Home Tags Full-disk encryption

Tag: Full-disk encryption

6 Tips for Preventing Laptop Data Theft

Experts point to stronger passwords, full-disk encryption, and multi-factor authentication as ways to stop data theft in the event a laptop is lost or stolen.

OpenVPN will be audited for security flaws

The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert. The audit will be fully funded by Private Internet Access (PIA), a popular VPN service provider that uses OpenVPN for its business.

The company has contracted cryptography engineering expert Matthew Green, a professor at Johns Hopkins University in Baltimore, to carry out the evaluation with the goal of identifying any vulnerabilities in the code. Green has experience in auditing encryption software, being one of the founders of the Open Crypto Audit Project, which organized a detailed analysis of TrueCrypt, a popular open-source full-disk encryption application.

TrueCrypt has been abandoned by its original developers in 2014, but its code has since been forked and improved as part of other projects. Green will evaluate OpenVPN 2.4, which is currently the release candidate for the next major stable version.

For  now, he will look for vulnerabilities in the source code that’s available on GitHub, but he will compare his results with the final version when released in order to complete the audit. Any issues that are found will be shared with the OpenVPN developers and the results of the audit will only be made public after they have been patched, PIA’s Caleb Chen said in a blog post. “Instead of going for a crowdfunded approach, Private Internet Access has elected to fund the entirety of the OpenVPN 2.4 audit ourselves because of the integral nature of OpenVPN to both the privacy community as a whole and our own company,” Chen said. The OpenVPN software is cross-platform and can be used both in server or client modes.
It’s therefore used by end-users to connect to VPN servers and by companies to set up such servers.

The software is also integrated in commercial consumer and business products.

Inside Android’s source code… // TODO – Finish file encryption later

Android 7.0's crypto sauce is 'half-baked' and Google promises to make it better, soon Looking at the storage encryption Google has implemented in Android Nougat (7.0) through the metaphor of the glass that's either half full or half empty, cryptography expert Matthew Green sees Google's glass as all but drained. In a blog post last week, Green, assistant professor of computer science at Johns Hopkins University, said that optimists may feel that Android is moving in the right direction and that its "half-baked" implementation of file-based encryption is better than its implementation of full-disk encryption.

Then he noted that such people "probably also think clowns are nice." "On the other hand, you might notice that this is a pretty goddamn low standard," Green wrote. "In other words, in 2016 Android is still struggling to deploy encryption that achieves (lock screen) security that Apple figured out six years ago. And they’re not even getting it right." Green's post outlines the different approaches to encryption taken by Google and Apple.
Starting with Android KitKat (4.4) and continuing through Google Marshmallow (6.0), Google implemented full-disk encryption to protect Android devices. The drawback with this approach is that it's an all-or-nothing affair.

Android devices keep their cryptographic keys in memory, in order to ensure the device's applications can function while it's on.

But keeping crypto keys in memory is not very secure – sophisticated adversaries can extract keys from memory. "In principle, a clever implementation could evict sensitive cryptographic keys from RAM when the device locks, then re-derive them the next time the user logs in," explained Green. "Unfortunately, Android doesn't do this – for the very simple reason that Android users want their phones to actually work." Apple approached the problem from a different angle.
Starting with iOS 4, Apple implemented file-based encryption, protecting each file individually with its own unique key, Green said.

But it also allows individual keys to be encrypted with a class key tied to the user passcode and hardware-based secrets. These classes can be applied to accommodate several scenarios: Files can be encrypted until the device is on and unlocked. Files can be protected until the first user authentication, with keys remaining in memory thereafter. Files can be accessible after a reboot but prior to authentication. Files can be created with a key despite the absence of keys in memory, as one might desire when taking photos from smartphone lock screen. Android Nougat attempts to implement a system more like iOS through a new scheme called Direct Boot.
It allows the phone to access some data before the passcode has been entered.

But Android only provides two protection categories and these fail to cover all the desirable scenarios, according to Green. One problem with Google's approach, Green said, is that "there is no unambiguous way for Android to tell applications when the system has been re-locked." Without this, applications may start returning errors when the Android device gets locked. For Green, the problem is not so much Google's technology as that its lack of developer guidance prevents developers from creating apps that handle locked devices properly. Then there's the issue of the unfinished nature of Android's encryption code, which as Green points out, includes a TODO comment as a placeholder for the lines of C++ that, someday, will evict encryption keys from memory. //https://android.googlesource.com/platform/system/vold/+/master/Ext4Crypt.cpp bool e4crypt_lock_user_key(userid_t user_id) { if (e4crypt_is_native()) { // TODO: remove from kernel keyring } else if (e4crypt_is_emulated()) { // When in emulation mode, we just use chmod if (!emulated_lock(android::vold::BuildDataSystemCePath(user_id)) || !emulated_lock(android::vold::BuildDataMiscCePath(user_id)) || !emulated_lock(android::vold::BuildDataMediaCePath(nullptr, user_id)) || !emulated_lock(android::vold::BuildDataUserCePath(nullptr, user_id))) { LOG(ERROR) << "Failed to lock user " << user_id; return false; } } The bottom line is, these shortcomings make it a lot easier for anyone who seizes your Android phone, or can inject malware into it, to get your file decryption keys and extract your information.

Green noted: By treating encryption as a relatively low priority, Google is basically telling these people that they shouldn’t get the same protections as other users.

This may keep the FBI off Google’s backs, but in the long term it’s bad judgement on Google’s part. In an email to Green posted via Twitter, Google senior software engineer Paul Crowley chooses to see Google's encryption glass as half full, at least. "I was pleased to see you say that you consider Nougat's encryption to be an improvement over what came before it," he said. "That's very much how we see it." Then Crowley goes on to acknowledge that further work will be done to enhance Android security. ® Sponsored: Customer Identity and Access Management

US e-voting machines are (still) woefully antiquated and subject to fraud

Enlargereader comments 7 Share this story With fewer than 24 hours before polls open for the 2016 US presidential election, consider this your periodic reminder that e-voting machines expected to tally millions of votes are woefully antiquated and subject to fraud should hackers get physical access to them. A case in point is the Sequoia AVC Edge Mk1, a computerized voting machine that will be used in 13 states this year, including in swing states such as Arizona, Pennsylvania, and Wisconsin.

The so-called direct-recording electronic vote-counting system has long been known to be susceptible to relatively simple hacks that manipulate tallies and ballots. Researchers from security firm Cylance are driving that point home with demonstration hacks.

The first one causes one or more votes for one candidate to count as votes for that candidate's rival.

A second one alters the names as they appear on the electronic balloting screen.
Cylance discloses voting machine vulnerability. The hacks work by tampering with—or more precisely, reflashing—the PCMCIA card, a storage device in the voting machine that's similar to the tiny hard drive that's used by many digital cameras.

The fraud could be carried out by inserting a maliciously modified card inside a Sequoia AVC Edge machine, although the attackers would likely have to circumvent tamper-evident seals that are designed to flag such abuse.

The video above shows the hack being used to alter both the public and protective counters the machine uses to count and recount results to ensure tallies are valid.

The decade-old hack first came to public attention in 2007 in a research paper titled Source Code Review of the Sequoia Voting System. Stuffing the digital ballot box The Cylance demonstration came three weeks after researchers from competing security firm Symantec published a post with a similarly cautionary tone.
In it, researchers reported buying an unidentified DRE voting machine.

They, too, were able to hack a storage card used by the machines to effectively stuff the digital ballot box.
In the report, the Symantec researchers wrote: Voters entering polling stations that use electronic voting machines are handed a chip card that they use to cast their vote. Once someone has voted, they turn the card back in to the polling station volunteer and it gets re-used by the next voter. Just like credit cards, these cards are essentially a computer with its own RAM, CPU and operating system. Which means they can be exploited like any computing device. In examining the election process for vulnerabilities, we discovered that there’s an opportunity for a hacker to modify the code put on a voter’s chip card.

Anyone who knows how to program a chip card and purchases a simple $15 Raspberry Pi-like device could secretly reactivate their voter card while inside the privacy of a voting booth. We found a card reader that fits neatly into the palm of our hand and used it to reset our fake voter chip cards two different ways.
In one scenario, we reset the card to allow someone to vote multiple times using the same chip card. Our second method programmed the card to allow that card to cast multiple votes.
In both approaches, that attacker is stuffing the digital ballot box and casting doubt in the validity of the results from that polling station. Encryption absent on the voting machine hard drive We also discovered that there was no form of encryption on the internal hard drive of the voting machines we purchased, which were running an outdated operating system to display the ballots and record votes.

These types of hard drives are similar to those used in digital cameras.

The lack of full disk encryption on the internal hard drive (as well as the external cartridges) presents opportunities for hackers to reprogram and alter ballots. Potential hackers would also be unhindered by the voting machine’s lack of internet connectivity.
Some types of malware, such as Stuxnet, can take advantage of air-gapped networks and vector through physical access to a machine.

The lack of full-disk encryption on the DRE machine makes it easily exploitable, requiring only a simple device to reprogram the compact hard drive. Security experts have been quick to point out that hacking enough votes to alter an election is prohibitively hard to do.

As already noted, most hacks require physical access to machines that by law are required to be monitored by election officials. What's more, machines used in US elections are extremely diverse.

Taken together, these characteristics probably prevent hacks from scaling to the volumes that would be required to change the outcome of a national election. Still, the hacks might be used to alter a relatively small number of results in swing states, where outcomes have been known to be decided by fewer than a few hundred or a few thousand votes.

The hacks could also be used to sow widespread distrust in the official returns and undermine confidence in the legitimacy of the election. US intelligence officials recently accused the Russian government of hacking into the computer accounts of Democratic officials and leaking e-mails that could sway voters. Republican nominee Donald Trump has long warned of an election system that's "rigged" against him and has rebuffed calls that he pledge to accept the results should rival Hillary Clinton receive a majority of electoral college votes.

The lack of security in many of the nation's e-voting systems certainly doesn't inspire confidence.

Snowden: 'Everything Is Getting Hacked All the Time'


In a keynote at the SecTor security conference, NSA whistleblower Edward Snowden detailed what he thinks is wrong with modern surveillance and what users can do to protect the internet. TORONTO—Edward Snowden appeared via a live web conference link at the SecTor conference here to deliver a keynote on the state of internet security and privacy today.
Snowden's comments covered a wide range of topics, including the use of back doors and what users can do to help protect their own privacy and that of the internet as a whole.Edward Snowden vaulted to global notoriety in 2013 after revealing classified details on the National Security Agency (NSA) and its mass surveillance programs.At SecTor, Snowden provided a grim estimation of the current state of IT security. "Offense has greatly surpassed defensive capabilities."Snowden noted that today's attackers aren't all that worried about being detected, as they're typically confident that they can get back into any given system.
In the past, intelligence services used to treat compromised systems as fragile resources, but today that's no longer the case, as it's easy for attackers to compromise new systems, he added. "Surveillance technology has outpaced democratic controls," Snowden said. A generation ago, surveillance was expensive and governments typically needed to spend huge sums of money and have large teams tasked with tracking any single individual, he said, adding that the situation has changed, and one person in front of a monitor can track a very large number of individuals."For the first time in human history, it is feasible for the government to track and have a complete record of all of our lives," Snowden warned. "This is not science fiction; it's happening now."Snowden commented that the lesson of the last few years, which he helped bring to light, is that government agencies doesn't always ask for permission when it comes to surveillance.
It happens that governments will deploy capabilities in secret, even if they know them to be unlawful.
Snowden told the SecTor audience that the issue of government surveillance isn't just a U.S. issue.
It's now known that the Canadian intelligence services routinely share information with the NSA.Fundamentally, Snowden is worried about a lack of proper oversight when it comes to government surveillance. Without proper oversight, Snowden said that the general public is forced to rely on the media and whistleblowers to reveal what is going on."If we only knew what the government wanted us to know, we'd know very little," Snowden said.While laws are important, at the end of the day, they are just letters on a page and can't actually enforce individuals' rights, Snowden remarked. He wants users and technology vendors to help take action to protect individual rights."We need collectively to make surveillance expensive again," Snowden said.What Snowden wants to see in both the United States and Canada is some form of proper oversight for surveillance activities.

There should be a case-by-case review of all surveillance requests after the fact to make sure that the surveillance was necessary, Snowden said.

This level of oversight would mean that if people at spy agencies break rules, they would be held accountable, he said.Snowden is also wary of different government spy agencies in Canada and in the United States sharing information on individuals, without any real necessity."Our information is being traded like baseball cards. We need some form of transparency and accountability."Snowden also commented on the ongoing public debate about enabling back doors in software that provide access for U.S. intelligence services.
In Snowden's view, inserting a back door is never a good idea. He believes back doors decrease rather than increase security."Everything is getting hacked all the time now," Snowden said.Having a backdoor makes hacking by attackers easier, whether they are affiliated with a nation-state or not, he said.Determining who is behind an attack is also very difficult in the modern world, Snowden said. "The only people that get caught are the least sophisticated and lazy adversary groups."Snowden wants technology vendors to remember to work for their customers and not for the government.

That means that companies should only hold data that is needed for their operational goals and nothing else, he said.Snowden suggests that end-users make use of two-factor authentication, full-disk encryption, password management systems as well as secure operating systems.

That said, Snowden added that it's important to help those that are working on protecting individual rights and privacy online."The average person doesn't have time to become a security expert, but what we can do is give $10 to a civil liberties organization that can contest illegal laws on our behalf," Snowden said.Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com.

Follow him on Twitter
@TechJournalist.

VeraCrypt fixes bugs uncovered in security audit

Security researchers have completed the Open Source Technology Improvement Fund-backed audit of encryption platform VeraCrypt and found eight critical, three medium, and 15 low-severity vulnerabilities. The team behind the popular tool addressed the audit's findings in VeraCrypt 1.19. This is how security audits should work. OSTIF said VeraCrypt 1.9 is safe because most of the the flaws have been addressed. Some vulnerabilities were not addressed in this version, due to the "high complexity for the proposed fixes," but workarounds for those exist. "As long as you are following the documentation for known issues and using it as advised, I believe [VeraCrypt 1.9] is one of the best FDE [full-disk encryption] systems out there," said Derek Zimmer, OSTIF CEO and president, in an Ask-Me-Anything Q&A on Reddit. Zimmer is also a partner with virtual private network service provider VikingVPN. OSTIF hired Quarkslab senior security researcher Jean-Baptiste Bédrune and senior cryptographer Marion Videau to check the VeraCrypt codebase, focusing on version 1.18, and the DCS EFI Bootloader. The audit focused on new security features that were introduced into VeraCrypt after the April 2015 security audit of TrueCrypt. VeraCrypt is the fork of that now-abandoned encryption tool, and is backwards-compatible. Four problems in the bootloader -- keystrokes not being erased after authentication, sensitive data not correctly erased, memory corruption, and null/bad pointer references -- were found in the audit and fixed in version 1.19.  A low-severity boot password flaw, where the password length could be determined, was also addressed.  While the information leak itself is not critical, as the system needs to be booted and privileged access is required to read BIOS memory, the vulnerability needed to be fixed because an attacker knowing the length of the password would hasten the time needed for brute-force attacks, the audit said. VeraCrypt relied on compression functions to decompress the bootloader when the hard drive is encrypted, to create and check the recovery disks if the system is encrypted and uses UEFI, and during installation. The audit found that all the compression functions had issues. VeraCrypt was using XZip and XUnzip, which had known vulnerabilities and were out-of-date. "We strongly recommend to either rewrite this library and use an up-to-date version of zlib, or preferably, use another component to handle Zip files," the auditors said. VeraCrypt 1.19 replaced the vulnerable libraries with libzip, a modern and more secure zip library. UEFI is one of the most important -- and newest -- features added to VeraCrypt, so the auditors paid extra attention to this part of the code. All code specific to UEFI is in the VeraCrypt-DCS repository, and was "considered much less mature than the rest of the project" by VeraCrypt's lead developer, the researchers wrote in the audit report. "Some parts are incomplete, or not incomplete at all." In the audit summary OSTIF wrote that "VeraCrypt is much safer after this audit, and the fixes applied to the software mean that the world is safer when using this software."   As a result of the audit, VeraCrypt dumped GOST 28147-89 symmetric block cipher, originally added in VeraCrypt 1.17, due to errors in how it was implemented. GOST 28147-89 encryption was a Soviet-developed alternative to DES designed to strengthen the algorithm. All compression libraries were considered outdated or poorly written, the audit found. The implementation "fell short," Zimmer said in the Reddit AMA. In version 1.9, users can decrypt existing volumes that used the cipher but cannot create new instances. Users who used the GOST cipher that was removed as part of the audit should re-encrypt old partitions using the latest version. Users should also re-encrypt on all full-disk encryption systems since a number of issues with the bootloader have been fixed. Anyone who used pre-1.18 versions should re-encrypt partitions because of the bug related to the discovery of hidden partitions. VeraCrypt is a fork of TrueCrypt, which developers abruptly shut down in May 2014, hinting at unspecified security issues. There were concerns that the platform had a backdoor or some other flaw compromising the tool. The audit was necessary to assess the overall security of the platform. OSTIF said TrueCrypt 7.1a should no longer be considered safe because it is no longer under active maintenance and it is affected by the bootloader issues uncovered in the audit. However, the audit report also suggested that the weaknesses in TrueCrypt 7.1a do not affect the security of containers and non-system drives. It is easy to dismiss VeraCrypt as being unsafe because of the issues uncovered, but that ignores the entire value of having an audit. If the audit had uncovered issues and the team had refused to fix the issues, or were unresponsive to requests from the auditors, then that would give cause for concern. In this case, Quarkslab completed the audit in a month, and the maintainers fixed a significant number of the issues and documented in detail how to handle the other issues that hadn't been addressed. Yes, the auditors found some questionable decisions and mistakes that shouldn't have been made in the first place, but there were no problematic backdoors or any vulnerabilities that compromise the integrity of the full-disk encryption tool. The nature of open source development means the source code is available for anyone to examine. But, as has been repeatedly shown over the last few years, very few developers are actively looking for security flaws. This is why, despite the "many eyeballs" approach, Heartbleed and Shellshock and other critical vulnerabilities lingered in OpenSSL for years before being discovered. With an audit, professionals scrutinize every line of the open source software's source code to verify the integrity of the code, uncover security flaws and backdoors, and work with the project to fix as many problems as possible. The audit is typically expensive -- private search engine DuckDuckGo and virtual private network service Viking VPN were the primary donors to OSTIF for this audit -- which is why audits aren't more common. However, as many commercial products and other open source projects rely heavily on a handful of open source projects, audits are increasingly becoming important. With the VeraCrypt audit complete, the OSTIF is looking ahead to audits of OpenVPN 2.4. GnuPG, Off-the-Record, and OpenSSL are also on the roadmap. The Linux Foundation's Core Infrastructure Initiative had stated plans for a public audit of OpenSSL with NCC Group, but the status of that project is currently unclear. "I wish we could just hit every project that everyone likes, and my list would be enormous, but we have finite resources to work with and securing funding is the vast majority of our work right now," Zimmer wrote, noting that OSTIF is focusing on one "promising" project in each area of cryptography.

Google Shares How It Is Making Android Nougat Users More Secure

A new direct boot mode and a hardened media stack are just two of the enhancements in latest version of mobile operating system. With Google starting the rollout of its Android 7.0 Nougat to Nexus devices, the company this week reviewed some of the sec...

Google emits three sets of Android patches to fend off evil...

First set of security fixes issued for Nougat aka Android 7 It's a smaller-than-usual Android patch bundle from Google – just 47 patches for 57 flaws. These software bugs can be exploited by installed apps or malicious code smuggled in multimedia messages and files to gain total control of vulnerable phones, tablets, internet-connected fridges and other Android gadgets – allowing miscreants to snoop on victims and interfere with their lives. The first bundle of 19 patches addresses application and operating system-level vulnerabilities.

The second set of fixes covers driver-level holes.

The third set fixes two separate issues thought to be related to the full-disk encryption shortcomings from earlier in the year. All devices should get the first set, and some or all of the second and third batches depending on their chipsets and other hardware.
If you have a Nexus, you be offered the security updates to install very soon.
If not, you'll have to wait for your phone or tablet's manufacturer and mobile carrier to issue the update over-the-air, if at all. "Partners were notified about the issues described in the bulletin on August 5, 2016 or earlier," September's advisory states. "Where applicable, source code patches for these issues will be released to the Android Open Source Project (AOSP) repository in the next 48 hours. We will revise this bulletin with the AOSP links when they are available." The first tranche of patches mainly covers flaws found in Android's troubled Media Server, including one of the two critical fixes in the bundle and eight of the 11 high-level flaws.

The other critical patch is related, as it corrects a hole in LibUtils that would allow remote code execution. The privilege escalation bugs can be exploited by installed apps to take full control of the handheld or gadget.

The remote code execution flaws can be abused by things like specially crafted multimedia text messages and files to inject malicious code onto a device, which can use one of the escalation holes to potentially gain total control. Apps that use LibUtils to process file data can be potentially hijacked by maliciously crafted documents, and used to comprise the whole device using one of the available escalation bugs.

