{"id":2179,"date":"2025-03-18T13:05:22","date_gmt":"2025-03-18T13:05:22","guid":{"rendered":"https:\/\/ttalesinteractive.com\/?page_id=2179"},"modified":"2025-03-18T16:35:33","modified_gmt":"2025-03-18T16:35:33","slug":"k1-k2-solutions-explained","status":"publish","type":"page","link":"https:\/\/ttalesinteractive.com\/?page_id=2179","title":{"rendered":"K1 &amp; K2 Solutions Explained"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">K1:<\/h2>\n\n\n\n<p><strong>Overview: <\/strong>This lays out step by step how K1 was solved, the methods and keys used to obtain a proper output. You can find more information about the <a href=\"https:\/\/ttalesinteractive.com\/?page_id=2175\">corrected Kryptos solutions here.<\/a><\/p>\n\n\n\n<p><strong>Encrypted text:<\/strong> <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD<\/code><\/pre>\n\n\n\n<p><strong>Decrypted text: <\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION<\/code><\/pre>\n\n\n\n<p><strong>Information given:<\/strong> Tableau, encrypted text, contextual environment clues<\/p>\n\n\n\n<p><strong>Method commonly cited:<\/strong> Double Vigen\u00e8re with \u201cKryptos\u201d, \u201cPalimpsest\u201d<\/p>\n\n\n\n<p><strong>Actual method: <\/strong>Quagmire III, running key \u201cKRYPTOS\u201d with key \u201cPALIMPSEST\u201d<\/p>\n\n\n\n<p><strong>Output with Double Vigen\u00e8re: <\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>FVLIKEPXIOWEZUWXTROEWAPHRZARDYIUUUPRLVJPNDDVLHABHBPLYPTFIDBVERA<\/code><\/pre>\n\n\n\n<p><strong>Output with Quagmire 3: <\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>BETWEENSUBTLESHADINGANDTHEABSENCEOFLIGHTLIESTHENUANCEOFIQLUSION<\/code><\/pre>\n\n\n\n<p><strong>Steps to Solve Kryptos K1 (Quagmire III Cipher):<\/strong><\/p>\n\n\n\n<p><strong>Step 1: Understand the Cipher Basics<\/strong><strong><br><\/strong> Quagmire III uses two keys:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Alphabet Key<\/strong> (used to rearrange the alphabet): &#8220;KRYPTOS&#8221;<\/li>\n\n\n\n<li><strong>Running Key<\/strong> (used repeatedly to decode each letter): &#8220;PALIMPSEST&#8221;<\/li>\n<\/ul>\n\n\n\n<p><strong>Step 2: Create a Keyed Alphabet<\/strong><strong><br><\/strong>First, we write down the alphabet (A-Z). But instead of starting with &#8220;A&#8221;, we use the <strong>Alphabet Key<\/strong> first. Like this:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>KRYPTOSABCDEFGHIJLMNQUVWXZ<\/code><\/pre>\n\n\n\n<p>Notice we put letters from &#8220;KRYPTOS&#8221; first, and then added the remaining letters from the alphabet in order (skipping any we&#8217;ve already used). This is the text we get when we look at the \u2018tableau\u2019, that sort of spiral of text you see the word &#8220;KRYPTOS&#8221; in over and over.<\/p>\n\n\n\n<p><strong>Step 3: Use the Running Key<\/strong><strong><br><\/strong>The <strong>Running Key<\/strong> (&#8220;PALIMPSEST&#8221;) repeats itself to match the length of the encrypted message. For example, if your cipher text is 10 letters long, &#8220;PALIMPSEST&#8221; repeats as &#8220;PALIMPSESTPALIMP&#8230;&#8221; until it matches the cipher&#8217;s length exactly.<\/p>\n\n\n\n<p><strong>Step 4: Decoding Each Letter (the math)<\/strong><strong><br><\/strong> To decode, use this simple subtraction method for each cipher letter:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Find the position of the current <strong>Running Key letter<\/strong> in your special keyed alphabet. Call this position the &#8220;shift number.&#8221;<\/li>\n\n\n\n<li>Find the position of your cipher (encrypted) letter in that same keyed alphabet.<\/li>\n\n\n\n<li>Subtract the &#8220;shift number&#8221; from the cipher letter&#8217;s position. If this number is negative, just add 26 to wrap around.<\/li>\n\n\n\n<li>The result gives you the position of the decoded letter in the keyed alphabet.