{"id":7343,"date":"2021-10-26T16:36:55","date_gmt":"2021-10-26T11:06:55","guid":{"rendered":"https:\/\/www.iquanta.in\/blog\/?p=7343"},"modified":"2022-02-10T23:36:42","modified_gmt":"2022-02-10T18:06:42","slug":"apple-neural-hash-detection","status":"publish","type":"post","link":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/","title":{"rendered":"Apple neural hash | Apple detection"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#Apple_Neural_hash\" >Apple Neural hash<\/a><\/li><\/ul><\/nav><\/div>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Apple_Neural_hash\"><\/span>Apple Neural hash<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<hr \/>\n<p>Apple has always focused on one thing through all its ads campaigns, \u201cwhat happens on your iPhone stays on your iPhone\u201d.<\/p>\n<p>Apple has announced new technologies to detect child sexual abuse materials which seems to question the above tagline. The new technology has increased concern for privacy, surveillance, and tech-enabled crimes.<\/p>\n<p>As per Apple, these new features help in preventing child abuse but not at the expense of privacy. However, the question that is being raised is, what such technologies can do in the future?<\/p>\n<p>The new detection tool called NeuralHash can identify images of child abuse stored on iPhone without decrypting those images. Once detected, the images will be sent to the National Centre for Missing and Exploited Children (NCMEC) and then to law enforcement.<\/p>\n<p><a href=\"https:\/\/www.iquanta.in\/\"><img decoding=\"async\" class=\"alignnone wp-image-7711 td-animation-stack-type0-2\" src=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-300x57.jpeg\" sizes=\"(max-width: 384px) 100vw, 384px\" srcset=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-300x57.jpeg 300w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-1024x194.jpeg 1024w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-768x145.jpeg 768w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-640x121.jpeg 640w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-681x129.jpeg 681w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM.jpeg 1280w\" alt=\"\" width=\"384\" height=\"73\" \/><\/a><\/p>\n<p>There will be multiple checks to decrease any changes in the centre before being sent to NCMEC.<\/p>\n<p>Companies like Google, Microsoft, Dropbox are already scanning any material being stored on their servers. The premise is the same with the only difference being that some of Apple&#8217;s scans will occur on the iPhone itself.<\/p>\n<p>Apple\u2019s on-device scan will send an unreadable hash to the company which is a kind of code to identify images of child abuse based on the database maintained by NCMEC.<\/p>\n<p>This feature is only applicable to people who upload photos on iCloud. Those iCloud accounts are not encrypted so enforcement agencies can already have a look at them. Hence, there is no effect on privacy as said by Apple\u2019s spokesman.<\/p>\n<p>Now, the question being asked is why not Apply is scanning images when being uploaded to iCloud just like other companies are doing? Why is there a need to create a new technology to check on the images?<\/p>\n<p>The iPhone was one of the first personal devices to be encrypted automatically. iMessage is a popular messaging app with end-to-end encryption. However, iCloud accounts were never encrypted.<\/p>\n<p>The government has always been putting pressure on big tech firms to allow special access to encrypted data to law enforcement to prevent any crimes. Child Abuse has always been on the top of that list.<\/p>\n<p>Apple can probably go for encryption of iCloud and use their new technology to identify child abuse images which can be then sent to NCMEC.<\/p>\n<p>Presently, the new scanning technology is only being released in the USA.<\/p>\n<p>Apple has to decide on the next steps carefully. Such features have the potential to be weaponized by the government for broadening surveillance. In such a case, Apple will fail on its promise of ensuring privacy.<\/p>\n<p>To structure your\u00a0<a href=\"https:\/\/www.iquanta.in\/cat-online-coaching\">CAT online preparation<\/a>\u00a0in an efficient way consider joining iQuanta which is a\u00a0<a href=\"https:\/\/www.iquanta.in\/test\/iconcept\">top online cat coaching<\/a>\u00a0institute and being a part of the iQuanta CAT 22 Course.<br \/>\nYou can also check out and be a part of their\u00a0<a href=\"https:\/\/www.facebook.com\/groups\/Rockthecat\">Facebook group<\/a>\u00a0for peer learning, doubt solving and free material.