Also, Android's builtin debugger tool can be exploited by applications to commandeer a device. Patches for the programming blunders are available for Android 4.4.4 through to Android 7 aka Nougat. Issue CVE Severity Affects Nexus? Remote code execution vulnerability in LibUtils CVE-2016-3861 Critical Yes Remote code execution vulnerability in Media Server CVE-2016-3862 Critical Yes Remote code execution vulnerability in MediaMixer CVE-2016-3863 High Yes Elevation of privilege vulnerability in Media Server CVE-2016-3870, CVE-2016-3871, CVE-2016-3872 High Yes Elevation of privilege vulnerability in device boot CVE-2016-3875 High No* Elevation of privilege vulnerability in Settings CVE-2016-3876 High Yes Denial of service vulnerability in Media Server CVE-2016-3899, CVE-2016-3878, CVE-2016-3879, CVE-2016-3880, CVE-2016-3881 High Yes Elevation of privilege vulnerability in Telephony CVE-2016-3883 Moderate Yes Elevation of privilege vulnerability in Notification Manager Service CVE-2016-3884 Moderate Yes Elevation of privilege vulnerability in Debuggerd CVE-2016-3885 Moderate Yes Elevation of privilege vulnerability in System UI Tuner CVE-2016-3886 Moderate Yes Elevation of privilege vulnerability in Settings CVE-2016-3887 Moderate Yes Elevation of privilege vulnerability in SMS CVE-2016-3888 Moderate Yes Elevation of privilege vulnerability in Settings CVE-2016-3889 Moderate Yes Elevation of privilege vulnerability in Java Debug Wire Protocol CVE-2016-3890 Moderate No* Information disclosure vulnerability in Media Server CVE-2016-3895 Moderate Yes Information disclosure vulnerability in AOSP Mail CVE-2016-3896 Moderate No* Information disclosure vulnerability in Wi-Fi CVE-2016-3897 Moderate No* Denial of service vulnerability in Telephony CVE-2016-3898 Moderate Yes The bulk of the moderate-severity patches in this first bundle deal with privilege escalation problems in the Android code.

These are usually pretty harmless, unless combined with more serious flaws for advanced hacking attacks. The second bundle, covering Android up to September 5, is the largest of the trio, with 26 patches for 30 flaws.

Four of these are critical – all covering elevation of privilege attacks on the kernel – and deal with flaws in the networking and netfilter subsystems, as well as the USB and sound-handling Android zones. Issue CVE Severity Affects Nexus? Elevation of privilege vulnerability in kernel security subsystem CVE-2014-9529, CVE-2016-4470 Critical Yes Elevation of privilege vulnerability in kernel networking subsystem CVE-2013-7446 Critical Yes Elevation of privilege vulnerability in kernel netfilter subsystem CVE-2016-3134 Critical Yes Elevation of privilege vulnerability in kernel USB driver CVE-2016-3951 Critical Yes Elevation of privilege vulnerability in kernel sound subsystem CVE-2014-4655 High Yes Elevation of privilege vulnerability in kernel ASN.1 decoder CVE-2016-2053 High Yes Elevation of privilege vulnerability in Qualcomm radio interface layer CVE-2016-3864 High Yes Elevation of privilege vulnerability in Qualcomm subsystem driver CVE-2016-3858 High Yes Elevation of privilege vulnerability in kernel networking driver CVE-2016-4805 High Yes Elevation of privilege vulnerability in Synaptics touchscreen driver CVE-2016-3865 High Yes Elevation of privilege vulnerability in Qualcomm camera driver CVE-2016-3859 High Yes Elevation of privilege vulnerability in Qualcomm sound driver CVE-2016-3866 High Yes Elevation of privilege vulnerability in Qualcomm IPA driver CVE-2016-3867 High Yes Elevation of privilege vulnerability in Qualcomm power driver CVE-2016-3868 High Yes Elevation of privilege vulnerability in Broadcom Wi-Fi driver CVE-2016-3869 High Yes Elevation of privilege vulnerability in kernel eCryptfs filesystem CVE-2016-1583 High Yes Elevation of privilege vulnerability in NVIDIA kernel CVE-2016-3873 High Yes Elevation of privilege vulnerability in Qualcomm Wi-Fi driver CVE-2016-3874 High Yes Denial of service vulnerability in kernel networking subsystem CVE-2015-1465, CVE-2015-5364 High Yes Denial of service vulnerability in kernel ext4 filesystem CVE-2015-8839 High Yes Information disclosure vulnerability in Qualcomm SPMI driver CVE-2016-3892 Moderate Yes Information disclosure vulnerability in Qualcomm sound codec CVE-2016-3893 Moderate Yes Information disclosure vulnerability in Qualcomm DMA component CVE-2016-3894 Moderate Yes Information disclosure vulnerability in kernel networking subsystem CVE-2016-4998 Moderate Yes Denial of service vulnerability in kernel networking subsystem CVE-2015-2922 Moderate Yes Vulnerabilities in Qualcomm components CVE-2016-2469 High No Of the high-priority fixes, the vast majority are also privilege escalation problems with a variety of drivers.

As with previous months, Qualcomm's kit gets a lot of patches, although Nvidia and Synaptics get one apiece. The third patch bundle contains just two patches – one critical and one high priority – but both for the Nexus phone range.

The critical patch is in kernel memory system and would allow a malicious app downloaded onto the handset to manipulate the memory and be so persistent you'd have to wipe the handset back to factory settings. Issue CVE Severity Affects Nexus? Elevation of privilege vulnerability in kernel shared memory subsystem CVE-2016-5340 Critical Yes Elevation of privilege vulnerability in Qualcomm networking component CVE-2016-2059 High Yes The second flaw, rated high, fixes a similar issue with the Qualcomm networking component, which would allow code execution in the kernel. ®

Copperhead OS: The startup that wants to solve Android’s woeful security

Guardian Projectreader comments 40 Share this story A startup on a shoestring budget is working to clean up the Android security mess, and has even demonstrated results where other "secure" Android phones have failed, raising questions about Google's willingness to address the widespread vulnerabilities that exist in the world's most popular mobile operating system. "Copperhead is probably the most exciting thing happening in the world of Android security today," Chris Soghoian, principal technologist with the Speech, Privacy, and Technology Project at the American Civil Liberties Union, tells Ars. "But the enigma with Copperhead is why do they even exist? Why is it that a company as large as Google and with as much money as Google and with such a respected security team—why is it there's anything left for Copperhead to do?" Copperhead OS, a two-man team based in Toronto, ships a hardened version of Android that aims to integrate Grsecurity and PaX into their distribution.

Their OS also includes numerous security enhancements, including a port of OpenBSD’s malloc implementation, compiler hardening, enhanced SELinux policies, and function pointer protection in libc. Unfortunately for security nuts, Copperhead currently only supports Nexus devices. Google's Android security team have accepted many of Copperhead's patches into their upstream Android Open Source Project (AOSP) code base.

But a majority of Copperhead's security enhancements are not likely ever to reach beyond the its small but growing user base, because of performance trade-offs or compatibility issues. Dan Guido, CEO of Trail of Bits, has also puzzled over the vulnerability gap between the stock Android OS and Copperhead, and points out that the same could not be said for Apple's iOS. "If I had to imagine a world where there's a Copperhead for iOS, I don't even know what I'd change," he tells Ars. "The Apple team almost always picked the more secure path to go and has found a way to overcome all these performance and user experience issues." A billion people around the world rely on Android to secure their digital lives.

This number is only going to grow. How did we get here, and can Copperhead—or even Google—put out the garbage fire? Enlarge / A general outline of Copperhead's main features. A deal with the devil Google did a deal with the devil for market share, says Soghoian, who has described the current parlous state of Android security as a human rights issue.

By giving Original Equipment Manufacturers (OEMs) and wireless carriers control over the end-user experience, Google allowed handset manufacturers to find ways to differentiate their products, and wireless carriers to disable features they thought would threaten their business model. As a result, Google's power over OEMs—such as Samsung or Motorola, who manufacture and sell Android handsets—consists solely of the Android license and access to the Google Play Store.

The AOSP code base is licensed with Apache 2.0, and the kernel uses GPL2, which means there's nothing stopping OEMs from deploying stock Android under a different name.

But doing so would also mean losing access to the Play Store.

This gives Google significant leverage over OEMs, but by no means absolute control—a competitor willing to forgo the Android trademark and offer customers access to their own app store, as Amazon has done, can walk away from the negotiating table with little to no consequence. But Soghoian thinks Google isn't trying very hard.

The company could, he points out, demand that OEMs implement default full-disk encryption as part of the Android and Play Service licence terms.

The company currently requires FDE when the hardware supports it, but extending that requirement to lower-end Android manufacturers might scare off a non-trivial fraction of OEMs—and that would hurt Google's bottom line as an advertising company. "The important thing to remember," he says, "is that if Google goes nuclear and cuts an OEM from the Google Play store, and Gmail, and Google Maps, and YouTube, Google isn't just hurting that OEM and its customers, it's also hurting itself." "Every phone that doesn't have YouTube and Google Mail and search is a phone that isn't making money for Google," he adds. Copperhead, for their part, are not in the business of surveilling users in order to display targeted advertising and so are free to optimise Android for security.

Their first challenge was to find a handset to support that offered regular security updates—no small ask. Just the Nexus, thanks Most OEMs, for instance Motorola, do not ship the monthly security updates available from the AOSP.

The business model for handset manufacturers ends with the sale to a consumer—at which point there are no financial incentives to maintain the devices for the next three years or so. Copperhead chooses to focus on optimising security for what they believe are the most secure handsets currently available: the Nexus devices whose software, if not hardware, Google controls directly, and which receive prompt monthly security updates. "What we're doing is starting with the Nexus; a pretty good starting point," Copperhead's Daniel Micay explains. "And we're significantly improving the security of the operating system. We're making a lot of under-the-hood changes and exploit mitigation to make it harder to exploit the vulnerabilities that are there." Micay's goal is to port the Grsecurity and PaX patches to the Android Linux kernel, which would dramatically improve the security of all Android handsets, but this goal has been stymied by hardware woes—some of which not even Google appears capable of resolving, at least not on its own. Grsecurity for Android Grsecurity and its subset PaX harden the Linux kernel by making whole classes of vulnerabilities difficult, if not impossible, to exploit. Micay got his start as the Arch Linux maintainer of the Grsecurity and PaX patches for that distribution, and embraces the same security vision as Brad Spengler, who founded the Grsecurity project, and who has famously clashed with Linus Torvalds over the years for the latter's reluctance to ship a more secure kernel. But Copperhead's efforts to implement the Grsecurity patches for Android ran into a brick wall: Nexus devices, and indeed all newer mid- to high-end handsets, use the ARM64 architecture. While parts of Grsecurity have been ported to ARM32, little work has been done on ARM64, Micay says, leaving only a small subset of non-architecture-specific code for him to deploy. Porting Grsecurity to ARM64 is not a trivial undertaking—Micay estimates months of work for an experienced engineer, and Spengler and his team are not inclined to help without getting paid. "Work on Grsecurity is still done in our free time," Spengler says. "We don't have any personal need for ARM64 support, so it's not a priority for us in our limited time.
I do have a development board on order, however." "We would have to research how KERNEXEC/UDEREF functionality could be implemented best on ARM64," he adds. "Given our experience with that research and implementation on ARM, I'm not inclined to do more free work for the full-time funded upstream or multi-billion dollar corporations to rip off." Given the dramatic security benefits porting Grsecurity to Android would bring, and the relatively low cost of such work, Soghoian wonders why no one is paying Spengler and Micay to do so. Is Android critical infrastructure? "In an ideal world, the US Department of Homeland Security would write a check to Spengler for $5 million and keep him busy," Soghoian says, pointing to the Core Infrastructure Initiative (CII), founded after Heartbleed to take better care of critical open source security software like OpenSSL. Because the Grsecurity project has the potential to positively benefit every Linux user on the planet—including servers, desktops, and more than a billion Android users—Soghoian argues that the project is the kind of thing the CII should be funding. "The White House announced they were going to put more money into the open source community a few months ago," he says. "It's a totally realistic scenario." Soghoian also criticises Google for failing to step up to the plate. "Google could pay for the development of Grsecurity using the money found between the cushions of their sofa," he insists. "This is not a big-ticket item in the grand scheme of Google's budget." But even if ARM64 support were immediately available for the Android kernel, it would still be a year or two before Copperhead—or even Google—could deploy those patched kernels. Kernel freeze Linux device drivers have been the operating system's Achilles heel since day one, and the Android platform is no exception.

Android phones ship with kernels frozen to ensure driver compatibility—which usually means that a new Android device comes with a kernel that's already a year or two old. "It's like if you have a printer and the last printer driver made was for Windows 95, you can never upgrade your computer to a newer version," Soghoian explains. "Android is bigger than just Google, and when Google's partners drag their feet it undermines the security of the entire ecosystem." As an Android device ages, the kernel may get backported security patches, depending on the OEM’s willingness to push updates, but the handset will miss out on the latest security advances, since upgrading the kernel would break hardware compatibility with the drivers. This ties Copperhead's hands.

Given limited resources, Micay says he's focusing on implementing new security improvements to Android, rather than backporting a limited, non-architecture-specific subset of Grsecurity to the older kernels currently running on Nexus devices. "Nexus devices are stuck on Linux kernel 3.10, which is not supported by PaX and Grsecurity,” he says. “I've chosen to focus on long-term progress so there's no value in porting stuff back to 3.10 since future devices will use different newer kernels." Google is playing up the security enhancements in Android 7.0, dubbed “Nougat”, which will ship later this year. How significant is the new release in terms of security? Enlarge “N” to the rescue? The Android security team did not respond to requests for comment over the last couple of weeks. On July 27, they published a blog post touting the integration of a subset of Grsecurity patches in Android N. Micay dismisses this announcement, saying that Google has in reality implemented less than one percent of Grsecurity into Android. "Android N is making more progress on kernel exploit mitigations than past releases of Android, but it's basic stuff and doesn't change the fact that the kernel is a very soft target," he says. “They're taking baby steps forward for the kernel's security.
Security elsewhere in Android is moving much faster though (the mediaserver hardening, multiprocess WebView, SELinux policies, hidepid=2, etc.)” Google finally responded to our request for comment on Monday, August 1.
In a brief statement, Adrian Ludwig, Google's director of Android security, wrote: “Copperhead has been a valuable contributor to Android Open Source project. We appreciate their contributions, and hope that they continue to work on research and development that improves security of the entire Android ecosystem.” Can Copperhead succeed where others failed? The marketplace is littered with dead and dying Android security startups.
Silent Circle's Blackphone is going nowhere fast, and nor is backdoor-loving Blackberry’s Priv.

CyanogenMod OS, although by no means optimised for security, has also found competing with stock Android a far-from-profitable venture. Absent an unexpected cheque in the mail from Google or the US DHS, how will Copperhead fund its cutting-edge work on securing Android? Enlarge / The Blackphone 2, another attempt at improving mobile phone security. The startup currently sells Nexus devices with Copperhead OS preinstalled, and Micay says they are in talks with a number of potential enterprise clients and resellers who would benefit from hardened Android devices customised to suit their users. "There are no doubt many organisations globally who want full control over the software stacks on their devices, who do not want the cloud services that are bound to the dominant mobile device operating systems, yet they want modern devices," says David Mirza Ahmad of Subgraph, a Copperhead-like effort to secure desktop Linux. "Copperhead could be the answer." Copperhead ships with F-Droid installed by default, but without Google Play. Nexus owners comfortable with re-flashing their own devices can, of course, download Copperhead OS and install it themselves.

The company also accepts donations and offers a Patreon subscription. For his part, Micay is in this for the long haul, whether Copperhead is financially successful or not: "Even if I have to get a full-time job I'll still going to be doing this because it matters." J.M. Porup is a freelance cybersecurity reporter who lives in Toronto. When he dies his epitaph will simply read "assume breach." You can find him on Twitter at @toholdaquill. This post originated on Ars Technica UK

Android’s latest patches once again remind us: It’s Nexus or bust...

Or buy something that doesn't use a Qualcomm Snapdragon Another month means another double bundle of security vulnerability patches for Android. Google is sticking to the twin-release pattern it used last month: the first batch addresses flaws in Android's system-level software that everyone should install, and the second squashes bugs in hardware drivers and kernel-level code that not everyone needs. The first patch set closes holes in Android 4.4.4 to the current build. Owners of Nexus gear will get these patches over-the-air very soon; everyone else will have to wait for their gadget makers and cellphone networks to issue them – which might be forever, leaving them forever vulnerable. These holes include programming blunders in Mediaserver that can be exploited by a specially crafted MMS or an in-browser media file to potentially execute malicious code on a device.

Getting a bad text or visiting an evil webpage could be enough to slip spyware onto your device, provided it is able to defeat ASLR and other defense mechanisms. Mediaserver has other bugs, including four elevation-of-privileges holes allowing installed apps to gain more control of a device than they should, and code cockups that can crash a handheld. The remaining patches address information leakages in the Wi-Fi, camera, SurfaceFlinger and Mediaserver code, and OpenSSL, all of which can be abused by installed apps to "access sensitive data without permission." The full list is here: Issue CVE Severity Affects Nexus? Remote code execution vulnerability in Mediaserver CVE-2016-3819, CVE-2016-3820, CVE-2016-3821 Critical Yes Remote code execution vulnerability in libjhead CVE-2016-3822 High Yes Elevation of privilege vulnerability in Mediaserver CVE-2016-3823, CVE-2016-3824, CVE-2016-3825, CVE-2016-3826 High Yes Denial of service vulnerability in Mediaserver CVE-2016-3827, CVE-2016-3828, CVE-2016-3829, CVE-2016-3830 High Yes Denial of service vulnerability in system clock CVE-2016-3831 High Yes Elevation of privilege vulnerability in framework APIs CVE-2016-3832 Moderate Yes Elevation of privilege vulnerability in Shell CVE-2016-3833 Moderate Yes Information disclosure vulnerability in OpenSSL CVE-2016-2842 Moderate Yes Information disclosure vulnerability in camera APIs CVE-2016-3834 Moderate Yes Information disclosure vulnerability in Mediaserver CVE-2016-3835 Moderate Yes Information disclosure vulnerability in SurfaceFlinger CVE-2016-3836 Moderate Yes Information disclosure vulnerability in Wi-Fi CVE-2016-3837 Moderate Yes Denial of service vulnerability in system UI CVE-2016-3838 Moderate Yes Denial of service vulnerability in Bluetooth CVE-2016-3839 Moderate Yes The second patch bundle contains fixes for driver-level code, and whether or not you need each of them depends on your hardware: if you have a chipset that introduces one of these vulnerabilities, you'll need to install a fix. Nexus owners will get these automatically as necessary; other phone and tablet manufacturers may roll them out as and when they feel ready.

That could be never in some cases. The bundle predominantly fixes problems with Qualcomm's driver software – Qualy being the dominant Android system-on-chip designer, and its Snapdragon SoCs are used pretty much everywhere.

These Qualcomm bugs are definitely ones to watch as these kinds of low-level flaws were used to blow apart Android's full-disk encryption system last month. The patches includes fixes for Qualcomm's bootloader, and Qualcomm drivers for cameras, networking, sound, and video hardware.

A malicious app on a Qualcomm-powered phone or tablet could exploit these to gain kernel-level access – completely hijacking the device, in other words.