<\/li>\n<\/ul>\n\n\n\n<p>Here&#8217;s an example with the first letter of Kryptos K1:<\/p>\n\n\n\n<p><strong>Cipher Letter:<\/strong> E<br><strong>Running Key Letter:<\/strong> P<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Special Alphabet: KRYPTOSABCDEFGHIJLMNQUVWXZ<\/li>\n\n\n\n<li>Position of P = 3 (count from 0: K=0, R=1, Y=2, <strong>P=3<\/strong>&#8230;)<\/li>\n\n\n\n<li>Position of E = 11 (K=0, R=1, Y=2, P=3, T=4, O=5, S=6, A=7, B=8, C=9, D=10, <strong>E=11<\/strong>&#8230;)<\/li>\n<\/ul>\n\n\n\n<p>Now subtract:<br>11 (cipher letter E) &#8211; 3 (key letter P) = 8<\/p>\n\n\n\n<p>Position 8 in your special alphabet is the decoded letter: B<\/p>\n\n\n\n<p>You repeat this for every letter in your cipher. If you follow these steps carefully for every letter, you&#8217;ll end up with the verified, known plaintext solution:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">K2:<\/h2>\n\n\n\n<p><strong>Encrypted text: <\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>VFPJUDEEHZWETZYVGWHKKQETGFQJNCE GGWHKK?DQMCPFQZDQMMIAGPFXHQRLG TIMVMZJANQLVKQEDAGDVFRPJUNGEUNA QZGZLECGYUXUEENJTBJLBQCRTBJDFHRR YIZETKZEMVDUFKSJHKFWHKUWQLSZFTI HHDDDUVH?DWKBFUFPWNTDFIYCUQZERE EVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDX FLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKF FHQNTGPUAECNUVPDJMQCLQUMUNEDFQ ELZZVRRGKFFVOEEXBDMVPNFQXEZLGRE DNQFMPNZGLFLPMRJQYALMGNUVPDXVKP DQUMEBEDMHDAFMJGZNUPLGEWJLLAETG<\/code><\/pre>\n\n\n\n<p><strong>Decrypted text:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ITWASTOTALLYINVISIBLEHOWSTHATPOSSIBLETHEYUSEDTHEEARTHSMAGNETICFIELDXTHEINFORMATIONWASGATHEREDANDTRANSMITTEDUNDERGRUUNDTOANUNKNOWNLOCATIONXDOESLANGLEYKNOWABOUTTHISTHEYSHOULDITSBURIEDOUTTHERESOMEWHEREXWHOKNOWSTHEEXACTLOCATIONONLYWWTHISWASHISLASTMESSAGEXTHIRTYEIGHTDEGREESFIFTYSEVENMINUTESSIXPOINTFIVESECONDSNORTHSEVENTYSEVENDEGREESEIGHTMINUTESFORTYFOURSECONDSWESTXLAYER2<\/code><\/pre>\n\n\n\n<p><strong>Information given: <\/strong>Tableau, encrypted text, contextual environment clues, clues from K1<\/p>\n\n\n\n<p><strong>Method commonly cited:<\/strong> Double Vigen\u00e8re with \u201cKryptos\u201d, \u201cAbscissa\u201d<\/p>\n\n\n\n<p><strong>Actual method:<\/strong> Quagmire3, alphabet key \u201cKRYPTOS\u201d with key \u201cAbscissa\u201d<\/p>\n\n\n\n<p><strong>Output with Double Vigen\u00e8re:<\/strong> <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>QHJAZXDPXJLCWNHKUKLYZTSSUFOHQAKPL... (random, nonsensical text)<\/code><\/pre>\n\n\n\n<p><strong>Output with Quagmire 3:&nbsp;<\/strong> <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ITWASTOTALLYINVISIBLEHOWSTHATPOSSIBLE....<\/code><\/pre>\n\n\n\n<p><strong>Steps to solve:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Construct a keyed alphabet by writing the Alphabet Key (&#8220;KRYPTOS&#8221;) followed by the remaining letters of the alphabet in normal order, skipping duplicates.<\/li>\n\n\n\n<li>Use the Running Key (&#8220;ABSCISSA&#8221;) repeatedly, expanding it to match the length of the ciphertext.<\/li>\n\n\n\n<li>Decrypt each cipher letter individually by:\n<ul class=\"wp-block-list\">\n<li>Finding the position of the corresponding letter from the Running Key in the special keyed alphabet (this position becomes your numeric shift).<\/li>\n\n\n\n<li>Finding the cipher letter&#8217;s position in the keyed alphabet.<\/li>\n\n\n\n<li>Subtracting the numeric shift from the cipher letter&#8217;s position (add 26 if negative).<\/li>\n\n\n\n<li>The resulting number gives the plaintext letter\u2019s position in the keyed alphabet.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Continue this process for each ciphertext character until the entire message is decoded.<\/li>\n<\/ol>\n\n\n\n<p><strong>Verifiable solution:<\/strong><\/p>\n\n\n\n<p>[To run, create a python file, then in the cmd, run that python file, these are as simple as possible so that even someone who does not understand code can go through them easily. Or visit this github page.]<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>import tkinter as tk\nfrom tkinter import ttk, messagebox\n\n# Build a keyed alphabet (no repeats)\ndef build_keyed_alphabet(key):\n    key = key.upper()\n    alphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'\n    keyed_alpha = ''\n    for char in key + alphabet:\n        if char not in keyed_alpha:\n            keyed_alpha += char\n    return keyed_alpha\n\n# Quagmire III decryption\ndef quagmire3_decrypt(cipher, alphabet_key, running_key):\n    cipher = cipher.upper().replace(' ', '')\n    alphabet = build_keyed_alphabet(alphabet_key)\n    running_key = running_key.upper()\n    full_key = (running_key * ((len(cipher) \/\/ len(running_key)) + 1))&#91;:len(cipher)]\n    \n    plaintext = \"\"\n    key_index = 0\n    for char in cipher:\n        