{"id":90,"date":"2017-09-08T15:50:45","date_gmt":"2017-09-08T15:50:45","guid":{"rendered":"http:\/\/www.q-crypt.com\/blog\/?p=90"},"modified":"2021-03-03T11:02:54","modified_gmt":"2021-03-03T11:02:54","slug":"six","status":"publish","type":"post","link":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/","title":{"rendered":"EPR-Bell Simulation with 6 independent operators"},"content":{"rendered":"<p><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">Instead of a synthetic simulation, let&#8217;s simulate each device with 6 distinct and well-separated operators.<\/span><\/span><\/p>\n<p><span class=\"\">Each will get 1 or 2 possible files and parameters and will output a result file to another operator.<\/span><\/p>\n<p><span class=\"\">All operators log into the program folder, which contains data\/ and bin\/ .<\/span><\/p>\n<div id=\"gt-res-content\">\n<h4 id=\"gt-res-dir-ctr\" class=\"trans-verified-button-small\" dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">Operator 1: the source<\/span><\/span><\/h4>\n<p class=\"trans-verified-button-small\" dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\">It is the pairs source ; there is no input file but 2 arguments , the number of common variables and the output file.<\/span><\/p>\n<blockquote><p><strong>.\/bin\/qgenHid 10000000 data\/hid<\/strong><\/p><\/blockquote>\n<p>Of course, each command run produces a different file.<\/p>\n<p>The file will contain 10000000 rows for every 10000000 implicit pairs symbolized by the list of hidden variables in the row. These are generated randomly and evenly over a range of 360 units or what you want for little to adjust the scripts. It is quite possible to generate random original sequences. We did this with physical origins sources, like annual records of hardware parasites, sequences from laboratories and astronomical data!<\/p>\n<h5 class=\"trans-verified-button-small\" dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\">Operator 1 should send the data\/hid file to operators 4 and 5 by separate mailings.<\/span><\/h5>\n<h5 class=\"trans-verified-button-small\" dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\">\u00a0<\/span><\/h5>\n<\/div>\n<h4>Operators 2 e&amp; 3 : Two random rotations producers<\/h4>\n<p>number of lines and output file and for each arm<\/p>\n<blockquote><p><strong>.\/bin\/qRotat 10000000 data\/bob.rot<\/strong><\/p><\/blockquote>\n<p>and the other<\/p>\n<blockquote><p><strong>.\/bin\/qRotat 10000000 data\/alice.rot<\/strong><\/p><\/blockquote>\n<p><span id=\"result_box\" class=\"\" lang=\"en\">Of course, each command run produces a different file.<\/span><\/p>\n<h5 class=\"trans-verified-button-small\" dir=\"ltr\"><span class=\"\" lang=\"en\">Operators 2 &amp; 3 should send <\/span><strong>data\/bob.rot<\/strong> and <strong>data\/alice.rot respectively <\/strong><span id=\"result_box\" class=\"\" lang=\"en\">to operators 4 and 5.<\/span><\/h5>\n<h4>Operators 4 &amp; 5 : Deux polarizers<\/h4>\n<p><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">The function will take as argument the previous output files and the global parameters that they actually share:<\/span><br \/>\n<span class=\"\">&#8211; the number of doors of the potential barrier,<\/span><br \/>\n<span class=\"\">&#8211; the maximum number of attempts to pass it<\/span><br \/>\n<span class=\"\">&#8211; and a parameter of variability of the transmission law.<\/span><br \/>\n<\/span><\/p>\n<blockquote><p><strong>.\/bin\/qPolarize 2 7 20 data\/hid data\/alice.rot data\/alice.polarized<\/strong><\/p><\/blockquote>\n<p>and the other<\/p>\n<blockquote><p><strong>.\/bin\/qPolarize 2 7 20 data\/hid data\/bob.rot data\/bob.polarized<\/strong><\/p><\/blockquote>\n<p><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">The output files will contain the rotation angle of the polarizer and the result -1, 0 or 1 of its crossing function for each line.<\/span><\/span><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\">Of course, each command run produces a different file.<\/span><\/p>\n<h5 class=\"trans-verified-button-small\" dir=\"ltr\"><span class=\"\" lang=\"en\">Operators 4 &amp; 5 should send <\/span><strong>data\/bob.<\/strong><strong>polarized <\/strong>and <strong>data\/alice.<\/strong><strong>polarized <\/strong><strong>respectively <\/strong><span id=\"result_box\" class=\"\" lang=\"en\">to operator 6.<\/span><\/h5>\n<p><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">There is no need to be coordinated in any way.<\/span><\/span><\/p>\n<div id=\"gt-res-content\">\n<h4 id=\"gt-res-dir-ctr\" class=\"trans-verified-button-small\" dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">Operator 6: A comparator and coincidence counter<\/span><\/span><\/h4>\n<p class=\"trans-verified-button-small\" dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\">It will take in arguments the 2 files received and will produce the file of the correlations statistical analysis in a file compatible with a spreadsheet.