An app could use these holes to root a Nexus 5, 5X, 6, 6P and 7 so badly it would need a complete factory reset to undo the damage. There are other bugs fixed in this batch because they can be exploited by malicious applications on Qualcomm-powered devices to access "sensitive data without explicit user permission." The full list is below: Issue CVE Severity Affects Nexus? Remote code execution vulnerability in Qualcomm Wi‑Fi driver CVE-2014-9902 Critical Yes Remote code execution vulnerability in Conscrypt CVE-2016-3840 Critical Yes Elevation of privilege vulnerability in Qualcomm components CVE-2014-9863, CVE-2014-9864, CVE-2014-9865, CVE-2014-9866, CVE-2014-9867, CVE-2014-9868, CVE-2014-9869, CVE-2014-9870, CVE-2014-9871, CVE-2014-9872, CVE-2014-9873, CVE-2014-9874, CVE-2014-9875, CVE-2014-9876, CVE-2014-9877, CVE-2014-9878, CVE-2014-9879, CVE-2014-9880, CVE-2014-9881, CVE-2014-9882, CVE-2014-9883, CVE-2014-9884, CVE-2014-9885, CVE-2014-9886, CVE-2014-9887, CVE-2014-9888, CVE-2014-9889, CVE-2014-9890, CVE-2014-9891, CVE-2015-8937, CVE-2015-8938, CVE-2015-8939, CVE-2015-8940, CVE-2015-8941, CVE-2015-8942, CVE-2015-8943 Critical Yes Elevation of privilege vulnerability in kernel networking component CVE-2015-2686, CVE-2016-3841 Critical Yes Elevation of privilege vulnerability in Qualcomm GPU driver CVE-2016-2504, CVE-2016-3842 Critical Yes Elevation of privilege vulnerability in Qualcomm performance component CVE-2016-3843 Critical Yes Elevation of privilege vulnerability in kernel CVE-2016-3857 Critical Yes Elevation of privilege vulnerability in kernel memory system CVE-2015-1593, CVE-2016-3672 High Yes Elevation of privilege vulnerability in kernel sound component CVE-2016-2544, CVE-2016-2546, CVE-2014-9904 High Yes Elevation of privilege vulnerability in kernel file system CVE-2012-6701 High Yes Elevation of privilege vulnerability in Mediaserver CVE-2016-3844 High Yes Elevation of privilege vulnerability in kernel video driver CVE-2016-3845 High Yes Elevation of privilege vulnerability in Serial Peripheral Interface driver CVE-2016-3846 High Yes Elevation of privilege vulnerability in NVIDIA media driver CVE-2016-3847, CVE-2016-3848 High Yes Elevation of privilege vulnerability in ION driver CVE-2016-3849 High Yes Elevation of privilege vulnerability in Qualcomm bootloader CVE-2016-3850 High Yes Elevation of privilege vulnerability in kernel performance subsystem CVE-2016-3843 High Yes Elevation of privilege vulnerability in LG Electronics bootloader CVE-2016-3851 High Yes Information disclosure vulnerability in Qualcomm components CVE-2014-9892, CVE-2014-9893, CVE-2014-9894, CVE-2014-9895, CVE-2014-9896, CVE-2014-9897, CVE-2014-9898, CVE-2014-9899, CVE-2014-9900, CVE-2015-8944 High Yes Information disclosure vulnerability in kernel scheduler CVE-2014-9903 High Yes Information disclosure vulnerability in MediaTek Wi-Fi driver CVE-2016-3852 High Yes Information disclosure vulnerability in USB driver CVE-2016-4482 High Yes Denial of service vulnerability in Qualcomm components CVE-2014-9901 High Yes Elevation of privilege vulnerability in Google Play services CVE-2016-3853 Moderate Yes Elevation of privilege vulnerability in Framework APIs CVE-2016-2497 Moderate Yes Information disclosure vulnerability in kernel networking component CVE-2016-4578 Moderate Yes Information disclosure vulnerability in kernel sound component CVE-2016-4569, CVE-2016-4578 Moderate Yes Vulnerabilities in Qualcomm components CVE-2016-3854, CVE-2016-3855, CVE-2016-3856 High No Based on past experience, Nexus users are going to get both sets of patches within the next seven days. Other Android users may have to wait an awful lot longer – during which time, they'll be potentially vulnerable to attack. ® PS: Yeah, yeah, BlackBerry's Priv and DETK50 Androids get patches at the same time as Nexuses. We know. Sponsored: Global DDoS threat landscape report

Huge double boxset of Android patches lands after Qualcomm disk encryption...

What a coincidence Google has released two bundles of Android security patches this month: a smaller one to handle bugs in the operating system, and a larger package that tackles a raft of driver-level issues, particularly with Qualcomm's hardware. The first tranche of patches includes eight critical, 11 high severity, and nine fixes that are considered moderate.

All but one of the critical patches are for Android's soon-to-be redesigned Mediaserver, along with seven high-severity fixes and three moderates. As ever, people have found new ways to corrupt and hijack Mediaserver using booby-trapped video files and multimedia messages. Opening a malicious vid could lead to full remote code execution on Android devices from version 4.4.4 up to the most recent build. The other critical fix covers a flaw in OpenSSL and Google's stripped-down software fork BoringSSL.

These libraries also suffer from memory corruption bugs that can be potentially exploited to execute code on vulnerable devices. Other issues of high importance in the update include a fix on the way Android handles Bluetooth communications that would allow an attacker to inject and run code on a nearby device when performing an initial pairing with a new person.

Below is the full flaw list. Issue CVE Severity Affects Nexus? Remote code execution vulnerability in Mediaserver CVE-2016-2506, CVE-2016-2505, CVE-2016-2507, CVE-2016-2508, CVE-2016-3741, CVE-2016-3742, CVE-2016-3743 Critical Yes Remote code execution vulnerability in OpenSSL & BoringSSL CVE-2016-2108 Critical Yes Remote code execution vulnerability in Bluetooth CVE-2016-3744 High Yes Elevation of privilege vulnerability in libpng CVE-2016-3751 High Yes Elevation of privilege vulnerability in Mediaserver CVE-2016-3745, CVE-2016-3746, CVE-2016-3747 High Yes Elevation of privilege vulnerability in sockets CVE-2016-3748 High Yes Elevation of privilege vulnerability in LockSettingsService CVE-2016-3749 High Yes Elevation of privilege vulnerability in Framework APIs CVE-2016-3750 High Yes Elevation of privilege vulnerability in ChooserTarget service CVE-2016-3752 High Yes Information disclosure vulnerability in Mediaserver CVE-2016-3753 High No* Information disclosure vulnerability in OpenSSL CVE-2016-2107 High No* Denial of service vulnerability in Mediaserver CVE-2016-3754, CVE-2016-3755, CVE-2016-3756 High Yes Denial of service vulnerability in libc CVE-2016-3818 High No* Elevation of privilege vulnerability in lsof CVE-2016-3757 Moderate Yes Elevation of privilege vulnerability in DexClassLoader CVE-2016-3758 Moderate Yes Elevation of privilege vulnerability in Framework APIs CVE-2016-3759 Moderate Yes Elevation of privilege vulnerability in Bluetooth CVE-2016-3760 Moderate Yes Elevation of privilege vulnerability in NFC CVE-2016-3761 Moderate Yes Elevation of privilege vulnerability in sockets CVE-2016-3762 Moderate Yes Information disclosure vulnerability in Proxy Auto-Config CVE-2016-3763 Moderate Yes Information disclosure vulnerability in Mediaserver CVE-2016-3764, CVE-2016-3765 Moderate Yes Denial of service vulnerability in Mediaserver CVE-2016-3766 Moderate Yes But wait, there's more So far, so Google.

The patch bundle is in line with other monthly patching packages from the Chocolate Factory.
If you have a Google Nexus device, you'll get your hands on these fixes soon enough over the air automatically.
If not, you may well have to wait a while for your device manufacturer and mobile carrier to push these updates to you – if they ever appear. Meanwhile, Google is issuing a second string of patches that aren't going on general release: they'll be pushed out to Nexus owners and to hardware manufacturers who are expected to then pass on the updates to their customers. This second set is a much larger tranche of code, including 12 critical fixes, 54 rated high severity, and nine moderates.

Google said the second patch bundle will "provide Android partners with the flexibility to move more quickly to fix a subset of vulnerabilities that are similar across all Android devices." What could this subset of vulnerabilities be? The list of fixes contains some interesting hints. Last week, security researcher Gal Beniamini found a way to defeat Android's full-disk encryption system using blunders in Qualcomm's KeyMaster cryptography program.

The design flaws can be potentially exploited by someone who has seized your device to unlock and decrypt your encrypted file system with brute force. Google and Qualcomm said the problem was fixed in patches issued in January and May, and Mountain View paid Beniamini a bug bounty for his find.

But the researcher pointed out that other flaws hiding within Android, particularly elevation of privilege bugs, could be found and exploited to break the encryption system again. So it's interesting that this secondary bundle includes fixes for 40 flaws with Qualcomm components – more than half of the total, and pretty much all of them are escalation-of-privilege holes.
If you were emitting a set of fixes to shore up devices against KeyMaster-based attacks, it would probably look a lot like this one. The first two critical patches on the list are for the Qualcomm GPU drivers in Nexus 5X, 6, and 6P, to fix an elevation of privilege vulnerability that would allow an attacker to "execute arbitrary code within the context of the kernel." There are another 36 Qualcomm high- and moderate-severity flaw fixes included in the release. All Nexus devices get a critical patch for an elevation of privilege vulnerability in the Android kernel file system that would have the same effect. Nexus 5 and 7 devices also get critical fixes for security vulnerabilities affecting Qualcomm components including the bootloader, camera, character, networking, sound, and video drivers. There are also six critical patches for the Android One operating system, used by its basic device range.

They fix flaws in the MediaTek Wi-Fi driver and other parts of the supplier's kit that would compromise the kernel and lead to the device having to be wiped to recover. The full list is below. ® Issue CVE Severity Affects Nexus? Elevation of privilege vulnerability in Qualcomm GPU driver (Device specific) CVE-2016-2503, CVE-2016-2067 Critical Yes Elevation of privilege vulnerability in MediaTek Wi-Fi driver (Device specific) CVE-2016-3767 Critical Yes Elevation of privilege vulnerability in Qualcomm performance component (Device specific) CVE-2016-3768 Critical Yes Elevation of privilege vulnerability in NVIDIA video driver (Device specific) CVE-2016-3769 Critical Yes Elevation of privilege vulnerability in MediaTek drivers (Device specific) CVE-2016-3770, CVE-2016-3771, CVE-2016-3772, CVE-2016-3773, CVE-2016-3774 Critical Yes Elevation of privilege vulnerability in kernel file system (Device specific) CVE-2016-3775 Critical Yes Elevation of privilege vulnerability in USB driver (Device specific) CVE-2015-8816 Critical Yes Elevation of privilege vulnerability in Qualcomm components (Device specific) CVE-2014-9794, CVE-2014-9795, CVE-2015-8892, CVE-2013-7457, CVE-2014-9781, CVE-2014-9786, CVE-2014-9788, CVE-2014-9779, CVE-2014-9780, CVE-2014-9789, CVE-2014-9793, CVE-2014-9782, CVE-2014-9783, CVE-2014-9785, CVE-2014-9787, CVE-2014-9784, CVE-2014-9777, CVE-2014-9778, CVE-2014-9790, CVE-2014-9792, CVE-2014-9797, CVE-2014-9791, CVE-2014-9796, CVE-2014-9800, CVE-2014-9799, CVE-2014-9801, CVE-2014-9802, CVE-2015-8891, CVE-2015-8888, CVE-2015-8889, CVE-2015-8890 High Yes Elevation of privilege vulnerability in Qualcomm USB driver (Device specific) CVE-2016-2502 High Yes Elevation of privilege vulnerability in Qualcomm Wi-Fi driver (Device specific) CVE-2016-3792 High Yes Elevation of privilege vulnerability in Qualcomm camera driver (Device specific) CVE-2016-2501 High Yes Elevation of privilege vulnerability in NVIDIA camera driver (Device specific) CVE-2016-3793, CVE-2016-3794 High Yes Elevation of privilege vulnerability in MediaTek power driver (Device specific) CVE-2016-3795, CVE-2016-3796 High Yes Elevation of privilege vulnerability in Qualcomm Wi-Fi driver (Device specific) CVE-2016-3797 High Yes Elevation of privilege vulnerability in MediaTek hardware sensor driver (Device specific) CVE-2016-3798 High Yes Elevation of privilege vulnerability in MediaTek video driver (Device specific) CVE-2016-3799, CVE-2016-3800 High Yes Elevation of privilege vulnerability in MediaTek GPS driver (Device specific) CVE-2016-3801 High Yes Elevation of privilege vulnerability in kernel file system (Device specific) CVE-2016-3802, CVE-2016-3803 High Yes Elevation of privilege vulnerability in MediaTek power management driver (Device specific) CVE-2016-3804, CVE-2016-3805 High Yes Elevation of privilege vulnerability in MediaTek display driver (Device specific) CVE-2016-3806 High Yes Elevation of privilege vulnerability in serial peripheral interface driver (Device specific) CVE-2016-3807, CVE-2016-3808 High Yes Elevation of privilege vulnerability in Qualcomm sound driver (Device specific) CVE-2016-2068 High Yes Elevation of privilege vulnerability in kernel (Device specific) CVE-2014-9803 High Yes Information disclosure vulnerability in networking component (Device specific) CVE-2016-3809 High Yes Information disclosure vulnerability in MediaTek Wi-Fi driver (Device specific) CVE-2016-3810 High Yes Elevation of privilege vulnerability in kernel video driver (Device specific) CVE-2016-3811 Moderate Yes Information disclosure vulnerability in MediaTek video codec driver (Device specific) CVE-2016-3812 Moderate Yes Information disclosure vulnerability in Qualcomm USB driver (Device specific) CVE-2016-3813 Moderate Yes Information disclosure vulnerability in NVIDIA camera driver (Device specific) CVE-2016-3814, CVE-2016-3815 Moderate Yes Information disclosure vulnerability in MediaTek display driver (Device specific) CVE-2016-3816 Moderate Yes Information disclosure vulnerability in kernel teletype driver (Device specific) CVE-2016-0723 Moderate Yes Denial of service vulnerability in Qualcomm bootloader (Device specific) CVE-2014-9798, CVE-2015-8893 Moderate Yes Sponsored: Global DDoS threat landscape report

Cracking Android’s full-disk encryption is easy on millions of phones –...

Just need a couple of common bugs, some GPUs and time Android's full-disk encryption on millions of devices can be cracked by brute-force much more easily than expected – and there's working code to prove it. Essentially, if someone seizes your Qualcomm Snapdragon-powered phone, they can potentially decrypt its file system's contents with a friendly Python script without knowing your password or PIN. The tech details Android encrypts a gadget's file system using a randomly generated 128-bit Device Encryption Key aka the DEK.

Android encrypts the DEK using the owner's PIN or password and stores it alongside the encrypted file system in the device's flash storage chips. When you give Android the correct PIN or password, it can decrypt the DEK and use the key to unlock the file system. However, it's not quite that simple: the DEK is actually encrypted using the owner's PIN or password and an encrypted block of data called the KeyMaster Key Blob.

That blob contains a 2,048-bit RSA key generated by a KeyMaster program that runs inside a secured portion of the device's processor.

The KeyMaster creates the RSA key, stores it in the blob, and gives an encrypted copy of the blob to Android. It's important to understand that Android and your mobile apps run in the non-secure portion of the processor.

Android is not allowed to see into the KeyMaster's secure world and therefore it cannot see the RSA key inside the blob.

Android is only given the blob in encrypted form and only the KeyMaster can decrypt it. When you enter your PIN or password, Android takes the encrypted blob, and passes it back to the KeyMaster in the secure portion of the processor along with a scrypt-scrambled copy of your PIN or password.

The KeyMaster privately decrypts the blob using a secret key fused into the processor to obtain the long RSA key. The KeyMaster then, again privately, produces an RSA signature using the scrambled PIN or password and the long RSA key, and sends the signature back to Android.

Android then runs that signature through a series of algorithms to ultimately decrypt the DEK and unlock the device. So: this all hinges on the KeyMaster's blob.

The blob contains the long RSA key that's needed to complete the decryption of the DEK.

Android only has the encrypted blob – and only you have the PIN or password.

And only the KeyMaster can decrypt the encrypted blob. If you can decrypt the blob and extract its RSA key then you're potentially more than half there to decrypting the file system: you can now realistically start brute-forcing the PIN or password to complete the unlocking.
Ideally, you should never be able to get hold of the unencrypted blob.

But... there's always a but. The vulnerabilities Android defines how the KeyMaster should work but leaves the implementation to the hardware manufacturer. Qualcomm provides a KeyMaster for its ARM-compatible Snapdragon system-on-chips that are at the heart of millions and millions of phones, tablets and other gadgets.

The KeyMaster runs in the processor's TrustZone – a special walled-off compartment present alongside various ARM cores.

The operating system runs outside of TrustZone and cannot, ideally, interfere with the secure area.
Special functions, such as encryption and fingerprint scanners, operate in the protected TrustZone. Security researcher Gal Beniamini has been investigating Qualcomm's TrustZone code for a while now, and has documented in detail how he was able to extract the KeyMaster's keys from devices. Qualcomm runs a small kernel in TrustZone to provide what's known as QSEE – the Qualcomm Secure Execution Environment – and little apps are allowed to run in this QSEE space away from Android. Qualy's KeyMaster is a QSEE app.

Beniamini has detailed how it is possible to exploit an Android kernel security hole to load your own QSEE app and then, within that protected space, exploit a privilege-escalation vulnerability in Qualcomm's TrustZone kernel to take complete control of the entire QSEE space. Once you've done that, you can peer inside KeyMaster and extract the unencrypted blob. And with that blob, you can potentially decrypt the encrypted file system by brute-forcing the remaining secret: the PIN or password. Without the blob's secret RSA key, you'd be completely out of luck. It's part security bug, part design blunder: the KeyMaster makes its crucial keys available to software, albeit software within a walled garden, so the aim of the game is to leap over the barriers and snatch the prize within.

A malicious app could start the process, attacking the Android kernel to get into the QSEE zone, or a booby-trapped text message could slip in through StageFright and stab at TrustZone. Alternatively, the FBI, say, could flash a custom Android build to a seized device with a TrustZone environment that extracts the KeyMaster keys, allowing the file system to be unlocked by brute force. "Android uses the same FDE [full-disk encryption] scheme across all devices," Beniamini told The Register. "This FDE scheme relies on the KeyMaster module to 'bind' the key to the hardware of the device. My research has shown that this 'binding' can actually be circumvented on Qualcomm's devices.
It could be the case that this is also possible on devices made by other SoC manufacturers." So... is it patched? Beniamini exploited a chain of security bugs to infiltrate KeyMaster – bugs that have since been patched in the source code: one in January and the other in May. If you're running a Nexus device or otherwise have received and installed the fixes from Google and Qualcomm, then you're safe until the next privilege escalation bugs are found (and there will be more.

There always is). Without these programming flaws, you cannot leap from userspace to the kernel to QSEE to KeyMaster. However, there's a large pool of unpatched Android handsets out there because it's down to the manufacturers and mobile carriers to test, validate and distribute updates to their customers. People's phones and tablets won't trust patches unless they've been signed off by their manufacturers, and Android hardware makers are notoriously slow to do so.

That leaves folks with holes in their handhelds' operating system. A lot of the time, Google can quietly push out patches via Google Play services: the software can install fixes directly from the mothership, bypassing tardy hardware makers. However, problems deep within Android and its drivers – such as the bugs exploited to crack the KeyMaster – cannot be fixed by the Play services, and must be fixed via updates obtained from the manufacturer. When they finally appear, of course. Even if you are patched, this issue isn't going to go away, Beniamini said, because the way the Qualcomm TrustZone operates means that if another privilege escalation hole is found it can be used in the same way. "If anyone finds another TrustZone bug in the KeyMaster module, or manages to elevate privileges to the TrustZone kernel, they'd be able to extract the KeyMaster keys again," he said. "This is really the sore point of it all – it means that the FDE scheme is only as strong as the TrustZone software." Beniamini's exploit code, published on GitHub, checks out according to security experts contacted by The Reg, and the attack does make it possible to brute-force decrypt a phone's file system. Obviously, the stronger the PIN or password, the longer it will take to crack the encryption key – but it's better than trying to crack a 2048-bit RSA key. "I've been contacted by the developer of hashcat, a platform used to rapidly crack various types of hashes and PRFs," Beniamini said. "He said he would like to implement the key derivation function (which is the function being brute-forced) in the hashcat framework.
Such an implementation would be very fast (and even faster once you 'throw' more hardware at it)." Google declined to comment, although pointed out that the issue is patched in the latest build of Android. Qualcomm told The Register that it had been working with Beniamini and Google on the issue after finding the bugs some time ago. "It's an architectural problem in how current Android architecture handles FDE," said Alex Gantman, vice president of engineering at Qualcomm. "We are aware of this and are working with Google to make this more robust in the future." The fear is that a serious change will require new hardware, leaving older customers with insecure handsets.