if char.isalpha():\n            k_char = full_key&#91;key_index]\n            key_index += 1\n            row = alphabet.find(k_char)\n            col = alphabet.find(char)\n            decrypted_char = alphabet&#91;(col - row) % 26]\n            plaintext += decrypted_char\n        else:\n            plaintext += char\n    return plaintext\n\n\n# GUI Application\nclass QuagmireCipherSolver:\n    def __init__(self, root):\n        self.root = root\n        self.root.title(\"Quagmire III Cipher Solver\")\n\n        ttk.Label(root, text=\"Cipher Text:\").grid(row=0, column=0, sticky=tk.W)\n        self.cipher_entry = ttk.Entry(root, width=60)\n        self.cipher_entry.grid(row=0, column=1, padx=5, pady=5)\n\n        ttk.Label(root, text=\"Alphabet Key:\").grid(row=1, column=0, sticky=tk.W)\n        self.alpha_key_entry = ttk.Entry(root, width=60)\n        self.alpha_key_entry.grid(row=1, column=1, padx=5, pady=5)\n\n        ttk.Label(root, text=\"Running Key:\").grid(row=2, column=0, sticky=tk.W)\n        self.run_key_entry = ttk.Entry(root, width=60)\n        self.run_key_entry.grid(row=2, column=1, padx=5, pady=5)\n\n        self.solve_button = ttk.Button(root, text=\"Solve\", command=self.solve_cipher)\n        self.solve_button.grid(row=3, column=1, pady=10)\n\n        ttk.Label(root, text=\"Decrypted Text:\").grid(row=4, column=0, sticky=tk.W)\n        self.result_text = tk.Text(root, height=15, width=80)\n        self.result_text.grid(row=5, column=0, columnspan=2, padx=5, pady=5)\n\n        # Default test values\n        self.cipher_entry.insert(0, \"EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJYQTQUXQBQVYUVLLTREVJYQTMKYRDMFD\")\n        self.alpha_key_entry.insert(0, \"KRYPTOS\")\n        self.run_key_entry.insert(0, \"PALIMPSEST\")\n\n    def solve_cipher(self):\n        cipher = self.cipher_entry.get()\n        alpha_key = self.alpha_key_entry.get()\n        run_key = self.run_key_entry.get()\n\n        if not cipher or not alpha_key or not run_key:\n            messagebox.showerror(\"Input Error\", \"All fields must be filled in.\")\n            return\n\n        plaintext = quagmire3_decrypt(cipher, alpha_key, run_key)\n\n        self.result_text.delete('1.0', tk.END)\n        self.result_text.insert(tk.END, plaintext)\n\nif __name__ == '__main__':\n    root = tk.Tk()\n    app = QuagmireCipherSolver(root)\n    root.mainloop()\n<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>K1: Overview: This lays out step by step how K1 was solved, the methods and keys used to obtain a proper output. You can find more information about the corrected Kryptos solutions here. Encrypted text: Decrypted text: Information given: Tableau, encrypted text, contextual environment clues Method commonly cited: Double Vigen\u00e8re with \u201cKryptos\u201d, \u201cPalimpsest\u201d Actual method: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2179","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>K1 &amp; K2 Solutions Explained - Tenebrous Tales Interactive<\/title>\n<meta name=\"description\" content=\"Tenebrous Tales Interactive - K1 &amp; K2 Solutions Explained\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ttalesinteractive.com\/?page_id=2179\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"K1 &amp; K2 Solutions Explained - Tenebrous Tales Interactive\" \/>\n<meta property=\"og:description\" content=\"Tenebrous Tales Interactive - K1 &amp; K2 Solutions Explained\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ttalesinteractive.com\/?page_id=2179\" \/>\n<meta property=\"og:site_name\" content=\"Tenebrous Tales Interactive\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T16:35:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ttalesinteractive.com\/wp-content\/uploads\/2023\/10\/dark_Tentacles_banner_4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/?page_id=2179\",\"url\":\"https:\\\/\\\/ttalesinteractive.com\\\/?page_id=2179\",\"name\":\"K1 &amp; K2 Solutions Explained - Tenebrous Tales Interactive\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/#website\"},\"datePublished\":\"2025-03-18T13:05:22+00:00\",\"dateModified\":\"2025-03-18T16:35:33+00:00\",\"description\":\"Tenebrous Tales Interactive - K1 &amp; K2 Solutions Explained\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/?page_id=2179#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ttalesinteractive.com\\\/?page_id=2179\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/?page_id=2179#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ttalesinteractive.