<\/span><\/p>\n<p>Normally they will be of the same combination of parameters but nothing prohibits analyzing the impact of variations in subsequent explorations.<\/p>\n<blockquote><p><strong>.\/bin\/qStat data\/alice.polarized data\/bob.polarized data\/alice.bob.csv<br \/>\n<\/strong><\/p><\/blockquote>\n<p>Add the comma option if you are using a locale with a comma as decimal separator.<\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\">The function computes the correlations line by line and outputs :<br \/>\n<span class=\"\">&#8211; for each difference of angles of the polarizers, the observed frequencies compared to the cos\u00b2,<\/span><br \/>\n<span class=\"\">&#8211; and for each angle, the frequencies of + and &#8211; compared to their quantum probability of 1\/2.<\/span><\/span><\/p>\n<\/div>\n<h4>Conclusion<\/h4>\n<p><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"\">It is time to import data\/alice.bob.csv into a spreadsheet ( or any dedicated tool from your own ) to analyze it and create graphs at your convenience.<\/span> The columns of interest are I, J and K. <span class=\"\">The values of Bell and CSCH to be compared in 2 are at the bottom.<\/span> The tables include values required for calculations, including \\( E_ {CSCH} \\).<\/span><\/p>\n<p><em>In general, an experiment records what it detects. We must do the same.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-801 size-full\" src=\"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg\" alt=\"five or six entangled checkers\" width=\"640\" height=\"467\" srcset=\"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg 640w, https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640-300x219.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><em>\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Instead of a synthetic simulation, let&#8217;s simulate each device with 6 distinct and well-separated operators. Each will get 1 or 2 possible files and parameters <a class=\"mh-excerpt-more\" href=\"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/\" title=\"EPR-Bell Simulation with 6 independent operators\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-90","post","type-post","status-publish","format-standard","hentry","category-epr-bell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EPR-Bell Simulation with 6 independent operators - q-Crypt<\/title>\n<meta name=\"description\" content=\"Let&#039;s simulate each device with 6 distinct and well-separated operators to discard exotic entanglements between parts of the software within the computer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EPR-Bell Simulation with 6 independent operators - q-Crypt\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s simulate each device with 6 distinct and well-separated operators to discard exotic entanglements between parts of the software within the computer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/\" \/>\n<meta property=\"og:site_name\" content=\"q-Crypt\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-08T15:50:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-03T11:02:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg\" \/>\n<meta name=\"author\" content=\"qcry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@igael123\" \/>\n<meta name=\"twitter:site\" content=\"@igael123\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"qcry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/\"},\"author\":{\"name\":\"qcry\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#\\\/schema\\\/person\\\/a29b2a4f7e3e0d1d49d71411a49618c9\"},\"headline\":\"EPR-Bell Simulation with 6 independent operators\",\"datePublished\":\"2017-09-08T15:50:45+00:00\",\"dateModified\":\"2021-03-03T11:02:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/\"},\"wordCount\":549,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.q-crypt.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/african-american-pixabay-3810584_640.jpg\",\"articleSection\":[\"EPR-Bell articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/\",\"url\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/\",\"name\":\"EPR-Bell Simulation with 6 independent operators - q-Crypt\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.q-crypt.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/african-american-pixabay-3810584_640.jpg\",\"datePublished\":\"2017-09-08T15:50:45+00:00\",\"dateModified\":\"2021-03-03T11:02:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#\\\/schema\\\/person\\\/a29b2a4f7e3e0d1d49d71411a49618c9\"},\"description\":\"Let's simulate each device with 6 distinct and well-separated operators to discard exotic entanglements between parts of the software within the computer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.q-crypt.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/african-american-pixabay-3810584_640.jpg\",\"contentUrl\":\"https:\\\/\\\/www.q-crypt.