But Gantman said that there are "things that can be done" with the existing hardware to make this kind of attack a lot less plausible. ®

FAF deciding on filters on post to be syndicated:

Singapore, Japan, Korea among least prepared for new EU data laws

Array ( [post_title] => Singapore, Japan, Korea among least prepared for new EU data laws [post_content] => More than half of firms in Singapore, Japan, and South Korea express concerns they will not be able to meet the May 25, 2018, deadline for GDPR compliance, while a quarter of their peers in Australia and US fear shutting down as a result. [post_excerpt] => More than half of firms in Singapore, Japan, and South Korea express concerns they will not be able to meet the May 25, 2018, deadline for GDPR compliance, while a quarter of their peers in Australia and US fear shutting down as a result. [post_date_gmt] => 2017-04-25 07:38:25 [post_date] => 2017-04-25 08:38:25 [post_modified_gmt] => 2017-04-25 07:38:25 [post_modified] => 2017-04-25 08:38:25 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 8f3f985f-05af-49e5-a29c-745eb4ef4bf9 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/singapore-japan-korea-among-least-prepared-for-new-eu-data-laws/#ftag=RSSbaffb68 [syndication_item_hash] => 9105138ded3dc01d5d5d149cd53f7783 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/singapore-japan-korea-among-least-prepared-for-new-eu-data-laws/#ftag=RSSbaffb68 [syndication_item_hash] => 9105138ded3dc01d5d5d149cd53f7783 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Singapore, Japan, Korea among least prepared for new EU data laws

Array ( [post_title] => Singapore, Japan, Korea among least prepared for new EU data laws [post_content] => More than half of firms in Singapore, Japan, and South Korea express concerns they will not be able to meet the May 25, 2018, deadline for GDPR compliance, while a quarter of their peers in Australia and US fear shutting down as a result. [post_excerpt] => More than half of firms in Singapore, Japan, and South Korea express concerns they will not be able to meet the May 25, 2018, deadline for GDPR compliance, while a quarter of their peers in Australia and US fear shutting down as a result. [post_date_gmt] => 2017-04-25 07:38:25 [post_date] => 2017-04-25 08:38:25 [post_modified_gmt] => 2017-04-25 07:38:25 [post_modified] => 2017-04-25 08:38:25 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 8f3f985f-05af-49e5-a29c-745eb4ef4bf9 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/singapore-japan-korea-among-least-prepared-for-new-eu-data-laws/#ftag=RSSbaffb68 [syndication_item_hash] => 9105138ded3dc01d5d5d149cd53f7783 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Close to 9,000 servers across Asean infected with malware

Array ( [post_title] => Close to 9,000 servers across Asean infected with malware [post_content] => In an operation run out of its Singapore global hub, Interpol has identified 8,800 command-and-control servers and 270 websites that were compromised, including those run by governments and financial institutions. [post_excerpt] => In an operation run out of its Singapore global hub, Interpol has identified 8,800 command-and-control servers and 270 websites that were compromised, including those run by governments and financial institutions. [post_date_gmt] => 2017-04-25 05:57:00 [post_date] => 2017-04-25 06:57:00 [post_modified_gmt] => 2017-04-25 05:57:00 [post_modified] => 2017-04-25 06:57:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 9466b3ad-c17e-4f2b-b062-1c462c635b4c [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/close-to-9000-servers-across-asean-infected-with-malware/#ftag=RSSbaffb68 [syndication_item_hash] => 8f14e666791ae11a7b26f44da97acadb ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/close-to-9000-servers-across-asean-infected-with-malware/#ftag=RSSbaffb68 [syndication_item_hash] => 8f14e666791ae11a7b26f44da97acadb )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Close to 9,000 servers across Asean infected with malware

Array ( [post_title] => Close to 9,000 servers across Asean infected with malware [post_content] => In an operation run out of its Singapore global hub, Interpol has identified 8,800 command-and-control servers and 270 websites that were compromised, including those run by governments and financial institutions. [post_excerpt] => In an operation run out of its Singapore global hub, Interpol has identified 8,800 command-and-control servers and 270 websites that were compromised, including those run by governments and financial institutions. [post_date_gmt] => 2017-04-25 05:57:00 [post_date] => 2017-04-25 06:57:00 [post_modified_gmt] => 2017-04-25 05:57:00 [post_modified] => 2017-04-25 06:57:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 9466b3ad-c17e-4f2b-b062-1c462c635b4c [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/close-to-9000-servers-across-asean-infected-with-malware/#ftag=RSSbaffb68 [syndication_item_hash] => 8f14e666791ae11a7b26f44da97acadb [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

HipChat hacked, user account info and some content potentially compromised

Array ( [post_title] => HipChat hacked, user account info and some content potentially compromised [post_content] => The breach occurred over the weekend due to a vulnerability in a third-party library used by HipChat.com. [post_excerpt] => The breach occurred over the weekend due to a vulnerability in a third-party library used by HipChat.com. [post_date_gmt] => 2017-04-25 00:39:00 [post_date] => 2017-04-25 01:39:00 [post_modified_gmt] => 2017-04-25 00:39:00 [post_modified] => 2017-04-25 01:39:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 45b6692c-98cb-483d-9e1f-65a0d4c9e825 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/hipchat-hacked-user-account-info-and-some-user-content-potentially-compromised/#ftag=RSSbaffb68 [syndication_item_hash] => 9ddedc151081dc2c51d1f3367a961cf0 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/hipchat-hacked-user-account-info-and-some-user-content-potentially-compromised/#ftag=RSSbaffb68 [syndication_item_hash] => 9ddedc151081dc2c51d1f3367a961cf0 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :HipChat hacked, user account info and some content potentially compromised

Array ( [post_title] => HipChat hacked, user account info and some content potentially compromised [post_content] => The breach occurred over the weekend due to a vulnerability in a third-party library used by HipChat.com. [post_excerpt] => The breach occurred over the weekend due to a vulnerability in a third-party library used by HipChat.com. [post_date_gmt] => 2017-04-25 00:39:00 [post_date] => 2017-04-25 01:39:00 [post_modified_gmt] => 2017-04-25 00:39:00 [post_modified] => 2017-04-25 01:39:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 45b6692c-98cb-483d-9e1f-65a0d4c9e825 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/hipchat-hacked-user-account-info-and-some-user-content-potentially-compromised/#ftag=RSSbaffb68 [syndication_item_hash] => 9ddedc151081dc2c51d1f3367a961cf0 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Ashley Madison blackmail roars back to life

Array ( [post_title] => Ashley Madison blackmail roars back to life [post_content] => A group claims "May 1 2017 we are launching our new site — Cheaters Gallery." They promised to include my Ashley Madison info unless I pay up. So what to do? [post_excerpt] => A group claims "May 1 2017 we are launching our new site — Cheaters Gallery." They promised to include my Ashley Madison info unless I pay up. So what to do? [post_date_gmt] => 2017-04-24 12:37:00 [post_date] => 2017-04-24 13:37:00 [post_modified_gmt] => 2017-04-24 12:37:00 [post_modified] => 2017-04-24 13:37:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => bf8162a6-0cf1-4070-91fa-895fe7581776 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/ashley-madison-blackmail-roars-back-to-life/#ftag=RSSbaffb68 [syndication_item_hash] => c76ee9de978d472e92e292c72129fb92 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/ashley-madison-blackmail-roars-back-to-life/#ftag=RSSbaffb68 [syndication_item_hash] => c76ee9de978d472e92e292c72129fb92 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Ashley Madison blackmail roars back to life

Array ( [post_title] => Ashley Madison blackmail roars back to life [post_content] => A group claims "May 1 2017 we are launching our new site — Cheaters Gallery." They promised to include my Ashley Madison info unless I pay up. So what to do? [post_excerpt] => A group claims "May 1 2017 we are launching our new site — Cheaters Gallery." They promised to include my Ashley Madison info unless I pay up. So what to do? [post_date_gmt] => 2017-04-24 12:37:00 [post_date] => 2017-04-24 13:37:00 [post_modified_gmt] => 2017-04-24 12:37:00 [post_modified] => 2017-04-24 13:37:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => bf8162a6-0cf1-4070-91fa-895fe7581776 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/ashley-madison-blackmail-roars-back-to-life/#ftag=RSSbaffb68 [syndication_item_hash] => c76ee9de978d472e92e292c72129fb92 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

​Australia to work with China on cybersecurity

Array ( [post_title] => ​Australia to work with China on cybersecurity [post_content] => Prime Minister Malcolm Turnbull has agreed to enhanced cybersecurity cooperation with China. [post_excerpt] => Prime Minister Malcolm Turnbull has agreed to enhanced cybersecurity cooperation with China. [post_date_gmt] => 2017-04-24 05:23:34 [post_date] => 2017-04-24 06:23:34 [post_modified_gmt] => 2017-04-24 05:23:34 [post_modified] => 2017-04-24 06:23:34 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => ec991ba7-71a9-4394-ac6f-985c5026959e [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/australia-to-work-with-china-on-cybersecurity/#ftag=RSSbaffb68 [syndication_item_hash] => 4d03c8afec37b3ba2351e78562a3a471 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/australia-to-work-with-china-on-cybersecurity/#ftag=RSSbaffb68 [syndication_item_hash] => 4d03c8afec37b3ba2351e78562a3a471 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :​Australia to work with China on cybersecurity

Array ( [post_title] => ​Australia to work with China on cybersecurity [post_content] => Prime Minister Malcolm Turnbull has agreed to enhanced cybersecurity cooperation with China. [post_excerpt] => Prime Minister Malcolm Turnbull has agreed to enhanced cybersecurity cooperation with China. [post_date_gmt] => 2017-04-24 05:23:34 [post_date] => 2017-04-24 06:23:34 [post_modified_gmt] => 2017-04-24 05:23:34 [post_modified] => 2017-04-24 06:23:34 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => ec991ba7-71a9-4394-ac6f-985c5026959e [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/australia-to-work-with-china-on-cybersecurity/#ftag=RSSbaffb68 [syndication_item_hash] => 4d03c8afec37b3ba2351e78562a3a471 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Researcher finds LastPass 2FA could become 1FA

Array ( [post_title] => Researcher finds LastPass 2FA could become 1FA [post_content] => Not only was LastPass using a password hash in its two-factor authentication scheme, but 2FA could be disabled by an attacker, a security researcher has found. [post_excerpt] => Not only was LastPass using a password hash in its two-factor authentication scheme, but 2FA could be disabled by an attacker, a security researcher has found. [post_date_gmt] => 2017-04-21 04:01:00 [post_date] => 2017-04-21 05:01:00 [post_modified_gmt] => 2017-04-21 04:01:00 [post_modified] => 2017-04-21 05:01:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 1a015c76-b787-4ee2-8401-ff05c000d746 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/researcher-finds-lastpass-2fa-could-become-1fa/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 14e11627da738a2f20463a19ebfde717 [1] => 14e11627da738a2f20463a19ebfde717 [2] => 14e11627da738a2f20463a19ebfde717 [3] => 14e11627da738a2f20463a19ebfde717 [4] => 14e11627da738a2f20463a19ebfde717 [5] => 14e11627da738a2f20463a19ebfde717 [6] => 14e11627da738a2f20463a19ebfde717 [7] => 14e11627da738a2f20463a19ebfde717 [8] => 14e11627da738a2f20463a19ebfde717 [9] => 14e11627da738a2f20463a19ebfde717 [10] => 14e11627da738a2f20463a19ebfde717 [11] => 14e11627da738a2f20463a19ebfde717 [12] => 14e11627da738a2f20463a19ebfde717 [13] => 14e11627da738a2f20463a19ebfde717 [14] => 14e11627da738a2f20463a19ebfde717 [15] => 14e11627da738a2f20463a19ebfde717 [16] => 14e11627da738a2f20463a19ebfde717 [17] => 14e11627da738a2f20463a19ebfde717 [18] => 14e11627da738a2f20463a19ebfde717 [19] => 14e11627da738a2f20463a19ebfde717 [20] => 14e11627da738a2f20463a19ebfde717 [21] => 14e11627da738a2f20463a19ebfde717 [22] => 14e11627da738a2f20463a19ebfde717 [23] => 14e11627da738a2f20463a19ebfde717 [24] => 14e11627da738a2f20463a19ebfde717 [25] => 14e11627da738a2f20463a19ebfde717 [26] => 14e11627da738a2f20463a19ebfde717 [27] => 14e11627da738a2f20463a19ebfde717 [28] => 14e11627da738a2f20463a19ebfde717 [29] => 14e11627da738a2f20463a19ebfde717 [30] => 14e11627da738a2f20463a19ebfde717 [31] => 14e11627da738a2f20463a19ebfde717 [32] => 14e11627da738a2f20463a19ebfde717 [33] => 14e11627da738a2f20463a19ebfde717 [34] => 14e11627da738a2f20463a19ebfde717 [35] => 14e11627da738a2f20463a19ebfde717 [36] => 14e11627da738a2f20463a19ebfde717 [37] => 14e11627da738a2f20463a19ebfde717 [38] => 14e11627da738a2f20463a19ebfde717 [39] => 14e11627da738a2f20463a19ebfde717 [40] => 14e11627da738a2f20463a19ebfde717 [41] => 14e11627da738a2f20463a19ebfde717 [42] => 14e11627da738a2f20463a19ebfde717 [43] => 14e11627da738a2f20463a19ebfde717 [44] => 14e11627da738a2f20463a19ebfde717 [45] => 14e11627da738a2f20463a19ebfde717 [46] => 14e11627da738a2f20463a19ebfde717 [47] => 14e11627da738a2f20463a19ebfde717 [48] => 14e11627da738a2f20463a19ebfde717 [49] => 14e11627da738a2f20463a19ebfde717 [50] => 14e11627da738a2f20463a19ebfde717 [51] => 14e11627da738a2f20463a19ebfde717 [52] => 14e11627da738a2f20463a19ebfde717 [53] => 14e11627da738a2f20463a19ebfde717 [54] => 14e11627da738a2f20463a19ebfde717 [55] => 14e11627da738a2f20463a19ebfde717 [56] => 14e11627da738a2f20463a19ebfde717 [57] => 14e11627da738a2f20463a19ebfde717 [58] => 14e11627da738a2f20463a19ebfde717 [59] => 14e11627da738a2f20463a19ebfde717 [60] => 14e11627da738a2f20463a19ebfde717 [61] => 14e11627da738a2f20463a19ebfde717 [62] => 14e11627da738a2f20463a19ebfde717 [63] => 14e11627da738a2f20463a19ebfde717 [64] => 14e11627da738a2f20463a19ebfde717 [65] => 14e11627da738a2f20463a19ebfde717 [66] => 14e11627da738a2f20463a19ebfde717 [67] => 14e11627da738a2f20463a19ebfde717 [68] => 14e11627da738a2f20463a19ebfde717 [69] => 14e11627da738a2f20463a19ebfde717 [70] => 14e11627da738a2f20463a19ebfde717 [71] => 14e11627da738a2f20463a19ebfde717 [72] => 14e11627da738a2f20463a19ebfde717 [73] => 14e11627da738a2f20463a19ebfde717 [74] => 14e11627da738a2f20463a19ebfde717 [75] => 14e11627da738a2f20463a19ebfde717 [76] => 14e11627da738a2f20463a19ebfde717 [77] => 14e11627da738a2f20463a19ebfde717 [78] => 14e11627da738a2f20463a19ebfde717 [79] => 14e11627da738a2f20463a19ebfde717 [80] => 14e11627da738a2f20463a19ebfde717 [81] => 14e11627da738a2f20463a19ebfde717 [82] => 14e11627da738a2f20463a19ebfde717 [83] => 14e11627da738a2f20463a19ebfde717 [84] => 14e11627da738a2f20463a19ebfde717 [85] => 14e11627da738a2f20463a19ebfde717 [86] => 14e11627da738a2f20463a19ebfde717 [87] => 14e11627da738a2f20463a19ebfde717 [88] => 14e11627da738a2f20463a19ebfde717 [89] => 14e11627da738a2f20463a19ebfde717 [90] => 14e11627da738a2f20463a19ebfde717 [91] => 14e11627da738a2f20463a19ebfde717 [92] => 14e11627da738a2f20463a19ebfde717 [93] => 14e11627da738a2f20463a19ebfde717 [94] => 14e11627da738a2f20463a19ebfde717 [95] => 14e11627da738a2f20463a19ebfde717 [96] => 14e11627da738a2f20463a19ebfde717 [97] => 14e11627da738a2f20463a19ebfde717 [98] => 14e11627da738a2f20463a19ebfde717 [99] => 14e11627da738a2f20463a19ebfde717 [100] => 14e11627da738a2f20463a19ebfde717 ) ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => researcher-finds-lastpass-2fa-could-become-1fa )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/researcher-finds-lastpass-2fa-could-become-1fa/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 14e11627da738a2f20463a19ebfde717 [1] => 14e11627da738a2f20463a19ebfde717 [2] => 14e11627da738a2f20463a19ebfde717 [3] => 14e11627da738a2f20463a19ebfde717 [4] => 14e11627da738a2f20463a19ebfde717 [5] => 14e11627da738a2f20463a19ebfde717 [6] => 14e11627da738a2f20463a19ebfde717 [7] => 14e11627da738a2f20463a19ebfde717 [8] => 14e11627da738a2f20463a19ebfde717 [9] => 14e11627da738a2f20463a19ebfde717 [10] => 14e11627da738a2f20463a19ebfde717 [11] => 14e11627da738a2f20463a19ebfde717 [12] => 14e11627da738a2f20463a19ebfde717 [13] => 14e11627da738a2f20463a19ebfde717 [14] => 14e11627da738a2f20463a19ebfde717 [15] => 14e11627da738a2f20463a19ebfde717 [16] => 14e11627da738a2f20463a19ebfde717 [17] => 14e11627da738a2f20463a19ebfde717 [18] => 14e11627da738a2f20463a19ebfde717 [19] => 14e11627da738a2f20463a19ebfde717 [20] => 14e11627da738a2f20463a19ebfde717 [21] => 14e11627da738a2f20463a19ebfde717 [22] => 14e11627da738a2f20463a19ebfde717 [23] => 14e11627da738a2f20463a19ebfde717 [24] => 14e11627da738a2f20463a19ebfde717 [25] => 14e11627da738a2f20463a19ebfde717 [26] => 14e11627da738a2f20463a19ebfde717 [27] => 14e11627da738a2f20463a19ebfde717 [28] => 14e11627da738a2f20463a19ebfde717 [29] => 14e11627da738a2f20463a19ebfde717 [30] => 14e11627da738a2f20463a19ebfde717 [31] => 14e11627da738a2f20463a19ebfde717 [32] => 14e11627da738a2f20463a19ebfde717 [33] => 14e11627da738a2f20463a19ebfde717 [34] => 14e11627da738a2f20463a19ebfde717 [35] => 14e11627da738a2f20463a19ebfde717 [36] => 14e11627da738a2f20463a19ebfde717 [37] => 14e11627da738a2f20463a19ebfde717 [38] => 14e11627da738a2f20463a19ebfde717 [39] => 14e11627da738a2f20463a19ebfde717 [40] => 14e11627da738a2f20463a19ebfde717 [41] => 14e11627da738a2f20463a19ebfde717 [42] => 14e11627da738a2f20463a19ebfde717 [43] => 14e11627da738a2f20463a19ebfde717 [44] => 14e11627da738a2f20463a19ebfde717 [45] => 14e11627da738a2f20463a19ebfde717 [46] => 14e11627da738a2f20463a19ebfde717 [47] => 14e11627da738a2f20463a19ebfde717 [48] => 14e11627da738a2f20463a19ebfde717 [49] => 14e11627da738a2f20463a19ebfde717 [50] => 14e11627da738a2f20463a19ebfde717 [51] => 14e11627da738a2f20463a19ebfde717 [52] => 14e11627da738a2f20463a19ebfde717 [53] => 14e11627da738a2f20463a19ebfde717 [54] => 14e11627da738a2f20463a19ebfde717 [55] => 14e11627da738a2f20463a19ebfde717 [56] => 14e11627da738a2f20463a19ebfde717 [57] => 14e11627da738a2f20463a19ebfde717 [58] => 14e11627da738a2f20463a19ebfde717 [59] => 14e11627da738a2f20463a19ebfde717 [60] => 14e11627da738a2f20463a19ebfde717 [61] => 14e11627da738a2f20463a19ebfde717 [62] => 14e11627da738a2f20463a19ebfde717 [63] => 14e11627da738a2f20463a19ebfde717 [64] => 14e11627da738a2f20463a19ebfde717 [65] => 14e11627da738a2f20463a19ebfde717 [66] => 14e11627da738a2f20463a19ebfde717 [67] => 14e11627da738a2f20463a19ebfde717 [68] => 14e11627da738a2f20463a19ebfde717 [69] => 14e11627da738a2f20463a19ebfde717 [70] => 14e11627da738a2f20463a19ebfde717 [71] => 14e11627da738a2f20463a19ebfde717 [72] => 14e11627da738a2f20463a19ebfde717 [73] => 14e11627da738a2f20463a19ebfde717 [74] => 14e11627da738a2f20463a19ebfde717 [75] => 14e11627da738a2f20463a19ebfde717 [76] => 14e11627da738a2f20463a19ebfde717 [77] => 14e11627da738a2f20463a19ebfde717 [78] => 14e11627da738a2f20463a19ebfde717 [79] => 14e11627da738a2f20463a19ebfde717 [80] => 14e11627da738a2f20463a19ebfde717 [81] => 14e11627da738a2f20463a19ebfde717 [82] => 14e11627da738a2f20463a19ebfde717 [83] => 14e11627da738a2f20463a19ebfde717 [84] => 14e11627da738a2f20463a19ebfde717 [85] => 14e11627da738a2f20463a19ebfde717 [86] => 14e11627da738a2f20463a19ebfde717 [87] => 14e11627da738a2f20463a19ebfde717 [88] => 14e11627da738a2f20463a19ebfde717 [89] => 14e11627da738a2f20463a19ebfde717 [90] => 14e11627da738a2f20463a19ebfde717 [91] => 14e11627da738a2f20463a19ebfde717 [92] => 14e11627da738a2f20463a19ebfde717 [93] => 14e11627da738a2f20463a19ebfde717 [94] => 14e11627da738a2f20463a19ebfde717 [95] => 14e11627da738a2f20463a19ebfde717 [96] => 14e11627da738a2f20463a19ebfde717 [97] => 14e11627da738a2f20463a19ebfde717 [98] => 14e11627da738a2f20463a19ebfde717 [99] => 14e11627da738a2f20463a19ebfde717 [100] => 14e11627da738a2f20463a19ebfde717 ) )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :Researcher finds LastPass 2FA could become 1FA