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"K1 &amp; K2 Solutions Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/#website\",\"url\":\"https:\\\/\\\/ttalesinteractive.com\\\/\",\"name\":\"Tenebrous Tales Interactive\",\"description\":\"Endless text adventures powered by AI.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/#organization\"},\"alternateName\":\"TTI\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ttalesinteractive.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/#organization\",\"name\":\"Tenebrous Tales Interactive\",\"alternateName\":\"TTI\",\"url\":\"https:\\\/\\\/ttalesinteractive.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ttalesinteractive.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/imageedit_1_8078511714.png\",\"contentUrl\":\"https:\\\/\\\/ttalesinteractive.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/imageedit_1_8078511714.png\",\"width\":1026,\"height\":1026,\"caption\":\"Tenebrous Tales Interactive\"},\"image\":{\"@id\":\"https:\\\/\\\/ttalesinteractive.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K1 &amp; K2 Solutions Explained - Tenebrous Tales Interactive","description":"Tenebrous Tales Interactive - K1 &amp; K2 Solutions Explained","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ttalesinteractive.com\/?page_id=2179","og_locale":"en_US","og_type":"article","og_title":"K1 &amp; K2 Solutions Explained - Tenebrous Tales Interactive","og_description":"Tenebrous Tales Interactive - K1 &amp; K2 Solutions Explained","og_url":"https:\/\/ttalesinteractive.com\/?page_id=2179","og_site_name":"Tenebrous Tales Interactive","article_modified_time":"2025-03-18T16:35:33+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/ttalesinteractive.com\/wp-content\/uploads\/2023\/10\/dark_Tentacles_banner_4.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ttalesinteractive.com\/?page_id=2179","url":"https:\/\/ttalesinteractive.com\/?page_id=2179","name":"K1 &amp; K2 Solutions Explained - Tenebrous Tales Interactive","isPartOf":{"@id":"https:\/\/ttalesinteractive.com\/#website"},"datePublished":"2025-03-18T13:05:22+00:00","dateModified":"2025-03-18T16:35:33+00:00","description":"Tenebrous Tales Interactive - K1 &amp; K2 Solutions Explained","breadcrumb":{"@id":"https:\/\/ttalesinteractive.com\/?page_id=2179#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ttalesinteractive.com\/?page_id=2179"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ttalesinteractive.com\/?page_id=2179#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ttalesinteractive.com\/"},{"@type":"ListItem","position":2,"name":"K1 &amp; K2 Solutions Explained"}]},{"@type":"WebSite","@id":"https:\/\/ttalesinteractive.com\/#website","url":"https:\/\/ttalesinteractive.com\/","name":"Tenebrous Tales Interactive","description":"Endless text adventures powered by AI.","publisher":{"@id":"https:\/\/ttalesinteractive.com\/#organization"},"alternateName":"TTI","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ttalesinteractive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ttalesinteractive.com\/#organization","name":"Tenebrous Tales Interactive","alternateName":"TTI","url":"https:\/\/ttalesinteractive.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ttalesinteractive.com\/#\/schema\/logo\/image\/","url":"https:\/\/ttalesinteractive.com\/wp-content\/uploads\/2023\/10\/imageedit_1_8078511714.png","contentUrl":"https:\/\/ttalesinteractive.com\/wp-content\/uploads\/2023\/10\/imageedit_1_8078511714.png","width":1026,"height":1026,"caption":"Tenebrous Tales Interactive"},"image":{"@id":"https:\/\/ttalesinteractive.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=\/wp\/v2\/pages\/2179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2179"}],"version-history":[{"count":6,"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=\/wp\/v2\/pages\/2179\/revisions"}],"predecessor-version":[{"id":2219,"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=\/wp\/v2\/pages\/2179\/revisions\/2219"}],"wp:attachment":[{"href":"https:\/\/ttalesinteractive.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}