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/african-american-pixabay-3810584_640.jpg\",\"width\":640,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/index.php\\\/2017\\\/09\\\/08\\\/six\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.q-crypt.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EPR-Bell Simulation with 6 independent operators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#website\",\"url\":\"https:\\\/\\\/www.q-crypt.com\\\/\",\"name\":\"q-Crypt project\",\"description\":\"checking quantum computing investments\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.q-crypt.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.q-crypt.com\\\/#\\\/schema\\\/person\\\/a29b2a4f7e3e0d1d49d71411a49618c9\",\"name\":\"qcry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g\",\"caption\":\"qcry\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EPR-Bell Simulation with 6 independent operators - q-Crypt","description":"Let's simulate each device with 6 distinct and well-separated operators to discard exotic entanglements between parts of the software within the computer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/","og_locale":"en_US","og_type":"article","og_title":"EPR-Bell Simulation with 6 independent operators - q-Crypt","og_description":"Let's simulate each device with 6 distinct and well-separated operators to discard exotic entanglements between parts of the software within the computer.","og_url":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/","og_site_name":"q-Crypt","article_published_time":"2017-09-08T15:50:45+00:00","article_modified_time":"2021-03-03T11:02:54+00:00","og_image":[{"url":"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg","type":"","width":"","height":""}],"author":"qcry","twitter_card":"summary_large_image","twitter_creator":"@igael123","twitter_site":"@igael123","twitter_misc":{"Written by":"qcry","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#article","isPartOf":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/"},"author":{"name":"qcry","@id":"https:\/\/www.q-crypt.com\/#\/schema\/person\/a29b2a4f7e3e0d1d49d71411a49618c9"},"headline":"EPR-Bell Simulation with 6 independent operators","datePublished":"2017-09-08T15:50:45+00:00","dateModified":"2021-03-03T11:02:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/"},"wordCount":549,"commentCount":0,"image":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#primaryimage"},"thumbnailUrl":"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg","articleSection":["EPR-Bell articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/","url":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/","name":"EPR-Bell Simulation with 6 independent operators - q-Crypt","isPartOf":{"@id":"https:\/\/www.q-crypt.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#primaryimage"},"image":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#primaryimage"},"thumbnailUrl":"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg","datePublished":"2017-09-08T15:50:45+00:00","dateModified":"2021-03-03T11:02:54+00:00","author":{"@id":"https:\/\/www.q-crypt.com\/#\/schema\/person\/a29b2a4f7e3e0d1d49d71411a49618c9"},"description":"Let's simulate each device with 6 distinct and well-separated operators to discard exotic entanglements between parts of the software within the computer.","breadcrumb":{"@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#primaryimage","url":"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg","contentUrl":"https:\/\/www.q-crypt.com\/wp-content\/uploads\/2017\/10\/african-american-pixabay-3810584_640.jpg","width":640,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.q-crypt.com\/index.php\/2017\/09\/08\/six\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.q-crypt.com\/"},{"@type":"ListItem","position":2,"name":"EPR-Bell Simulation with 6 independent operators"}]},{"@type":"WebSite","@id":"https:\/\/www.q-crypt.com\/#website","url":"https:\/\/www.q-crypt.com\/","name":"q-Crypt project","description":"checking quantum computing investments","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.q-crypt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.q-crypt.com\/#\/schema\/person\/a29b2a4f7e3e0d1d49d71411a49618c9","name":"qcry","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f79d06ab0eec81a917741adc81b134e3309f55c9fb11bce3d165e08c9114300?s=96&d=mm&r=g","caption":"qcry"}}]}},"_links":{"self":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts\/90","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/comments?post=90"}],"version-history":[{"count":1,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts\/90\/revisions"}],"predecessor-version":[{"id":1474,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/posts\/90\/revisions\/1474"}],"wp:attachment":[{"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/media?parent=90"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/categories?post=90"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.q-crypt.com\/index.php\/wp-json\/wp\/v2\/tags?post=90"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}