Array ( [post_title] => Researcher finds LastPass 2FA could become 1FA [post_content] => Not only was LastPass using a password hash in its two-factor authentication scheme, but 2FA could be disabled by an attacker, a security researcher has found. [post_excerpt] => Not only was LastPass using a password hash in its two-factor authentication scheme, but 2FA could be disabled by an attacker, a security researcher has found. [post_date_gmt] => 2017-04-21 04:01:00 [post_date] => 2017-04-21 05:01:00 [post_modified_gmt] => 2017-04-21 04:01:00 [post_modified] => 2017-04-21 05:01:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 1a015c76-b787-4ee2-8401-ff05c000d746 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/researcher-finds-lastpass-2fa-could-become-1fa/#ftag=RSSbaffb68 [syndication_item_hash] => Array ( [0] => 14e11627da738a2f20463a19ebfde717 [1] => 14e11627da738a2f20463a19ebfde717 [2] => 14e11627da738a2f20463a19ebfde717 [3] => 14e11627da738a2f20463a19ebfde717 [4] => 14e11627da738a2f20463a19ebfde717 [5] => 14e11627da738a2f20463a19ebfde717 [6] => 14e11627da738a2f20463a19ebfde717 [7] => 14e11627da738a2f20463a19ebfde717 [8] => 14e11627da738a2f20463a19ebfde717 [9] => 14e11627da738a2f20463a19ebfde717 [10] => 14e11627da738a2f20463a19ebfde717 [11] => 14e11627da738a2f20463a19ebfde717 [12] => 14e11627da738a2f20463a19ebfde717 [13] => 14e11627da738a2f20463a19ebfde717 [14] => 14e11627da738a2f20463a19ebfde717 [15] => 14e11627da738a2f20463a19ebfde717 [16] => 14e11627da738a2f20463a19ebfde717 [17] => 14e11627da738a2f20463a19ebfde717 [18] => 14e11627da738a2f20463a19ebfde717 [19] => 14e11627da738a2f20463a19ebfde717 [20] => 14e11627da738a2f20463a19ebfde717 [21] => 14e11627da738a2f20463a19ebfde717 [22] => 14e11627da738a2f20463a19ebfde717 [23] => 14e11627da738a2f20463a19ebfde717 [24] => 14e11627da738a2f20463a19ebfde717 [25] => 14e11627da738a2f20463a19ebfde717 [26] => 14e11627da738a2f20463a19ebfde717 [27] => 14e11627da738a2f20463a19ebfde717 [28] => 14e11627da738a2f20463a19ebfde717 [29] => 14e11627da738a2f20463a19ebfde717 [30] => 14e11627da738a2f20463a19ebfde717 [31] => 14e11627da738a2f20463a19ebfde717 [32] => 14e11627da738a2f20463a19ebfde717 [33] => 14e11627da738a2f20463a19ebfde717 [34] => 14e11627da738a2f20463a19ebfde717 [35] => 14e11627da738a2f20463a19ebfde717 [36] => 14e11627da738a2f20463a19ebfde717 [37] => 14e11627da738a2f20463a19ebfde717 [38] => 14e11627da738a2f20463a19ebfde717 [39] => 14e11627da738a2f20463a19ebfde717 [40] => 14e11627da738a2f20463a19ebfde717 [41] => 14e11627da738a2f20463a19ebfde717 [42] => 14e11627da738a2f20463a19ebfde717 [43] => 14e11627da738a2f20463a19ebfde717 [44] => 14e11627da738a2f20463a19ebfde717 [45] => 14e11627da738a2f20463a19ebfde717 [46] => 14e11627da738a2f20463a19ebfde717 [47] => 14e11627da738a2f20463a19ebfde717 [48] => 14e11627da738a2f20463a19ebfde717 [49] => 14e11627da738a2f20463a19ebfde717 [50] => 14e11627da738a2f20463a19ebfde717 [51] => 14e11627da738a2f20463a19ebfde717 [52] => 14e11627da738a2f20463a19ebfde717 [53] => 14e11627da738a2f20463a19ebfde717 [54] => 14e11627da738a2f20463a19ebfde717 [55] => 14e11627da738a2f20463a19ebfde717 [56] => 14e11627da738a2f20463a19ebfde717 [57] => 14e11627da738a2f20463a19ebfde717 [58] => 14e11627da738a2f20463a19ebfde717 [59] => 14e11627da738a2f20463a19ebfde717 [60] => 14e11627da738a2f20463a19ebfde717 [61] => 14e11627da738a2f20463a19ebfde717 [62] => 14e11627da738a2f20463a19ebfde717 [63] => 14e11627da738a2f20463a19ebfde717 [64] => 14e11627da738a2f20463a19ebfde717 [65] => 14e11627da738a2f20463a19ebfde717 [66] => 14e11627da738a2f20463a19ebfde717 [67] => 14e11627da738a2f20463a19ebfde717 [68] => 14e11627da738a2f20463a19ebfde717 [69] => 14e11627da738a2f20463a19ebfde717 [70] => 14e11627da738a2f20463a19ebfde717 [71] => 14e11627da738a2f20463a19ebfde717 [72] => 14e11627da738a2f20463a19ebfde717 [73] => 14e11627da738a2f20463a19ebfde717 [74] => 14e11627da738a2f20463a19ebfde717 [75] => 14e11627da738a2f20463a19ebfde717 [76] => 14e11627da738a2f20463a19ebfde717 [77] => 14e11627da738a2f20463a19ebfde717 [78] => 14e11627da738a2f20463a19ebfde717 [79] => 14e11627da738a2f20463a19ebfde717 [80] => 14e11627da738a2f20463a19ebfde717 [81] => 14e11627da738a2f20463a19ebfde717 [82] => 14e11627da738a2f20463a19ebfde717 [83] => 14e11627da738a2f20463a19ebfde717 [84] => 14e11627da738a2f20463a19ebfde717 [85] => 14e11627da738a2f20463a19ebfde717 [86] => 14e11627da738a2f20463a19ebfde717 [87] => 14e11627da738a2f20463a19ebfde717 [88] => 14e11627da738a2f20463a19ebfde717 [89] => 14e11627da738a2f20463a19ebfde717 [90] => 14e11627da738a2f20463a19ebfde717 [91] => 14e11627da738a2f20463a19ebfde717 [92] => 14e11627da738a2f20463a19ebfde717 [93] => 14e11627da738a2f20463a19ebfde717 [94] => 14e11627da738a2f20463a19ebfde717 [95] => 14e11627da738a2f20463a19ebfde717 [96] => 14e11627da738a2f20463a19ebfde717 [97] => 14e11627da738a2f20463a19ebfde717 [98] => 14e11627da738a2f20463a19ebfde717 [99] => 14e11627da738a2f20463a19ebfde717 [100] => 14e11627da738a2f20463a19ebfde717 ) [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) [post_name] => researcher-finds-lastpass-2fa-could-become-1fa )