<\/p>\n<p><a href=\"https:\/\/www.iquanta.in\/\"><img decoding=\"async\" class=\"alignnone wp-image-7711 td-animation-stack-type0-2\" src=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-300x57.jpeg\" sizes=\"(max-width: 384px) 100vw, 384px\" srcset=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-300x57.jpeg 300w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-1024x194.jpeg 1024w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-768x145.jpeg 768w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-640x121.jpeg 640w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM-681x129.jpeg 681w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/02\/WhatsApp-Image-2021-12-14-at-6.21.58-PM.jpeg 1280w\" alt=\"\" width=\"384\" height=\"73\" \/><\/a><\/p>\n<p>For 24*7 doubts-solving, FREE guidance and counselling and peer to peer learning, join the CAT preparation Fb group below:<\/p>\n<p><a href=\"http:\/\/www.facebook.com\/groups\/Rockthecat\/\"><img decoding=\"async\" class=\"alignnone wp-image-8002 td-animation-stack-type0-2\" src=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM.jpeg\" sizes=\"(max-width: 400px) 100vw, 400px\" srcset=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM.jpeg 1280w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM-300x57.jpeg 300w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM-1024x194.jpeg 1024w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM-768x145.jpeg 768w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM-640x121.jpeg 640w, https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/12\/WhatsApp-Image-2021-12-20-at-5.05.31-PM-681x129.jpeg 681w\" alt=\"CAT preparation Fb group\" width=\"400\" height=\"76\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple Neural hash Apple has always focused on one thing through all its ads campaigns, \u201cwhat happens on your iPhone stays on your iPhone\u201d. Apple has announced new technologies to detect child sexual abuse materials which seems to question the above tagline. The new technology has increased concern for privacy, surveillance, and tech-enabled crimes. As [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7413,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[369,367],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v21.9.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple neural hash | Apple detection | iQuanta best platform for CAT<\/title>\n<meta name=\"description\" content=\"NeuralHash is designed to identify known CSAM on a user\u2019s device Nural instead of scan photos, which Apple claims are more privacy-friendly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple neural hash | Apple detection\" \/>\n<meta property=\"og:description\" content=\"NeuralHash is designed to identify known CSAM on a user\u2019s device Nural instead of scan photos, which Apple claims are more privacy-friendly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"iQuanta\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/iquanta.in\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/jeet.singh.412224\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T11:06:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-10T18:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/10\/WhatsApp-Image-2021-10-25-at-3.18.14-PM.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Indrajeet Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Indrajeet Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\"},\"author\":{\"name\":\"Indrajeet Singh\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/#\/schema\/person\/2beb5d5f0836ae531bc05794e824b890\"},\"headline\":\"Apple neural hash | Apple detection\",\"datePublished\":\"2021-10-26T11:06:55+00:00\",\"dateModified\":\"2022-02-10T18:06:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\"},\"wordCount\":503,\"publisher\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/#organization\"},\"articleSection\":[\"GD-PI\",\"General Awareness\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\",\"url\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\",\"name\":\"Apple neural hash | Apple detection | iQuanta best platform for CAT\",\"isPartOf\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/#website\"},\"datePublished\":\"2021-10-26T11:06:55+00:00\",\"dateModified\":\"2022-02-10T18:06:42+00:00\",\"description\":\"NeuralHash is designed to identify known CSAM on a user\u2019s device Nural instead of scan photos, which Apple claims are more privacy-friendly.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iquanta.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple neural hash | Apple detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/#website\",\"url\":\"https:\/\/www.iquanta.in\/blog\/\",\"name\":\"iQuanta | Cat Preparation Online\",\"description\":\"Building Learning Networks\",\"publisher\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iquanta.in\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/#organization\",\"name\":\"IQuanta\",\"url\":\"https:\/\/www.iquanta.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2018\/08\/IQuanta-1.png\",\"contentUrl\":\"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2018\/08\/IQuanta-1.png\",\"width\":525,\"height\":200,\"caption\":\"IQuanta\"},\"image\":{\"@id\":\"https:\/\/www.iquanta.in\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/iquanta.in\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/#\/schema\/person\/2beb5d5f0836ae531bc05794e824b890\",\"name\":\"Indrajeet Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iquanta.