to authentication \u2013 the EC should ensure that any LOA High solutions require high assurance authentication.&nbsp;2. Extension of eIDAS to the private sector under Option 2 would be well-received by many companies.&nbsp;3. All Europeans could benefit by creating new options for creating digital versions of physical identity documents.&nbsp;4. Mutual recognition and re-use of pre-approved ID products.&nbsp;<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2020\/09\/FIDO-ALLIANCE-Response-to-NIST-800-63-3-call-for-comments.pdf\" target=\"_blank\">FIDO Alliance Input to the National Institute of Standards and Technology (NIST)<\/a>&nbsp;(August 2020):<br>In this input document, the FIDO Alliance comments on NIST\u2019s Pre-Draft Call for Comments on Digital Identity Guidelines. FIDO Alliance offers comments in three areas for the NIST\u2019s consideration: 1. Recognize changes in both threat and technology since the publication of SP 800-63-3. 2. AAL3 \u2013 explore new paths. 3. Reference to FIDO standards.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2020\/09\/FIDO-ALLIANCE-Response-to-DEA-ECPS-RFC-June-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Input to the Drug Enforcement Administration (DEA)<\/a>&nbsp;(June 2020):<br>In this input document, the FIDO Alliance comments on Docket No. DEA-218I, the Drug Enforcement Administration\u2019s (DEA) Request for Comments on the Interim Final Rule for Electronic Prescriptions for Controlled Substances (EPCS). FIDO Alliance comments in four parts and are largely focused on the portions of the request for comment that focus on authentication requirements in the interim final rule: 1. Observations on current regulations and how technology has evolved over the last ten years. 2. An introduction to FIDO Authentication and FIDO Alliance certification programs. 3. Answers to specific DEA questions from the Request for Comments. 4. Suggestions on ways DEA can ensure revised EPCS regulations stay current as technology and threat evolve.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/how_fido_meets_the_rts_requirements\/\">How FIDO Standards Meet PSD2\u2019s Regulatory Technical Standards Requirements On Strong Customer Authentication<\/a>&nbsp;(December 2018):<br>This document provides a detailed review of the security requirements listed in the Regulatory Technical Standards For Strong Customer Authentication and Common and Secure Open Standards Of Communication under PSD2 (the RTS) and describes how the FIDO standards meet such requirements.&nbsp;<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/fidoalliance.org\/fido_alliance_gdpr_faq_september2018\/\" target=\"_blank\">FAQ on FIDO relevance for the GDPR&nbsp;<\/a>(September 2018):<br>This document provides answers to questions on authentication, user consent, use of biometrics\u2026in the context of the European General Data Protection Regulation. It shows how FIDO authentication can help service providers comply with the regulation.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/FIDO_Alliance_Letter_Regarding_PSD2-SCA.pdf\" target=\"_blank\">FIDO Alliance Letter Regarding Payment Services Directive 2<\/a>&nbsp;(August 2017):<br>FIDO Alliance\u2019s letter to European Commission and European Parliament on whether screen scraping should be allowed as a fallback option under PSD2<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/FIDO_ALLIANCE_RESPONSE_TO_NIST_CSF_RFI-4.7.2017.pdf\" target=\"_blank\">FIDO Alliance Input to the National Institute of Standards and Technology (NIST): Request for Information (RFI) on the Framework for Improving Critical Infrastructure Cybersecurity<\/a>&nbsp;(April 2017):<br>In its input to NIST on the proposed changes to the Cybersecurity Framework, the FIDO Alliance recommends that NIST clarify their language and explicitly require MFA in the next update to the Framework. The Alliance urges NIST to add a new \u201cauthentication\u201d sub-category to the Framework core with the recommendation that: \u201cauthentication of authorized users is protected by multiple factors.\u201d Explicitly addressing MFA with this language is necessary to help government and industry address growing risks caused by weak authentication, and should be part of any proper update of the Framework.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/FIDO_EBA_Response_2016-02-08.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PSD2)<\/a><br>In this response to the EBA, the FIDO Alliance details how FIDO-compliant implementations that follow security best practices are ideal examples of what the EBA regulations for \u201cstrong customer authentication\u201d under PSD2 are striving to foster: simpler, stronger authentication capabilities that merchants and consumers will adopt at scale. The response also describes how the EBA\u2019s acceptance of FIDO\u2019s public key cryptographic architecture, especially when combined with on-device biometrics, will reduce the vulnerability surface of their payment service providers \u2014 and presumably also reduce online fraud rates as a result \u2014 and accelerate overall online payment volume through reduced friction in the user experience.<\/p>\n\n\n\n<p><a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/FIDO__Privacy_White_Paper_Jan_2016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Privacy: FIDO Alliance White Paper<\/a><br>This white paper describes how privacy has been taken into account in the design of the FIDO protocols, and how they can help meet privacy requirements from certain regulatory authorities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As technology evolves, policy needs to evolve with it. The global market is bursting with innovation around authentication technology \u2013 but some solutions are better equipped to meet the security [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"footnotes":""},"content-type":[],"class_list":["post-67112","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/67112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/comments?post=67112"}],"version-history":[{"count":0,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/67112\/revisions"}],"wp:attachment":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/media?parent=67112"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/content-type?post=67112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}