1

Attach Id ( 959790 ) not integer for post_thumbnail 835201

1

Attach Id ( 856794 ) not integer for post_thumbnail 761607

1

Attach Id ( 856801 ) not integer for post_thumbnail 734000

1

Attach Id ( 856800 ) not integer for post_thumbnail 734000

1

Attach Id ( 856806 ) not integer for post_thumbnail 725032

1

Attach Id ( 1035932 ) not integer for post_thumbnail 1030349

1

Attach Id ( 1097605 ) not integer for post_thumbnail 1021772

1

Attach Id ( 1070445 ) not integer for post_thumbnail 1031592

1

Attach Id ( 1088817 ) not integer for post_thumbnail 1084937

1

Attach Id ( 1097146 ) not integer for post_thumbnail 1034023

1

Attach Id ( 1097756 ) not integer for post_thumbnail 1081891

1

Attach Id ( 1137474 ) not integer for post_thumbnail 1064018

1

Attach Id ( 1114278 ) not integer for post_thumbnail 1112807

1

Attach Id ( 1120202 ) not integer for post_thumbnail 1110638

1

Attach Id ( 1129744 ) not integer for post_thumbnail 1129745

1

Attach Id ( 1129964 ) not integer for post_thumbnail 1129965

1

Attach Id ( 1130126 ) not integer for post_thumbnail 1130127

1

Attach Id ( 1130129 ) not integer for post_thumbnail 1130130

1

Attach Id ( 1130132 ) not integer for post_thumbnail 1130133

1

Attach Id ( 1130135 ) not integer for post_thumbnail 1130136

1

Attach Id ( 1130138 ) not integer for post_thumbnail 1130139

1

Attach Id ( 1130141 ) not integer for post_thumbnail 1130142

1

Attach Id ( 1130144 ) not integer for post_thumbnail 1130145

1

Attach Id ( 1130147 ) not integer for post_thumbnail 1130148

1

Attach Id ( 1130238 ) not integer for post_thumbnail 1130240

1

Attach Id ( 1130243 ) not integer for post_thumbnail 1130244

1

Attach Id ( 1130246 ) not integer for post_thumbnail 1130247

1

Attach Id ( 1130326 ) not integer for post_thumbnail 1130328

1

Attach Id ( 1130340 ) not integer for post_thumbnail 1130341

1

Attach Id ( 1130410 ) not integer for post_thumbnail 1130411

1

Attach Id ( 1130484 ) not integer for post_thumbnail 1128829

1

Attach Id ( 1130487 ) not integer for post_thumbnail 1130488

1

Attach Id ( 1130490 ) not integer for post_thumbnail 1130491

1

Attach Id ( 1130493 ) not integer for post_thumbnail 1130494

1

Attach Id ( 1130496 ) not integer for post_thumbnail 1130497

1

Attach Id ( 1130552 ) not integer for post_thumbnail 1130553

1

Attach Id ( 1130585 ) not integer for post_thumbnail 1130586

1

Attach Id ( 1130685 ) not integer for post_thumbnail 1130687

1

Attach Id ( 1130689 ) not integer for post_thumbnail 1130690

1

Attach Id ( 1130738 ) not integer for post_thumbnail 1130739

1

Attach Id ( 1130741 ) not integer for post_thumbnail 1130742

1

Attach Id ( 1130799 ) not integer for post_thumbnail 1130800

1

Attach Id ( 1130802 ) not integer for post_thumbnail 1130803

1

Attach Id ( 1130805 ) not integer for post_thumbnail 1130806

1

Attach Id ( 1130811 ) not integer for post_thumbnail 1070037

1

Attach Id ( 1130818 ) not integer for post_thumbnail 1130819

1

Attach Id ( 1130821 ) not integer for post_thumbnail 1130822

1

Attach Id ( 1130828 ) not integer for post_thumbnail 1130829

1

Attach Id ( 1130831 ) not integer for post_thumbnail 1130832

1

Attach Id ( 1130872 ) not integer for post_thumbnail 1130873

1

Attach Id ( 1130875 ) not integer for post_thumbnail 1130876

1

Attach Id ( 1130878 ) not integer for post_thumbnail 1130879

1

Attach Id ( 1130881 ) not integer for post_thumbnail 1130882

1

Attach Id ( 1130951 ) not integer for post_thumbnail 1130952

1

Attach Id ( 1130954 ) not integer for post_thumbnail 1130955

1

Attach Id ( 1130957 ) not integer for post_thumbnail 1130958

1

Attach Id ( 1130960 ) not integer for post_thumbnail 1130961

1

Attach Id ( 1131017 ) not integer for post_thumbnail 1131018

1

Attach Id ( 1131211 ) not integer for post_thumbnail 1131212

1

Attach Id ( 1131214 ) not integer for post_thumbnail 1131215

1

Attach Id ( 1131217 ) not integer for post_thumbnail 1131218

1

Attach Id ( 1131220 ) not integer for post_thumbnail 1131221

1

Attach Id ( 1131259 ) not integer for post_thumbnail 1131260

1

Attach Id ( 1131627 ) not integer for post_thumbnail 1037929

1

Attach Id ( 1131636 ) not integer for post_thumbnail 1131637

1

Attach Id ( 1131646 ) not integer for post_thumbnail 1131647

1

Attach Id ( 1132657 ) not integer for post_thumbnail 1132660

1

Attach Id ( 1132917 ) not integer for post_thumbnail 1132918

1

Attach Id ( 1133020 ) not integer for post_thumbnail 1133021

1

Attach Id ( 1133152 ) not integer for post_thumbnail 1133153

1

Attach Id ( 1133175 ) not integer for post_thumbnail 1133176

1

Attach Id ( 1133320 ) not integer for post_thumbnail 1133321

1

Attach Id ( 1153462 ) not integer for post_thumbnail 1134033

1

Attach Id ( 1134727 ) not integer for post_thumbnail 1134729

1

Attach Id ( 1135188 ) not integer for post_thumbnail 1135190

1

Attach Id ( 1137179 ) not integer for post_thumbnail 1137180

1

Attach Id ( 1137182 ) not integer for post_thumbnail 1137183

1

Attach Id ( 1137185 ) not integer for post_thumbnail 1137186

1

Attach Id ( 1137188 ) not integer for post_thumbnail 1137189

1

Attach Id ( 1137191 ) not integer for post_thumbnail 1137192

1

Attach Id ( 1137194 ) not integer for post_thumbnail 1137195

1

Attach Id ( 1137197 ) not integer for post_thumbnail 1137198

1

Attach Id ( 1137200 ) not integer for post_thumbnail 1137201

1

Attach Id ( 1137219 ) not integer for post_thumbnail 1137220

1

Attach Id ( 1137371 ) not integer for post_thumbnail 1137372

1

Attach Id ( 1137439 ) not integer for post_thumbnail 1137441

1

Attach Id ( 1137444 ) not integer for post_thumbnail 1137446

1

Attach Id ( 1137450 ) not integer for post_thumbnail 1137452

1

Attach Id ( 1137483 ) not integer for post_thumbnail 1137484

1

Attach Id ( 1137492 ) not integer for post_thumbnail 1137493

1

Attach Id ( 1137719 ) not integer for post_thumbnail 1137720

1

Attach Id ( 1137722 ) not integer for post_thumbnail 1137723

1

Attach Id ( 1137724 ) not integer for post_thumbnail 1137727

1

Attach Id ( 1137729 ) not integer for post_thumbnail 1137730

1

Attach Id ( 1137734 ) not integer for post_thumbnail 1137735

1

Attach Id ( 1137773 ) not integer for post_thumbnail 1137774

1

Attach Id ( 1137802 ) not integer for post_thumbnail 1137803

1

Attach Id ( 1137804 ) not integer for post_thumbnail 1137805

1

Attach Id ( 1137807 ) not integer for post_thumbnail 1137808

1

Attach Id ( 1137829 ) not integer for post_thumbnail 1137830

1

Attach Id ( 1137878 ) not integer for post_thumbnail 1137880

1

Attach Id ( 1137893 ) not integer for post_thumbnail 1137896

1

Attach Id ( 1137907 ) not integer for post_thumbnail 1137909

1

Attach Id ( 1137912 ) not integer for post_thumbnail 1137913

1

Attach Id ( 1138054 ) not integer for post_thumbnail 1138055

1

Attach Id ( 1138071 ) not integer for post_thumbnail 1138072

1

Attach Id ( 1138073 ) not integer for post_thumbnail 1138074

1

Attach Id ( 1138120 ) not integer for post_thumbnail 1138123

1

Attach Id ( 1138127 ) not integer for post_thumbnail 1138128

1

Attach Id ( 1138130 ) not integer for post_thumbnail 1138131

1

Attach Id ( 1138133 ) not integer for post_thumbnail 1138134

1

Attach Id ( 1138231 ) not integer for post_thumbnail 1138232

1

Attach Id ( 1138234 ) not integer for post_thumbnail 1138235

1

Attach Id ( 1138237 ) not integer for post_thumbnail 1138238

1

Attach Id ( 1138240 ) not integer for post_thumbnail 1138241

1

Attach Id ( 1138243 ) not integer for post_thumbnail 1138244

1

Attach Id ( 1138281 ) not integer for post_thumbnail 1138282

1

Attach Id ( 1138322 ) not integer for post_thumbnail 1138323

1

Attach Id ( 1138328 ) not integer for post_thumbnail 1138329

1

Attach Id ( 1138371 ) not integer for post_thumbnail 1138372

1

Attach Id ( 1138492 ) not integer for post_thumbnail 1138493

1

Attach Id ( 1138504 ) not integer for post_thumbnail 1138505

1

Attach Id ( 1138522 ) not integer for post_thumbnail 1138523

1

Attach Id ( 1138525 ) not integer for post_thumbnail 1138526

1

Attach Id ( 1138528 ) not integer for post_thumbnail 1138529

1

Attach Id ( 1138531 ) not integer for post_thumbnail 1138533

1

Attach Id ( 1138547 ) not integer for post_thumbnail 1066943

1

Attach Id ( 1138676 ) not integer for post_thumbnail 1138677

1

Attach Id ( 1138754 ) not integer for post_thumbnail 1138755

1

Attach Id ( 1138915 ) not integer for post_thumbnail 1138916

1

Attach Id ( 1139357 ) not integer for post_thumbnail 1139358

1

Attach Id ( 1139364 ) not integer for post_thumbnail 1139365

1

Attach Id ( 1139367 ) not integer for post_thumbnail 1139368

1

Attach Id ( 1139370 ) not integer for post_thumbnail 1139371

1

Attach Id ( 1139373 ) not integer for post_thumbnail 1139374

1

Attach Id ( 1139397 ) not integer for post_thumbnail 1139398

1

Attach Id ( 1139432 ) not integer for post_thumbnail 1139433

1

Attach Id ( 1139470 ) not integer for post_thumbnail 1139471

1

Attach Id ( 1139582 ) not integer for post_thumbnail 1139583

1

Attach Id ( 1139609 ) not integer for post_thumbnail 1139610

1

Attach Id ( 1139612 ) not integer for post_thumbnail 1139613

1

Attach Id ( 1139615 ) not integer for post_thumbnail 1139616

1

Attach Id ( 1139618 ) not integer for post_thumbnail 1139619

1

Attach Id ( 1139621 ) not integer for post_thumbnail 1139622

1

Attach Id ( 1139653 ) not integer for post_thumbnail 1139654

1

Attach Id ( 1139776 ) not integer for post_thumbnail 1139777

1

Attach Id ( 1139781 ) not integer for post_thumbnail 1139782

1

Attach Id ( 1139784 ) not integer for post_thumbnail 1139785

1

Attach Id ( 1139849 ) not integer for post_thumbnail 1139851

1

Attach Id ( 1139861 ) not integer for post_thumbnail 1139862

1

Attach Id ( 1142440 ) not integer for post_thumbnail 1139873

1

Attach Id ( 1139883 ) not integer for post_thumbnail 1139884

1

Attach Id ( 1140004 ) not integer for post_thumbnail 1140006

1

Attach Id ( 1140180 ) not integer for post_thumbnail 1140181

1

Attach Id ( 1140186 ) not integer for post_thumbnail 1140187

1

Attach Id ( 1140189 ) not integer for post_thumbnail 1140190

1

Attach Id ( 1140235 ) not integer for post_thumbnail 1140236

1

Attach Id ( 1140238 ) not integer for post_thumbnail 1140239

1

Attach Id ( 1140300 ) not integer for post_thumbnail 1140302

1

Attach Id ( 1140310 ) not integer for post_thumbnail 1140311

1

Attach Id ( 1140313 ) not integer for post_thumbnail 1140314

1

Attach Id ( 1140316 ) not integer for post_thumbnail 1140317

1

Attach Id ( 1140319 ) not integer for post_thumbnail 1140320

1

Attach Id ( 1140322 ) not integer for post_thumbnail 1140323

1

Attach Id ( 1140325 ) not integer for post_thumbnail 1140326

1

Attach Id ( 1140333 ) not integer for post_thumbnail 1140334

1

Attach Id ( 1140388 ) not integer for post_thumbnail 1140389

1

Attach Id ( 1140428 ) not integer for post_thumbnail 1140429

1

Attach Id ( 1140431 ) not integer for post_thumbnail 1140432

1

Attach Id ( 1140458 ) not integer for post_thumbnail 1140459

1

Attach Id ( 1140463 ) not integer for post_thumbnail 1140464

1

Attach Id ( 1140569 ) not integer for post_thumbnail 1140570

1

Attach Id ( 1140572 ) not integer for post_thumbnail 1140574

1

Attach Id ( 1140678 ) not integer for post_thumbnail 1140679

1

Attach Id ( 1140681 ) not integer for post_thumbnail 1140682

1

Attach Id ( 1140700 ) not integer for post_thumbnail 1140701

1

Attach Id ( 1140707 ) not integer for post_thumbnail 1140708

1

Attach Id ( 1140817 ) not integer for post_thumbnail 1140818

1

Attach Id ( 1140842 ) not integer for post_thumbnail 1140843

1

Attach Id ( 1140845 ) not integer for post_thumbnail 1140846

1

Attach Id ( 1141315 ) not integer for post_thumbnail 1141316

1

Attach Id ( 1141592 ) not integer for post_thumbnail 1141593

1

Attach Id ( 1141951 ) not integer for post_thumbnail 1141952

1

Attach Id ( 1142049 ) not integer for post_thumbnail 1142050

1

Attach Id ( 1142052 ) not integer for post_thumbnail 1142053

1

Attach Id ( 1142059 ) not integer for post_thumbnail 1142060

1

Attach Id ( 1142064 ) not integer for post_thumbnail 1142065

1

Attach Id ( 1142067 ) not integer for post_thumbnail 1142068

1

Attach Id ( 1142070 ) not integer for post_thumbnail 1142071

1

Attach Id ( 1142073 ) not integer for post_thumbnail 1142074

1

Attach Id ( 1142096 ) not integer for post_thumbnail 1142097

1

Attach Id ( 1142152 ) not integer for post_thumbnail 1142154

1

Attach Id ( 1142247 ) not integer for post_thumbnail 1142248

1

Attach Id ( 1142258 ) not integer for post_thumbnail 1142259

1

Attach Id ( 1142285 ) not integer for post_thumbnail 1142286

1

Attach Id ( 1142340 ) not integer for post_thumbnail 1142341

1

Attach Id ( 1142401 ) not integer for post_thumbnail 1142402

1

Attach Id ( 1142415 ) not integer for post_thumbnail 1142416

1

Attach Id ( 1142418 ) not integer for post_thumbnail 1142419

1

Attach Id ( 1142421 ) not integer for post_thumbnail 1142422

1

Attach Id ( 1142424 ) not integer for post_thumbnail 1142425

1

Attach Id ( 1142434 ) not integer for post_thumbnail 1142435

1

Attach Id ( 1142437 ) not integer for post_thumbnail 1142438

1

Attach Id ( 1142443 ) not integer for post_thumbnail 1142444

1

Attach Id ( 1142518 ) not integer for post_thumbnail 1142519

1

Attach Id ( 1142575 ) not integer for post_thumbnail 1142577

1

Attach Id ( 1145799 ) not integer for post_thumbnail 1142603

1

Attach Id ( 1142605 ) not integer for post_thumbnail 1142606

1

Attach Id ( 1142620 ) not integer for post_thumbnail 1142621

1

Attach Id ( 1142627 ) not integer for post_thumbnail 1142628

1

Attach Id ( 1142630 ) not integer for post_thumbnail 1142631

1

Attach Id ( 1142633 ) not integer for post_thumbnail 1142634

1

Attach Id ( 1142697 ) not integer for post_thumbnail 1142699

1

Attach Id ( 1142702 ) not integer for post_thumbnail 1142703

1

Attach Id ( 1142714 ) not integer for post_thumbnail 1142715

1

Attach Id ( 1142717 ) not integer for post_thumbnail 1142718

1

Attach Id ( 1142722 ) not integer for post_thumbnail 1142723

1

Attach Id ( 1142764 ) not integer for post_thumbnail 1142765

1

Attach Id ( 1142811 ) not integer for post_thumbnail 1142812

1

Attach Id ( 1142816 ) not integer for post_thumbnail 1142817

1

Attach Id ( 1142859 ) not integer for post_thumbnail 1142860

1

Attach Id ( 1142878 ) not integer for post_thumbnail 1142879

1

Attach Id ( 1142935 ) not integer for post_thumbnail 1142936

1

Attach Id ( 1143022 ) not integer for post_thumbnail 1143023

1

Attach Id ( 1143064 ) not integer for post_thumbnail 1143065

1

Attach Id ( 1143124 ) not integer for post_thumbnail 1143125

1

Attach Id ( 1143127 ) not integer for post_thumbnail 1143128

1

Attach Id ( 1143130 ) not integer for post_thumbnail 1143131

1

Attach Id ( 1143133 ) not integer for post_thumbnail 1143134

1

Attach Id ( 1143203 ) not integer for post_thumbnail 1143204

1

Attach Id ( 1143209 ) not integer for post_thumbnail 1143210

1

Attach Id ( 1143357 ) not integer for post_thumbnail 1143358

1

Attach Id ( 1143394 ) not integer for post_thumbnail 1143395

1

Attach Id ( 1143550 ) not integer for post_thumbnail 1143552

1

Attach Id ( 1144486 ) not integer for post_thumbnail 1144487

1

Attach Id ( 1144670 ) not integer for post_thumbnail 1144671

1

Attach Id ( 1144684 ) not integer for post_thumbnail 1144706

1

Attach Id ( 1144778 ) not integer for post_thumbnail 1144779

1

Attach Id ( 1144781 ) not integer for post_thumbnail 1144782

1

Attach Id ( 1144784 ) not integer for post_thumbnail 1144785

1

Attach Id ( 1144787 ) not integer for post_thumbnail 1144788

1

Attach Id ( 1144790 ) not integer for post_thumbnail 1144791

1

Attach Id ( 1144793 ) not integer for post_thumbnail 1144794

1

Attach Id ( 1144796 ) not integer for post_thumbnail 1144798

1

Attach Id ( 1144800 ) not integer for post_thumbnail 1144801

1

Attach Id ( 1144841 ) not integer for post_thumbnail 1144842

1

Attach Id ( 1146229 ) not integer for post_thumbnail 1144906

1

Attach Id ( 1144910 ) not integer for post_thumbnail 1144911

1

Attach Id ( 1144913 ) not integer for post_thumbnail 1144915

1

Attach Id ( 1145070 ) not integer for post_thumbnail 1145071

1

Attach Id ( 1145095 ) not integer for post_thumbnail 1145105

1

Attach Id ( 1145118 ) not integer for post_thumbnail 1145119

1

Attach Id ( 1145121 ) not integer for post_thumbnail 1145122

1

Attach Id ( 1145218 ) not integer for post_thumbnail 1145219

1

Attach Id ( 1145221 ) not integer for post_thumbnail 1145222

1

Attach Id ( 1145310 ) not integer for post_thumbnail 1145311

1

Attach Id ( 1145328 ) not integer for post_thumbnail 1145329

1

Attach Id ( 1145333 ) not integer for post_thumbnail 1145334

1

Attach Id ( 1145339 ) not integer for post_thumbnail 1145340

1

Attach Id ( 1145344 ) not integer for post_thumbnail 1145346

1

Attach Id ( 1145497 ) not integer for post_thumbnail 1145499

1

Attach Id ( 1145513 ) not integer for post_thumbnail 1145515

1

Attach Id ( 1145561 ) not integer for post_thumbnail 1145562

1

Attach Id ( 1145636 ) not integer for post_thumbnail 1145637

1

Attach Id ( 1145639 ) not integer for post_thumbnail 1145641

1

Attach Id ( 1145659 ) not integer for post_thumbnail 1145660

1

Attach Id ( 1145661 ) not integer for post_thumbnail 1145662

1

Attach Id ( 1145673 ) not integer for post_thumbnail 1145674

1

Attach Id ( 1145676 ) not integer for post_thumbnail 1145677

1

Attach Id ( 1145683 ) not integer for post_thumbnail 1145684

1

Attach Id ( 1145802 ) not integer for post_thumbnail 1145803

1

Attach Id ( 1145859 ) not integer for post_thumbnail 1145860

1

Attach Id ( 1145861 ) not integer for post_thumbnail 1145862

1

Attach Id ( 1145866 ) not integer for post_thumbnail 1145868

1

Attach Id ( 1145873 ) not integer for post_thumbnail 1145874

1

Attach Id ( 1145876 ) not integer for post_thumbnail 1145877

1

Attach Id ( 1146078 ) not integer for post_thumbnail 1146081

1

Attach Id ( 1146085 ) not integer for post_thumbnail 1146086

1

Attach Id ( 1146088 ) not integer for post_thumbnail 1146089

1

Attach Id ( 1146113 ) not integer for post_thumbnail 1146114

1

Attach Id ( 1146211 ) not integer for post_thumbnail 1146212

1

Attach Id ( 1146214 ) not integer for post_thumbnail 1146215

1

Attach Id ( 1147482 ) not integer for post_thumbnail 1147483

1

Attach Id ( 1147591 ) not integer for post_thumbnail 1147592

1

Attach Id ( 1147618 ) not integer for post_thumbnail 1147619

1

Attach Id ( 1147698 ) not integer for post_thumbnail 1147699

1

Attach Id ( 1147701 ) not integer for post_thumbnail 1147702

1

Attach Id ( 1147704 ) not integer for post_thumbnail 1147705

1

Attach Id ( 1147707 ) not integer for post_thumbnail 1147708

1

Attach Id ( 1147710 ) not integer for post_thumbnail 1147711

1

Attach Id ( 1147713 ) not integer for post_thumbnail 1147714

1

Attach Id ( 1147716 ) not integer for post_thumbnail 1147717

1

Attach Id ( 1147774 ) not integer for post_thumbnail 1147775

1

Attach Id ( 1147784 ) not integer for post_thumbnail 1147785

1

Attach Id ( 1147796 ) not integer for post_thumbnail 1147797

1

Attach Id ( 1147915 ) not integer for post_thumbnail 1147916

1

Attach Id ( 1147918 ) not integer for post_thumbnail 1147919

1

Attach Id ( 1147927 ) not integer for post_thumbnail 1147928

1

Attach Id ( 1148009 ) not integer for post_thumbnail 1148010

1

Attach Id ( 1148012 ) not integer for post_thumbnail 1148013

1

Attach Id ( 1148017 ) not integer for post_thumbnail 1148018

1

Attach Id ( 1148089 ) not integer for post_thumbnail 1148090

1

Attach Id ( 1148092 ) not integer for post_thumbnail 1148093

1

Attach Id ( 1148095 ) not integer for post_thumbnail 1148096

1

Attach Id ( 1148189 ) not integer for post_thumbnail 1148190

1

Attach Id ( 1148203 ) not integer for post_thumbnail 1148204

1

Attach Id ( 1148239 ) not integer for post_thumbnail 1148240

1

Attach Id ( 1148348 ) not integer for post_thumbnail 1148349

1

Attach Id ( 1148351 ) not integer for post_thumbnail 1148352

1

Attach Id ( 1148445 ) not integer for post_thumbnail 1148446

1

Attach Id ( 1148548 ) not integer for post_thumbnail 1148550

1

Attach Id ( 1148553 ) not integer for post_thumbnail 1148554

1

Attach Id ( 1148557 ) not integer for post_thumbnail 1148558

1

Attach Id ( 1148560 ) not integer for post_thumbnail 1148561

1

Attach Id ( 1148563 ) not integer for post_thumbnail 1148564

1

Attach Id ( 1148694 ) not integer for post_thumbnail 1148695

1

Attach Id ( 1148700 ) not integer for post_thumbnail 1148701

1

Attach Id ( 1148757 ) not integer for post_thumbnail 1148758

1

Attach Id ( 1148765 ) not integer for post_thumbnail 1148768

1

Attach Id ( 1148778 ) not integer for post_thumbnail 1148779

1

Attach Id ( 1148811 ) not integer for post_thumbnail 1148812

1

Attach Id ( 1148814 ) not integer for post_thumbnail 1148815

1

Attach Id ( 1148933 ) not integer for post_thumbnail 1148934

1

Attach Id ( 1148948 ) not integer for post_thumbnail 1148949

1

Attach Id ( 1150551 ) not integer for post_thumbnail 1150552

1

Attach Id ( 1150554 ) not integer for post_thumbnail 1150556

1

Attach Id ( 1150607 ) not integer for post_thumbnail 1150608

1

Attach Id ( 1150642 ) not integer for post_thumbnail 1150643

1

Attach Id ( 1150753 ) not integer for post_thumbnail 1150754

1

Attach Id ( 1150788 ) not integer for post_thumbnail 1150789

1

Attach Id ( 1157821 ) not integer for post_thumbnail 1150792

1

Attach Id ( 1155230 ) not integer for post_thumbnail 1037716

1

Attach Id ( 1150942 ) not integer for post_thumbnail 1150944

1

Attach Id ( 1151814 ) not integer for post_thumbnail 1151818

1

Attach Id ( 1152942 ) not integer for post_thumbnail 1152943

1

Attach Id ( 1153092 ) not integer for post_thumbnail 1153093

1

Attach Id ( 1153203 ) not integer for post_thumbnail 1153204

1

Attach Id ( 1153515 ) not integer for post_thumbnail 1153516

1

Attach Id ( 1154706 ) not integer for post_thumbnail 1154707

1