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b35e500b44d5e90757c438ec9572577e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b35e500b44d5e90757c438ec9572577e?s=96&d=mm&r=g\",\"caption\":\"Indrajeet Singh\"},\"description\":\"The mastermind behind IQuanta, Indrajeet Singh is an expert in Quant and has devised some ingenious formulae and shortcuts to significantly cut down on the time taken to solve a problem\",\"sameAs\":[\"https:\/\/www.iquanta.in\/\",\"https:\/\/www.facebook.com\/jeet.singh.412224\",\"https:\/\/www.linkedin.com\/in\/indralion\/\"],\"url\":\"https:\/\/www.iquanta.in\/blog\/author\/administrator\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Apple neural hash | Apple detection | iQuanta best platform for CAT","description":"NeuralHash is designed to identify known CSAM on a user\u2019s device Nural instead of scan photos, which Apple claims are more privacy-friendly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/","og_locale":"en_US","og_type":"article","og_title":"Apple neural hash | Apple detection","og_description":"NeuralHash is designed to identify known CSAM on a user\u2019s device Nural instead of scan photos, which Apple claims are more privacy-friendly.","og_url":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/","og_site_name":"iQuanta","article_publisher":"https:\/\/facebook.com\/iquanta.in","article_author":"https:\/\/www.facebook.com\/jeet.singh.412224","article_published_time":"2021-10-26T11:06:55+00:00","article_modified_time":"2022-02-10T18:06:42+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2021\/10\/WhatsApp-Image-2021-10-25-at-3.18.14-PM.jpeg","type":"image\/jpeg"}],"author":"Indrajeet Singh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Indrajeet Singh","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#article","isPartOf":{"@id":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/"},"author":{"name":"Indrajeet Singh","@id":"https:\/\/www.iquanta.in\/blog\/#\/schema\/person\/2beb5d5f0836ae531bc05794e824b890"},"headline":"Apple neural hash | Apple detection","datePublished":"2021-10-26T11:06:55+00:00","dateModified":"2022-02-10T18:06:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/"},"wordCount":503,"publisher":{"@id":"https:\/\/www.iquanta.in\/blog\/#organization"},"articleSection":["GD-PI","General Awareness"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/","url":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/","name":"Apple neural hash | Apple detection | iQuanta best platform for CAT","isPartOf":{"@id":"https:\/\/www.iquanta.in\/blog\/#website"},"datePublished":"2021-10-26T11:06:55+00:00","dateModified":"2022-02-10T18:06:42+00:00","description":"NeuralHash is designed to identify known CSAM on a user\u2019s device Nural instead of scan photos, which Apple claims are more privacy-friendly.","breadcrumb":{"@id":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.iquanta.in\/blog\/apple-neural-hash-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iquanta.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple neural hash | Apple detection"}]},{"@type":"WebSite","@id":"https:\/\/www.iquanta.in\/blog\/#website","url":"https:\/\/www.iquanta.in\/blog\/","name":"iQuanta | Cat Preparation Online","description":"Building Learning Networks","publisher":{"@id":"https:\/\/www.iquanta.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iquanta.in\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iquanta.in\/blog\/#organization","name":"IQuanta","url":"https:\/\/www.iquanta.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iquanta.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2018\/08\/IQuanta-1.png","contentUrl":"https:\/\/www.iquanta.in\/blog\/wp-content\/uploads\/2018\/08\/IQuanta-1.png","width":525,"height":200,"caption":"IQuanta"},"image":{"@id":"https:\/\/www.iquanta.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/iquanta.in"]},{"@type":"Person","@id":"https:\/\/www.iquanta.in\/blog\/#\/schema\/person\/2beb5d5f0836ae531bc05794e824b890","name":"Indrajeet Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iquanta.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b35e500b44d5e90757c438ec9572577e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b35e500b44d5e90757c438ec9572577e?s=96&d=mm&r=g","caption":"Indrajeet Singh"},"description":"The mastermind behind IQuanta, Indrajeet Singh is an expert in Quant and has devised some ingenious formulae and shortcuts to significantly cut down on the time taken to solve a problem","sameAs":["https:\/\/www.iquanta.in\/","https:\/\/www.facebook.com\/jeet.singh.412224","https:\/\/www.linkedin.com\/in\/indralion\/"],"url":"https:\/\/www.iquanta.in\/blog\/author\/administrator\/"}]}},"_links":{"self":[{"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/posts\/7343"}],"collection":[{"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/comments?post=7343"}],"version-history":[{"count":9,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/posts\/7343\/revisions"}],"predecessor-version":[{"id":9948,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/posts\/7343\/revisions\/9948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/media\/7413"}],"wp:attachment":[{"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/media?parent=7343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/categories?post=7343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iquanta.in\/blog\/wp-json\/wp\/v2\/tags?post=7343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}