Attach Id ( 1154709 ) not integer for post_thumbnail 1154710

1

Attach Id ( 1154712 ) not integer for post_thumbnail 1154713

1

Attach Id ( 1154715 ) not integer for post_thumbnail 1154716

1

Attach Id ( 1154718 ) not integer for post_thumbnail 1154719

1

Attach Id ( 1154721 ) not integer for post_thumbnail 1154722

1

Attach Id ( 1154724 ) not integer for post_thumbnail 1154725

1

Attach Id ( 1154770 ) not integer for post_thumbnail 1154771

1

Attach Id ( 1154829 ) not integer for post_thumbnail 1154830

1

Attach Id ( 1154869 ) not integer for post_thumbnail 1154870

1

Attach Id ( 1154872 ) not integer for post_thumbnail 1154873

1

Attach Id ( 1154875 ) not integer for post_thumbnail 1154876

1

Attach Id ( 1154889 ) not integer for post_thumbnail 1154890

1

Attach Id ( 1154928 ) not integer for post_thumbnail 1154929

1

Attach Id ( 1154987 ) not integer for post_thumbnail 1154988

1

Attach Id ( 1159126 ) not integer for post_thumbnail 1155002

1

Attach Id ( 1155004 ) not integer for post_thumbnail 1155005

1

Attach Id ( 1155007 ) not integer for post_thumbnail 1155008

1

Attach Id ( 1155010 ) not integer for post_thumbnail 1155011

1

Attach Id ( 1155013 ) not integer for post_thumbnail 1155014

1

Attach Id ( 1155016 ) not integer for post_thumbnail 1155017

1

Attach Id ( 1155019 ) not integer for post_thumbnail 1155020

1

Attach Id ( 1155034 ) not integer for post_thumbnail 1155035

1

Attach Id ( 1155037 ) not integer for post_thumbnail 1155038

1

Attach Id ( 1155040 ) not integer for post_thumbnail 1155041

1

Attach Id ( 1155043 ) not integer for post_thumbnail 1155044

1

Attach Id ( 1155046 ) not integer for post_thumbnail 1155047

1

Attach Id ( 1155051 ) not integer for post_thumbnail 1155062

1

Attach Id ( 1155221 ) not integer for post_thumbnail 1155122

1

Attach Id ( 1155128 ) not integer for post_thumbnail 1155133

1

Attach Id ( 1155142 ) not integer for post_thumbnail 1155144

1

Attach Id ( 1155163 ) not integer for post_thumbnail 1155169

1

Attach Id ( 1155181 ) not integer for post_thumbnail 1155182

1

Attach Id ( 1155184 ) not integer for post_thumbnail 1155185

1

Attach Id ( 1155187 ) not integer for post_thumbnail 1155188

1

Attach Id ( 1155190 ) not integer for post_thumbnail 1155191

1

Attach Id ( 1155233 ) not integer for post_thumbnail 1155234

1

Attach Id ( 1155236 ) not integer for post_thumbnail 1155237

1

Attach Id ( 1155239 ) not integer for post_thumbnail 1155240

1

Attach Id ( 1155716 ) not integer for post_thumbnail 1155243

1

Attach Id ( 1155261 ) not integer for post_thumbnail 1155262

1

Attach Id ( 1155297 ) not integer for post_thumbnail 1155298

1

Attach Id ( 1155300 ) not integer for post_thumbnail 1155301

1

Attach Id ( 1155322 ) not integer for post_thumbnail 1155324

1

Attach Id ( 1155385 ) not integer for post_thumbnail 1155386

1

Attach Id ( 1155395 ) not integer for post_thumbnail 1155396

1

Attach Id ( 1155501 ) not integer for post_thumbnail 1155502

1

Attach Id ( 1155598 ) not integer for post_thumbnail 1155599

1

Attach Id ( 1155601 ) not integer for post_thumbnail 1155602

1

Attach Id ( 1155612 ) not integer for post_thumbnail 1155614

1

Attach Id ( 1155698 ) not integer for post_thumbnail 1155700

1

Attach Id ( 1155710 ) not integer for post_thumbnail 1155711

1

Attach Id ( 1155713 ) not integer for post_thumbnail 1155714

1

Attach Id ( 1155731 ) not integer for post_thumbnail 1155732

1

Attach Id ( 1155766 ) not integer for post_thumbnail 1155767

1

Attach Id ( 1156478 ) not integer for post_thumbnail 1156484

1

Attach Id ( 1156577 ) not integer for post_thumbnail 1156578

1

Attach Id ( 1156580 ) not integer for post_thumbnail 1156581

1

Attach Id ( 1156583 ) not integer for post_thumbnail 1156584

1

Attach Id ( 1156586 ) not integer for post_thumbnail 1156587

1

Attach Id ( 1156589 ) not integer for post_thumbnail 1156590

1

Attach Id ( 1156740 ) not integer for post_thumbnail 1156741

1

Attach Id ( 1156754 ) not integer for post_thumbnail 1156755

1

Attach Id ( 1156840 ) not integer for post_thumbnail 1156841

1

Attach Id ( 1156843 ) not integer for post_thumbnail 1156844

1

Attach Id ( 1156911 ) not integer for post_thumbnail 1156912

1

Attach Id ( 1157818 ) not integer for post_thumbnail 1156915

1

Attach Id ( 1156917 ) not integer for post_thumbnail 1156918

1

Attach Id ( 1156920 ) not integer for post_thumbnail 1156921

1

Attach Id ( 1156972 ) not integer for post_thumbnail 1156973

1

Attach Id ( 1156975 ) not integer for post_thumbnail 1156976

1

Attach Id ( 1156978 ) not integer for post_thumbnail 1156979

1

Attach Id ( 1156993 ) not integer for post_thumbnail 1156994

1

Attach Id ( 1156996 ) not integer for post_thumbnail 1156997

1

Attach Id ( 1157038 ) not integer for post_thumbnail 1157039

1

Attach Id ( 1157078 ) not integer for post_thumbnail 1157079

1

Attach Id ( 1157189 ) not integer for post_thumbnail 1157190

1

Attach Id ( 1157187 ) not integer for post_thumbnail 1157196

1

Attach Id ( 1157212 ) not integer for post_thumbnail 1157213

1

Attach Id ( 1157215 ) not integer for post_thumbnail 1157216

1

Attach Id ( 1157218 ) not integer for post_thumbnail 1157219

1

Attach Id ( 1157221 ) not integer for post_thumbnail 1157222

1

Attach Id ( 1157224 ) not integer for post_thumbnail 1157225

1

Attach Id ( 1157231 ) not integer for post_thumbnail 1157232

1

Attach Id ( 1157234 ) not integer for post_thumbnail 1157235

1

Attach Id ( 1157237 ) not integer for post_thumbnail 1157238

1

Attach Id ( 1157323 ) not integer for post_thumbnail 1157324

1

Attach Id ( 1157326 ) not integer for post_thumbnail 1157327

1

Attach Id ( 1157329 ) not integer for post_thumbnail 1157330

1

Attach Id ( 1157332 ) not integer for post_thumbnail 1157333

1

Attach Id ( 1157343 ) not integer for post_thumbnail 1157344

1

Attach Id ( 1157346 ) not integer for post_thumbnail 1157347

1

Attach Id ( 1157349 ) not integer for post_thumbnail 1157350

1

Attach Id ( 1157358 ) not integer for post_thumbnail 1157360

1

Attach Id ( 1157375 ) not integer for post_thumbnail 1157376

1

Attach Id ( 1157392 ) not integer for post_thumbnail 1157393

1

Attach Id ( 1157405 ) not integer for post_thumbnail 1157407

1

Attach Id ( 1157418 ) not integer for post_thumbnail 1157420

1

Attach Id ( 1157424 ) not integer for post_thumbnail 1157425

1

Attach Id ( 1157427 ) not integer for post_thumbnail 1157428

1

Attach Id ( 1157430 ) not integer for post_thumbnail 1157431

1

Attach Id ( 1157485 ) not integer for post_thumbnail 1157486

1

Attach Id ( 1157553 ) not integer for post_thumbnail 1157554

1

Attach Id ( 1157556 ) not integer for post_thumbnail 1157557

1

Attach Id ( 1157603 ) not integer for post_thumbnail 1157604

1

Attach Id ( 1193125 ) not integer for post_thumbnail 1046394

1

Attach Id ( 1157627 ) not integer for post_thumbnail 1157628

1

Attach Id ( 1157630 ) not integer for post_thumbnail 1157631

1

Attach Id ( 1157633 ) not integer for post_thumbnail 1157634

1

Attach Id ( 1157644 ) not integer for post_thumbnail 1157645

1

Attach Id ( 1157651 ) not integer for post_thumbnail 1157652

1

Attach Id ( 1157654 ) not integer for post_thumbnail 1157655

1

Attach Id ( 1157800 ) not integer for post_thumbnail 1157801

1

Attach Id ( 1157815 ) not integer for post_thumbnail 1157816

1

Attach Id ( 1158696 ) not integer for post_thumbnail 1158697

1

Attach Id ( 1158714 ) not integer for post_thumbnail 1158715

1

Attach Id ( 1158717 ) not integer for post_thumbnail 1158718

1

Attach Id ( 1158723 ) not integer for post_thumbnail 1158724

1

Attach Id ( 1158726 ) not integer for post_thumbnail 1158727

1

Attach Id ( 1158729 ) not integer for post_thumbnail 1158730

1

Attach Id ( 1158732 ) not integer for post_thumbnail 1158733

1

Attach Id ( 1158735 ) not integer for post_thumbnail 1158736

1

Attach Id ( 1158738 ) not integer for post_thumbnail 1158739

1

Attach Id ( 1158796 ) not integer for post_thumbnail 1158797

1

Attach Id ( 1158802 ) not integer for post_thumbnail 1158804

1

Attach Id ( 1158881 ) not integer for post_thumbnail 1158882

1

Attach Id ( 1158886 ) not integer for post_thumbnail 1158887

1

Attach Id ( 1158943 ) not integer for post_thumbnail 1158944

1

Attach Id ( 1158946 ) not integer for post_thumbnail 1158947

1

Attach Id ( 1158985 ) not integer for post_thumbnail 1158986

1

Attach Id ( 1158989 ) not integer for post_thumbnail 1158990

1

Attach Id ( 1158992 ) not integer for post_thumbnail 1158993

1

Attach Id ( 1158996 ) not integer for post_thumbnail 1158997

1

Attach Id ( 1158999 ) not integer for post_thumbnail 1159000

1

Attach Id ( 1159004 ) not integer for post_thumbnail 1159005

1

Attach Id ( 1159031 ) not integer for post_thumbnail 1159032

1

Attach Id ( 1159112 ) not integer for post_thumbnail 1159113

1

Attach Id ( 1159115 ) not integer for post_thumbnail 1159116

1

Attach Id ( 1159118 ) not integer for post_thumbnail 1159119

1

Attach Id ( 1159121 ) not integer for post_thumbnail 1159122

1

Attach Id ( 1159129 ) not integer for post_thumbnail 1159130

1

Attach Id ( 1159189 ) not integer for post_thumbnail 1159190

1

Attach Id ( 1159197 ) not integer for post_thumbnail 1159198

1

Attach Id ( 1159213 ) not integer for post_thumbnail 1159214

1

Attach Id ( 1159218 ) not integer for post_thumbnail 1159219

1

Attach Id ( 1159221 ) not integer for post_thumbnail 1159222

1

Attach Id ( 1159246 ) not integer for post_thumbnail 1159247

1

Attach Id ( 1159251 ) not integer for post_thumbnail 1159252

1

Attach Id ( 1159253 ) not integer for post_thumbnail 1159254

1

Attach Id ( 1159263 ) not integer for post_thumbnail 1159264

1

Attach Id ( 1159331 ) not integer for post_thumbnail 1159332

1

Attach Id ( 1159334 ) not integer for post_thumbnail 1159335

1

Attach Id ( 1159420 ) not integer for post_thumbnail 1159421

1

Attach Id ( 1159423 ) not integer for post_thumbnail 1159424

1

Attach Id ( 1159537 ) not integer for post_thumbnail 1159538

1

Attach Id ( 1159540 ) not integer for post_thumbnail 1159541

1

Attach Id ( 1159555 ) not integer for post_thumbnail 1159556

1

Attach Id ( 1159558 ) not integer for post_thumbnail 1159559

1

Attach Id ( 1159565 ) not integer for post_thumbnail 1159566

1

Attach Id ( 1159568 ) not integer for post_thumbnail 1159569

1

Attach Id ( 1159571 ) not integer for post_thumbnail 1159572

1

Attach Id ( 1159574 ) not integer for post_thumbnail 1159575

1

Attach Id ( 1159577 ) not integer for post_thumbnail 1159578

1

Attach Id ( 1159605 ) not integer for post_thumbnail 1159606

1

Attach Id ( 1159621 ) not integer for post_thumbnail 1159622

1

Attach Id ( 1159665 ) not integer for post_thumbnail 1159666

1

Attach Id ( 1159753 ) not integer for post_thumbnail 1159755

1

Attach Id ( 1159889 ) not integer for post_thumbnail 1159890

1

Attach Id ( 1160368 ) not integer for post_thumbnail 1160369

1

Attach Id ( 1160454 ) not integer for post_thumbnail 1160455

1

Attach Id ( 1160461 ) not integer for post_thumbnail 1160462

1

Attach Id ( 1160464 ) not integer for post_thumbnail 1160465

1

Attach Id ( 1160467 ) not integer for post_thumbnail 1160468

1

Attach Id ( 1160470 ) not integer for post_thumbnail 1160471

1

Attach Id ( 1160473 ) not integer for post_thumbnail 1160474

1

Attach Id ( 1160599 ) not integer for post_thumbnail 1160601

1

Attach Id ( 1171416 ) not integer for post_thumbnail 1160654

1

Attach Id ( 1160726 ) not integer for post_thumbnail 1160727

1

Attach Id ( 1160729 ) not integer for post_thumbnail 1160730

1

Attach Id ( 1160749 ) not integer for post_thumbnail 1160751

1

Attach Id ( 1160754 ) not integer for post_thumbnail 1160755

1

Attach Id ( 1160799 ) not integer for post_thumbnail 1160800

1

Attach Id ( 1160802 ) not integer for post_thumbnail 1160803

1

Attach Id ( 1160805 ) not integer for post_thumbnail 1160806

1

Attach Id ( 1160824 ) not integer for post_thumbnail 1160825

1

Attach Id ( 1172154 ) not integer for post_thumbnail 1160871

1

Attach Id ( 1160873 ) not integer for post_thumbnail 1160874

1

Attach Id ( 1160879 ) not integer for post_thumbnail 1160880

1

Attach Id ( 1160925 ) not integer for post_thumbnail 1160926

1

Attach Id ( 1160952 ) not integer for post_thumbnail 1160953

1

Attach Id ( 1160963 ) not integer for post_thumbnail 1160964

1

Attach Id ( 1160968 ) not integer for post_thumbnail 1160969

1

Attach Id ( 1160971 ) not integer for post_thumbnail 1160972

1

Attach Id ( 1160979 ) not integer for post_thumbnail 1160980

1

Attach Id ( 1161033 ) not integer for post_thumbnail 1161034

1

Attach Id ( 1161040 ) not integer for post_thumbnail 1161041

1

Attach Id ( 1161043 ) not integer for post_thumbnail 1161044

1

Attach Id ( 1161046 ) not integer for post_thumbnail 1161047

1

Attach Id ( 1161049 ) not integer for post_thumbnail 1161050

1

Attach Id ( 1161083 ) not integer for post_thumbnail 1161085

1

Attach Id ( 1161102 ) not integer for post_thumbnail 1161103

1

Attach Id ( 1161105 ) not integer for post_thumbnail 1161106

1

Attach Id ( 1161108 ) not integer for post_thumbnail 1161109

1

Attach Id ( 1161128 ) not integer for post_thumbnail 1161129

1

Attach Id ( 1161131 ) not integer for post_thumbnail 1161132

1

Attach Id ( 1161134 ) not integer for post_thumbnail 1161135

1

Attach Id ( 1161193 ) not integer for post_thumbnail 1161194

1

Attach Id ( 1161196 ) not integer for post_thumbnail 1161197

1

Attach Id ( 1162634 ) not integer for post_thumbnail 1161327

1

Attach Id ( 1161329 ) not integer for post_thumbnail 1161330

1

Attach Id ( 1161348 ) not integer for post_thumbnail 1161349

1

Attach Id ( 1161398 ) not integer for post_thumbnail 1161399

1

Attach Id ( 1161846 ) not integer for post_thumbnail 1161847

1

Attach Id ( 1161849 ) not integer for post_thumbnail 1161850

1

Attach Id ( 1161852 ) not integer for post_thumbnail 1161853

1

Attach Id ( 1161855 ) not integer for post_thumbnail 1161856

1

Attach Id ( 1162073 ) not integer for post_thumbnail 1162074

1

Attach Id ( 1162076 ) not integer for post_thumbnail 1162077

1

Attach Id ( 1162128 ) not integer for post_thumbnail 1162129

1

Attach Id ( 1162131 ) not integer for post_thumbnail 1162132

1

Attach Id ( 1162134 ) not integer for post_thumbnail 1162135

1

Attach Id ( 1162137 ) not integer for post_thumbnail 1162138

1

Attach Id ( 1162140 ) not integer for post_thumbnail 1162141

1

Attach Id ( 1162185 ) not integer for post_thumbnail 1162186

1

Attach Id ( 1162188 ) not integer for post_thumbnail 1162189

1

Attach Id ( 1162191 ) not integer for post_thumbnail 1162192

1

Attach Id ( 1162238 ) not integer for post_thumbnail 1162239

1

Attach Id ( 1162243 ) not integer for post_thumbnail 1162244

1

Attach Id ( 1162298 ) not integer for post_thumbnail 1162299

1

Attach Id ( 1162301 ) not integer for post_thumbnail 1162302

1

Attach Id ( 1162304 ) not integer for post_thumbnail 1162305

1

Attach Id ( 1162308 ) not integer for post_thumbnail 1162309

1

Attach Id ( 1162306 ) not integer for post_thumbnail 1162313

1

Attach Id ( 1162380 ) not integer for post_thumbnail 1162381

1

Attach Id ( 1162383 ) not integer for post_thumbnail 1162384

1

Attach Id ( 1162475 ) not integer for post_thumbnail 1162486

1

Attach Id ( 1162535 ) not integer for post_thumbnail 1162536

1

Attach Id ( 1162540 ) not integer for post_thumbnail 1162541

1

Attach Id ( 1162543 ) not integer for post_thumbnail 1162544

1

Attach Id ( 1162546 ) not integer for post_thumbnail 1162547

1

Attach Id ( 1162560 ) not integer for post_thumbnail 1162575

1

Attach Id ( 1162584 ) not integer for post_thumbnail 1162586

1

Attach Id ( 1162599 ) not integer for post_thumbnail 1162601

1

Attach Id ( 1162619 ) not integer for post_thumbnail 1162620

1

Attach Id ( 1162666 ) not integer for post_thumbnail 1162667

1

Attach Id ( 1162669 ) not integer for post_thumbnail 1162670

1

Attach Id ( 1162672 ) not integer for post_thumbnail 1162673

1

Attach Id ( 1162683 ) not integer for post_thumbnail 1162687

1

Attach Id ( 1162689 ) not integer for post_thumbnail 1162693

1

Attach Id ( 1162699 ) not integer for post_thumbnail 1162701

1

Attach Id ( 1162704 ) not integer for post_thumbnail 1162705

1

Attach Id ( 1162711 ) not integer for post_thumbnail 1162713

1

Attach Id ( 1162716 ) not integer for post_thumbnail 1162717

1

Attach Id ( 1162837 ) not integer for post_thumbnail 1162838

1

Attach Id ( 1162840 ) not integer for post_thumbnail 1162841

1

Attach Id ( 1163376 ) not integer for post_thumbnail 1163378

1

Attach Id ( 1163589 ) not integer for post_thumbnail 1163590

1

Attach Id ( 1163595 ) not integer for post_thumbnail 1163597

1

Attach Id ( 1163722 ) not integer for post_thumbnail 1163723

1

Attach Id ( 1163900 ) not integer for post_thumbnail 1163901

1

Attach Id ( 1164146 ) not integer for post_thumbnail 1054729

1

Attach Id ( 1164170 ) not integer for post_thumbnail 1164171

1

Attach Id ( 1166432 ) not integer for post_thumbnail 1166433

1

Attach Id ( 1166435 ) not integer for post_thumbnail 1166436

1

Attach Id ( 1167212 ) not integer for post_thumbnail 1167213

1

Attach Id ( 1167221 ) not integer for post_thumbnail 1167222

1

Attach Id ( 1167224 ) not integer for post_thumbnail 1167225

1

Attach Id ( 1167227 ) not integer for post_thumbnail 1167229

1

Attach Id ( 1167231 ) not integer for post_thumbnail 1167232

1

Attach Id ( 1167234 ) not integer for post_thumbnail 1167235

1

Attach Id ( 1167237 ) not integer for post_thumbnail 1167238

1

Attach Id ( 1167240 ) not integer for post_thumbnail 1167241

1

Attach Id ( 1167253 ) not integer for post_thumbnail 1167254

1

Attach Id ( 1167258 ) not integer for post_thumbnail 1167259

1

Attach Id ( 1167298 ) not integer for post_thumbnail 1167300

1

Attach Id ( 1167308 ) not integer for post_thumbnail 1167309

1

Attach Id ( 1167311 ) not integer for post_thumbnail 1167312

1

Attach Id ( 1167366 ) not integer for post_thumbnail 1167367

1

Attach Id ( 1167369 ) not integer for post_thumbnail 1167370

1

Attach Id ( 1167372 ) not integer for post_thumbnail 1167373

1

Attach Id ( 1167381 ) not integer for post_thumbnail 1167382

1

Attach Id ( 1167414 ) not integer for post_thumbnail 1167415

1

Attach Id ( 1167420 ) not integer for post_thumbnail 1167421

1

Attach Id ( 1167429 ) not integer for post_thumbnail 1167430

1

Attach Id ( 1167432 ) not integer for post_thumbnail 1167433

1

Attach Id ( 1167437 ) not integer for post_thumbnail 1167438

1

Attach Id ( 1167440 ) not integer for post_thumbnail 1167441

1

Attach Id ( 1167443 ) not integer for post_thumbnail 1167444

1

Attach Id ( 1167466 ) not integer for post_thumbnail 1167467

1

Attach Id ( 1167475 ) not integer for post_thumbnail 1167479

1

Attach Id ( 1167483 ) not integer for post_thumbnail 1167484

1

Attach Id ( 1167492 ) not integer for post_thumbnail 1167493

1

Attach Id ( 1167495 ) not integer for post_thumbnail 1167496

1

Attach Id ( 1167498 ) not integer for post_thumbnail 1167499

1

Attach Id ( 1167992 ) not integer for post_thumbnail 1167502

1

Attach Id ( 1167567 ) not integer for post_thumbnail 1167568

1

Attach Id ( 1167570 ) not integer for post_thumbnail 1167571

1

Attach Id ( 1167618 ) not integer for post_thumbnail 1167619

1

Attach Id ( 1167724 ) not integer for post_thumbnail 1167725

1

Attach Id ( 1167740 ) not integer for post_thumbnail 1167744

1

Attach Id ( 1167746 ) not integer for post_thumbnail 1167750

1

Attach Id ( 1167758 ) not integer for post_thumbnail 1167759

1

Attach Id ( 1167761 ) not integer for post_thumbnail 1167762

1

Attach Id ( 1167764 ) not integer for post_thumbnail 1167765

1

Attach Id ( 1167792 ) not integer for post_thumbnail 1167793

1

Attach Id ( 1167795 ) not integer for post_thumbnail 1167796

1

Attach Id ( 1167798 ) not integer for post_thumbnail 1167799

1

Attach Id ( 1167813 ) not integer for post_thumbnail 1167814

1

Attach Id ( 1167868 ) not integer for post_thumbnail 1167869

1

Attach Id ( 1167871 ) not integer for post_thumbnail 1167872

1

Attach Id ( 1167921 ) not integer for post_thumbnail 1167922

1

Attach Id ( 1167923 ) not integer for post_thumbnail 1167924

1

Attach Id ( 1167964 ) not integer for post_thumbnail 1167965

1

Attach Id ( 1167972 ) not integer for post_thumbnail 1167974

1

Attach Id ( 1167976 ) not integer for post_thumbnail 1167977

1

Attach Id ( 1167981 ) not integer for post_thumbnail 1167983

1

Attach Id ( 1167986 ) not integer for post_thumbnail 1167987

1

Attach Id ( 1167989 ) not integer for post_thumbnail 1167990

1

Attach Id ( 1168167 ) not integer for post_thumbnail 1168168

1

Attach Id ( 1168601 ) not integer for post_thumbnail 1168602

1

Attach Id ( 1168956 ) not integer for post_thumbnail 1168970

1

Attach Id ( 1168980 ) not integer for post_thumbnail 1168987

1

Attach Id ( 1169010 ) not integer for post_thumbnail 1169011

1

Attach Id ( 1169013 ) not integer for post_thumbnail 1169014

1

Attach Id ( 1169016 ) not integer for post_thumbnail 1169017

1

Attach Id ( 1169019 ) not integer for post_thumbnail 1169020

1

Attach Id ( 1169022 ) not integer for post_thumbnail 1169023

1

Attach Id ( 1169025 ) not integer for post_thumbnail 1169026

1

Attach Id ( 1169028 ) not integer for post_thumbnail 1169029

1

Attach Id ( 1169250 ) not integer for post_thumbnail 1169251

1

Attach Id ( 1169253 ) not integer for post_thumbnail 1169254

1

Attach Id ( 1169293 ) not integer for post_thumbnail 1169294

1

Attach Id ( 1169296 ) not integer for post_thumbnail 1169297

1

Attach Id ( 1169299 ) not integer for post_thumbnail 1169300

1

Attach Id ( 1169302 ) not integer for post_thumbnail 1169303

1

Attach Id ( 1169317 ) not integer for post_thumbnail 1142227

1

Attach Id ( 1169320 ) not integer for post_thumbnail 1169321

1

Attach Id ( 1169401 ) not integer for post_thumbnail 1169405

1

Attach Id ( 1169426 ) not integer for post_thumbnail 1169427

1

Attach Id ( 1169435 ) not integer for post_thumbnail 1169436

1

Attach Id ( 1169438 ) not integer for post_thumbnail 1169439

1

Attach Id ( 1169441 ) not integer for post_thumbnail 1169442

1

Attach Id ( 1169478 ) not integer for post_thumbnail 1169479

1

Attach Id ( 1169627 ) not integer for post_thumbnail 1169628

1

Attach Id ( 1169632 ) not integer for post_thumbnail 1169633

1

Attach Id ( 1169659 ) not integer for post_thumbnail 1169660

1

Attach Id ( 1169682 ) not integer for post_thumbnail 1169683

1

Attach Id ( 1169695 ) not integer for post_thumbnail 1169702

1

Attach Id ( 1169708 ) not integer for post_thumbnail 1169713

1

Attach Id ( 1169715 ) not integer for post_thumbnail 1169719

1

Attach Id ( 1169727 ) not integer for post_thumbnail 1169728

1

Attach Id ( 1169731 ) not integer for post_thumbnail 1169732

1

Attach Id ( 1169734 ) not integer for post_thumbnail 1169736

1

Attach Id ( 1169742 ) not integer for post_thumbnail 1169743

1

Attach Id ( 1169746 ) not integer for post_thumbnail 1169747

1

Attach Id ( 1169749 ) not integer for post_thumbnail 1169750

1

Attach Id ( 1169752 ) not integer for post_thumbnail 1169753

1

Attach Id ( 1169755 ) not integer for post_thumbnail 1169756

1

Attach Id ( 1169760 ) not integer for post_thumbnail 1169761

1

Attach Id ( 1169846 ) not integer for post_thumbnail 1169847

1

Attach Id ( 1169902 ) not integer for post_thumbnail 1169903

1

Attach Id ( 1169962 ) not integer for post_thumbnail 1169963

1

Attach Id ( 1169973 ) not integer for post_thumbnail 1169974

1

Attach Id ( 1169976 ) not integer for post_thumbnail 1169977

1

Attach Id ( 1169997 ) not integer for post_thumbnail 1169998

1

Attach Id ( 1170002 ) not integer for post_thumbnail 1170004

1

Attach Id ( 1170012 ) not integer for post_thumbnail 1170018

1

Attach Id ( 1170033 ) not integer for post_thumbnail 1170034

1

Attach Id ( 1170036 ) not integer for post_thumbnail 1170037

1

Attach Id ( 1170039 ) not integer for post_thumbnail 1170040

1

Attach Id ( 1170042 ) not integer for post_thumbnail 1170043

1

Attach Id ( 1170109 ) not integer for post_thumbnail 1170110

1

Attach Id ( 1170112 ) not integer for post_thumbnail 1170113

1

Attach Id ( 1170434 ) not integer for post_thumbnail 1170435

1

Attach Id ( 1170442 ) not integer for post_thumbnail 1170443

1

Attach Id ( 1170685 ) not integer for post_thumbnail 1170686

1

Attach Id ( 1171210 ) not integer for post_thumbnail 1171211

1

Attach Id ( 1171213 ) not integer for post_thumbnail 1171214

1

Attach Id ( 1171216 ) not integer for post_thumbnail 1171217

1

Attach Id ( 1171219 ) not integer for post_thumbnail 1171220

1

Attach Id ( 1171222 ) not integer for post_thumbnail 1171223

1

Attach Id ( 1171225 ) not integer for post_thumbnail 1171226

1

Attach Id ( 1171253 ) not integer for post_thumbnail 1171254

1

Attach Id ( 1171411 ) not integer for post_thumbnail 1171412

1

Attach Id ( 1171430 ) not integer for post_thumbnail 1171431

1

Attach Id ( 1171432 ) not integer for post_thumbnail 1171433

1

Attach Id ( 1171779 ) not integer for post_thumbnail 1171780

1

Attach Id ( 1171830 ) not integer for post_thumbnail 1171835

1

Attach Id ( 1171901 ) not integer for post_thumbnail 1171902

1

Attach Id ( 1171904 ) not integer for post_thumbnail 1171905

1

Attach Id ( 1171907 ) not integer for post_thumbnail 1171908

1

Attach Id ( 1171910 ) not integer for post_thumbnail 1171911

1

Attach Id ( 1171916 ) not integer for post_thumbnail 1171917

1

Attach Id ( 1171956 ) not integer for post_thumbnail 1171957

1

Attach Id ( 1171959 ) not integer for post_thumbnail 1171960

1

Attach Id ( 1171962 ) not integer for post_thumbnail 1171963

1

Attach Id ( 1171965 ) not integer for post_thumbnail 1171966

1

Attach Id ( 1171971 ) not integer for post_thumbnail 1171972

1

Attach Id ( 1171975 ) not integer for post_thumbnail 1171976

1

Attach Id ( 1171979 ) not integer for post_thumbnail 1171980

1

Attach Id ( 1171982 ) not integer for post_thumbnail 1171983

1

Attach Id ( 1172124 ) not integer for post_thumbnail 1172125

1

Attach Id ( 1172141 ) not integer for post_thumbnail 1172142

1

Attach Id ( 1172163 ) not integer for post_thumbnail 1172164

1

Attach Id ( 1172166 ) not integer for post_thumbnail 1172167

1

Attach Id ( 1172169 ) not integer for post_thumbnail 1172170

1

Attach Id ( 1172172 ) not integer for post_thumbnail 1172173

1

Attach Id ( 1172202 ) not integer for post_thumbnail 1172203

1

Attach Id ( 1172205 ) not integer for post_thumbnail 1172206

1

Attach Id ( 1172210 ) not integer for post_thumbnail 1172211

1

Attach Id ( 1172263 ) not integer for post_thumbnail 1172267

1

Attach Id ( 1172385 ) not integer for post_thumbnail 1172389

1

Attach Id ( 1172446 ) not integer for post_thumbnail 1172447

1

Attach Id ( 1172449 ) not integer for post_thumbnail 1172450

1

Attach Id ( 1172452 ) not integer for post_thumbnail 1172453

1

Attach Id ( 1172470 ) not integer for post_thumbnail 1172471

1

Attach Id ( 1172529 ) not integer for post_thumbnail 1172530

1

Attach Id ( 1172531 ) not integer for post_thumbnail 1172532

1

Attach Id ( 1172539 ) not integer for post_thumbnail 1172543

1

Attach Id ( 1172624 ) not integer for post_thumbnail 1172625

1

Attach Id ( 1172631 ) not integer for post_thumbnail 1172632

1

Attach Id ( 1172634 ) not integer for post_thumbnail 1172635

1

Attach Id ( 1172920 ) not integer for post_thumbnail 1172921

1

Attach Id ( 1173677 ) not integer for post_thumbnail 1173687

1

Attach Id ( 1173715 ) not integer for post_thumbnail 1173716

1

Attach Id ( 1173770 ) not integer for post_thumbnail 1173771

1

Attach Id ( 1173773 ) not integer for post_thumbnail 1173774

1

Attach Id ( 1173776 ) not integer for post_thumbnail 1173777

1

Attach Id ( 1173779 ) not integer for post_thumbnail 1173780

1

Attach Id ( 1173782 ) not integer for post_thumbnail 1173783

1

Attach Id ( 1173785 ) not integer for post_thumbnail 1173786

1

Attach Id ( 1173904 ) not integer for post_thumbnail 1173905

1

Attach Id ( 1173907 ) not integer for post_thumbnail 1173909

1

Attach Id ( 1173937 ) not integer for post_thumbnail 1173938

1

Attach Id ( 1173997 ) not integer for post_thumbnail 1173998

1

Attach Id ( 1174000 ) not integer for post_thumbnail 1174001

1

Attach Id ( 1174007 ) not integer for post_thumbnail 1174008

1

Attach Id ( 1174029 ) not integer for post_thumbnail 1174030

1

Attach Id ( 1174044 ) not integer for post_thumbnail 1174045

1

Attach Id ( 1174057 ) not integer for post_thumbnail 1174060

1

Attach Id ( 1174068 ) not integer for post_thumbnail 1174069

1

Attach Id ( 1174075 ) not integer for post_thumbnail 1174076

1

Attach Id ( 1174079 ) not integer for post_thumbnail 1174081

1

Attach Id ( 1174083 ) not integer for post_thumbnail 1174084

1

Attach Id ( 1174110 ) not integer for post_thumbnail 1174111

1

Attach Id ( 1174125 ) not integer for post_thumbnail 1174126

1

Attach Id ( 1174173 ) not integer for post_thumbnail 1174174

1

Attach Id ( 1187027 ) not integer for post_thumbnail 1174187

1

Attach Id ( 1174188 ) not integer for post_thumbnail 1174189

1

Attach Id ( 1174383 ) not integer for post_thumbnail 1174387

1

Attach Id ( 1174442 ) not integer for post_thumbnail 1174443

1

Attach Id ( 1174501 ) not integer for post_thumbnail 1174503

1

Attach Id ( 1174506 ) not integer for post_thumbnail 1174510

1

Attach Id ( 1174513 ) not integer for post_thumbnail 1174514

1

Attach Id ( 1174575 ) not integer for post_thumbnail 1174576

1

Attach Id ( 1174651 ) not integer for post_thumbnail 1174652

1

Attach Id ( 1174654 ) not integer for post_thumbnail 1174655

1

Attach Id ( 1174657 ) not integer for post_thumbnail 1174658

1

Attach Id ( 1174660 ) not integer for post_thumbnail 1174661

1

Attach Id ( 1174663 ) not integer for post_thumbnail 1174664

1

Attach Id ( 1174666 ) not integer for post_thumbnail 1174667

1

Attach Id ( 1174669 ) not integer for post_thumbnail 1174670

1

Attach Id ( 1174672 ) not integer for post_thumbnail 1174673

1

Attach Id ( 1174695 ) not integer for post_thumbnail 1174696

1

Attach Id ( 1174700 ) not integer for post_thumbnail 1174701

1

Attach Id ( 1174703 ) not integer for post_thumbnail 1174704

1

Attach Id ( 1174707 ) not integer for post_thumbnail 1174708

1

Attach Id ( 1174710 ) not integer for post_thumbnail 1174711

1

Attach Id ( 1174712 ) not integer for post_thumbnail 1174713

1

Attach Id ( 1174885 ) not integer for post_thumbnail 1174886

1

Attach Id ( 1174938 ) not integer for post_thumbnail 1174939

1

Attach Id ( 1174983 ) not integer for post_thumbnail 1174984

1

Attach Id ( 1175486 ) not integer for post_thumbnail 1175487

1

Attach Id ( 1176166 ) not integer for post_thumbnail 1176167

1

Attach Id ( 1176263 ) not integer for post_thumbnail 1176267

1

Attach Id ( 1176302 ) not integer for post_thumbnail 1176304

1

Attach Id ( 1176415 ) not integer for post_thumbnail 1176419

1

Attach Id ( 1176460 ) not integer for post_thumbnail 1176461

1

Attach Id ( 1176463 ) not integer for post_thumbnail 1176464

1

Attach Id ( 1176466 ) not integer for post_thumbnail 1176467

1

Attach Id ( 1176469 ) not integer for post_thumbnail 1176470

1

Attach Id ( 1176475 ) not integer for post_thumbnail 1176476

1

Attach Id ( 1176478 ) not integer for post_thumbnail 1176479

1

Attach Id ( 1176481 ) not integer for post_thumbnail 1176482

1

Attach Id ( 1176568 ) not integer for post_thumbnail 1176572

1

Attach Id ( 1176582 ) not integer for post_thumbnail 1176583

1

Attach Id ( 1176683 ) not integer for post_thumbnail 1176684

1

Attach Id ( 1176688 ) not integer for post_thumbnail 1176689

1

Attach Id ( 1176754 ) not integer for post_thumbnail 1176755

1

Attach Id ( 1176753 ) not integer for post_thumbnail 1176759

1

Attach Id ( 1176762 ) not integer for post_thumbnail 1176763

1

Attach Id ( 1176771 ) not integer for post_thumbnail 1176773

1

Attach Id ( 1176917 ) not integer for post_thumbnail 1176918

1

Attach Id ( 1176954 ) not integer for post_thumbnail 1176955

1

Attach Id ( 1176957 ) not integer for post_thumbnail 1176958

1

Attach Id ( 1176960 ) not integer for post_thumbnail 1176961

1

Attach Id ( 1177043 ) not integer for post_thumbnail 1177044

1

Attach Id ( 1177048 ) not integer for post_thumbnail 1177049

1

Attach Id ( 1177097 ) not integer for post_thumbnail 1177098

1

Attach Id ( 1177100 ) not integer for post_thumbnail 1177101

1

Attach Id ( 1177103 ) not integer for post_thumbnail 1177104

1

Attach Id ( 1177113 ) not integer for post_thumbnail 1177114

1

Attach Id ( 1177116 ) not integer for post_thumbnail 1177117

1

Attach Id ( 1177119 ) not integer for post_thumbnail 1177120

1

Attach Id ( 1177122 ) not integer for post_thumbnail 1177123

1

Attach Id ( 1177125 ) not integer for post_thumbnail 1177126

1

Attach Id ( 1177129 ) not integer for post_thumbnail 1177130

1

Attach Id ( 1177148 ) not integer for post_thumbnail 1177149

1

Attach Id ( 1177254 ) not integer for post_thumbnail 1177255

1

Attach Id ( 1177257 ) not integer for post_thumbnail 1177258

1

Attach Id ( 1177262 ) not integer for post_thumbnail 1177263

1

Attach Id ( 1177265 ) not integer for post_thumbnail 1177266

1

Attach Id ( 1177268 ) not integer for post_thumbnail 1177269

1

Attach Id ( 1177271 ) not integer for post_thumbnail 1177273

1

Attach Id ( 1177314 ) not integer for post_thumbnail 1177315

1

Attach Id ( 1177337 ) not integer for post_thumbnail 1177338

1

Attach Id ( 1177340 ) not integer for post_thumbnail 1177341

1

Attach Id ( 1177343 ) not integer for post_thumbnail 1177344

1

Attach Id ( 1177531 ) not integer for post_thumbnail 1177535

1

Attach Id ( 1177546 ) not integer for post_thumbnail 1177547

1

Attach Id ( 1177573 ) not integer for post_thumbnail 1177576

1

Attach Id ( 1177588 ) not integer for post_thumbnail 1177590

1

Attach Id ( 1179050 ) not integer for post_thumbnail 1179051

1

Attach Id ( 1179118 ) not integer for post_thumbnail 1179120

1

Attach Id ( 1179230 ) not integer for post_thumbnail 1179231

1

Attach Id ( 1179233 ) not integer for post_thumbnail 1179235

1

Attach Id ( 1179727 ) not integer for post_thumbnail 1179728

1

Attach Id ( 1181645 ) not integer for post_thumbnail 1181646

1

Attach Id ( 1181707 ) not integer for post_thumbnail 1181708

1

Attach Id ( 1181789 ) not integer for post_thumbnail 1181790

1

Attach Id ( 1181881 ) not integer for post_thumbnail 1181882

1

Attach Id ( 1182966 ) not integer for post_thumbnail 1182967

1

Attach Id ( 1183881 ) not integer for post_thumbnail 1183882

1

Attach Id ( 1183884 ) not integer for post_thumbnail 1183885

1

Attach Id ( 1183887 ) not integer for post_thumbnail 1183888

1

Attach Id ( 1183890 ) not integer for post_thumbnail 1183892

1

Attach Id ( 1183894 ) not integer for post_thumbnail 1183895

1

Attach Id ( 1183897 ) not integer for post_thumbnail 1183898

1

Attach Id ( 1183900 ) not integer for post_thumbnail 1183901

1

Attach Id ( 1184036 ) not integer for post_thumbnail 1184037

1

Attach Id ( 1184125 ) not integer for post_thumbnail 1184126

1

Attach Id ( 1184128 ) not integer for post_thumbnail 1184129

1

Attach Id ( 1184176 ) not integer for post_thumbnail 1184177

1

Attach Id ( 1184179 ) not integer for post_thumbnail 1184180

1

Attach Id ( 1184182 ) not integer for post_thumbnail 1184183

1

Attach Id ( 1184185 ) not integer for post_thumbnail 1184186

1

Attach Id ( 1184256 ) not integer for post_thumbnail 1184257

1

Attach Id ( 1184267 ) not integer for post_thumbnail 1184268

1

Attach Id ( 1184366 ) not integer for post_thumbnail 1184367

1

Attach Id ( 1184483 ) not integer for post_thumbnail 1184487

1

Attach Id ( 1184502 ) not integer for post_thumbnail 1184503

1

Attach Id ( 1184505 ) not integer for post_thumbnail 1184506

1

Attach Id ( 1184508 ) not integer for post_thumbnail 1184509

1

Attach Id ( 1184511 ) not integer for post_thumbnail 1184512

1

Attach Id ( 1186614 ) not integer for post_thumbnail 1184515

1

Attach Id ( 1184538 ) not integer for post_thumbnail 1184539

1

Attach Id ( 1184541 ) not integer for post_thumbnail 1184542

1

Attach Id ( 1184583 ) not integer for post_thumbnail 1184584

1

Attach Id ( 1184586 ) not integer for post_thumbnail 1184587

1

Attach Id ( 1184672 ) not integer for post_thumbnail 1184674

1

Attach Id ( 1184859 ) not integer for post_thumbnail 1184863

1

Attach Id ( 1184865 ) not integer for post_thumbnail 1184869

1

Attach Id ( 1184879 ) not integer for post_thumbnail 1184880

1

Attach Id ( 1184893 ) not integer for post_thumbnail 1184894

1

Attach Id ( 1184896 ) not integer for post_thumbnail 1184897

1

Attach Id ( 1184947 ) not integer for post_thumbnail 1184948

1

Attach Id ( 1184950 ) not integer for post_thumbnail 1184951

1

Attach Id ( 1184953 ) not integer for post_thumbnail 1184954

1

Attach Id ( 1184976 ) not integer for post_thumbnail 1184977

1

Attach Id ( 1185086 ) not integer for post_thumbnail 1185087

1

Attach Id ( 1185093 ) not integer for post_thumbnail 1185095

1

Attach Id ( 1185293 ) not integer for post_thumbnail 1185294

1

Attach Id ( 1185296 ) not integer for post_thumbnail 1185297

1

Attach Id ( 1185448 ) not integer for post_thumbnail 1185449

1

Attach Id ( 1185482 ) not integer for post_thumbnail 1185483

1

Attach Id ( 1185485 ) not integer for post_thumbnail 1185486

1

Attach Id ( 1186164 ) not integer for post_thumbnail 1186165

1

Attach Id ( 1186167 ) not integer for post_thumbnail 1186168

1

Attach Id ( 1186170 ) not integer for post_thumbnail 1186171

1

Attach Id ( 1186173 ) not integer for post_thumbnail 1186174

1

Attach Id ( 1186176 ) not integer for post_thumbnail 1186177

1

Attach Id ( 1186179 ) not integer for post_thumbnail 1186180

1

Attach Id ( 1186182 ) not integer for post_thumbnail 1186183

1

Attach Id ( 1186223 ) not integer for post_thumbnail 1186227

1

Attach Id ( 1186247 ) not integer for post_thumbnail 1186248

1

Attach Id ( 1186250 ) not integer for post_thumbnail 1186252

1

Attach Id ( 1186254 ) not integer for post_thumbnail 1186255

1

Attach Id ( 1186358 ) not integer for post_thumbnail 1186359

1

Attach Id ( 1186361 ) not integer for post_thumbnail 1186362

1

Attach Id ( 1186412 ) not integer for post_thumbnail 1186413

1

Attach Id ( 1186415 ) not integer for post_thumbnail 1186416

1

Attach Id ( 1186418 ) not integer for post_thumbnail 1186419

1

Attach Id ( 1186470 ) not integer for post_thumbnail 1186471

1

Attach Id ( 1186473 ) not integer for post_thumbnail 1186474

1

Attach Id ( 1186482 ) not integer for post_thumbnail 1186483

1

Attach Id ( 1186502 ) not integer for post_thumbnail 1186503

1

Attach Id ( 1186505 ) not integer for post_thumbnail 1186506

1

Attach Id ( 1186603 ) not integer for post_thumbnail 1186605

1

Attach Id ( 1186608 ) not integer for post_thumbnail 1186609

1

Attach Id ( 1186611 ) not integer for post_thumbnail 1186612

1

Attach Id ( 1186617 ) not integer for post_thumbnail 1186618

1

Attach Id ( 1186679 ) not integer for post_thumbnail 1186680

1

Attach Id ( 1186688 ) not integer for post_thumbnail 1186689

1

Attach Id ( 1186691 ) not integer for post_thumbnail 1186692

1

Attach Id ( 1186697 ) not integer for post_thumbnail 1186698

1

Attach Id ( 1186700 ) not integer for post_thumbnail 1186701

1

Attach Id ( 1186703 ) not integer for post_thumbnail 1186704

1

Attach Id ( 1186726 ) not integer for post_thumbnail 1186730

1

Attach Id ( 1186732 ) not integer for post_thumbnail 1186733

1

Attach Id ( 1186743 ) not integer for post_thumbnail 1186744

1

Attach Id ( 1186746 ) not integer for post_thumbnail 1186747

1

Attach Id ( 1186749 ) not integer for post_thumbnail 1186750

1

Attach Id ( 1186752 ) not integer for post_thumbnail 1186753

1

Attach Id ( 1186792 ) not integer for post_thumbnail 1186793

1

Attach Id ( 1186890 ) not integer for post_thumbnail 1186892

1

Attach Id ( 1186928 ) not integer for post_thumbnail 1186929

1

Attach Id ( 1186931 ) not integer for post_thumbnail 1186932

1

Attach Id ( 1186934 ) not integer for post_thumbnail 1186935

1

Attach Id ( 1187024 ) not integer for post_thumbnail 1187025

1

Attach Id ( 1187100 ) not integer for post_thumbnail 1187101

1

Attach Id ( 1187105 ) not integer for post_thumbnail 1187106

1

Attach Id ( 1187153 ) not integer for post_thumbnail 1187154

1

Attach Id ( 1187156 ) not integer for post_thumbnail 1187157

1

Attach Id ( 1187159 ) not integer for post_thumbnail 1187160

1

Attach Id ( 1187181 ) not integer for post_thumbnail 1187182

1

Attach Id ( 1187188 ) not integer for post_thumbnail 1187189

1

Attach Id ( 1187194 ) not integer for post_thumbnail 1187195

1

Attach Id ( 1187197 ) not integer for post_thumbnail 1187198

1

Attach Id ( 1187324 ) not integer for post_thumbnail 1187325

1

Attach Id ( 1187327 ) not integer for post_thumbnail 1187328

1

Attach Id ( 1187367 ) not integer for post_thumbnail 1187370

1

Attach Id ( 1187415 ) not integer for post_thumbnail 1187416

1

Attach Id ( 1187569 ) not integer for post_thumbnail 1187570

1

Attach Id ( 1188286 ) not integer for post_thumbnail 1188293

1

Attach Id ( 1188398 ) not integer for post_thumbnail 1188400

1

Attach Id ( 1188409 ) not integer for post_thumbnail 1188410

1

Attach Id ( 1188422 ) not integer for post_thumbnail 1188423

1

Attach Id ( 1188425 ) not integer for post_thumbnail 1188426

1

Attach Id ( 1188428 ) not integer for post_thumbnail 1188429

1

Attach Id ( 1188431 ) not integer for post_thumbnail 1188432

1

Attach Id ( 1188557 ) not integer for post_thumbnail 1188558

1

Attach Id ( 1188560 ) not integer for post_thumbnail 1188564

1

Attach Id ( 1188602 ) not integer for post_thumbnail 1188603

1

Attach Id ( 1188670 ) not integer for post_thumbnail 1188671

1

Attach Id ( 1188673 ) not integer for post_thumbnail 1188674

1

Attach Id ( 1188676 ) not integer for post_thumbnail 1188677

1

Attach Id ( 1188679 ) not integer for post_thumbnail 1062534

1

Attach Id ( 1188682 ) not integer for post_thumbnail 1188683

1

Attach Id ( 1188685 ) not integer for post_thumbnail 1188686

1

Attach Id ( 1188688 ) not integer for post_thumbnail 1188689

1

Attach Id ( 1188691 ) not integer for post_thumbnail 1188692

1

Attach Id ( 1188694 ) not integer for post_thumbnail 1188695

1

Attach Id ( 1188697 ) not integer for post_thumbnail 1188698

1

Attach Id ( 1188700 ) not integer for post_thumbnail 1188701

1

Attach Id ( 1188744 ) not integer for post_thumbnail 1188745

1

Attach Id ( 1188842 ) not integer for post_thumbnail 1188844

1

Attach Id ( 1188847 ) not integer for post_thumbnail 1188848

1

Attach Id ( 1188851 ) not integer for post_thumbnail 1188853

1

Attach Id ( 1188946 ) not integer for post_thumbnail 1188947

1

Attach Id ( 1188949 ) not integer for post_thumbnail 1188950

1

Attach Id ( 1188961 ) not integer for post_thumbnail 1188962

1

Attach Id ( 1188966 ) not integer for post_thumbnail 1188967

1

Attach Id ( 1188969 ) not integer for post_thumbnail 1188970

1

Attach Id ( 1188972 ) not integer for post_thumbnail 1188973

1

Attach Id ( 1188975 ) not integer for post_thumbnail 1188976

1

Attach Id ( 1188978 ) not integer for post_thumbnail 1188979

1

Attach Id ( 1188981 ) not integer for post_thumbnail 1188982

1

Attach Id ( 1188986 ) not integer for post_thumbnail 1188990

1

Attach Id ( 1189024 ) not integer for post_thumbnail 1189025

1

Attach Id ( 1189027 ) not integer for post_thumbnail 1189028

1

Attach Id ( 1189030 ) not integer for post_thumbnail 1189031

1

Attach Id ( 1189033 ) not integer for post_thumbnail 1189034

1

Attach Id ( 1189036 ) not integer for post_thumbnail 1189037

1

Attach Id ( 1189104 ) not integer for post_thumbnail 1189105

1

Attach Id ( 1189107 ) not integer for post_thumbnail 1189108

1

Attach Id ( 1189110 ) not integer for post_thumbnail 1189111

1

Attach Id ( 1189113 ) not integer for post_thumbnail 1189114

1

Attach Id ( 1189116 ) not integer for post_thumbnail 1189117

1

Attach Id ( 1189134 ) not integer for post_thumbnail 1189135

1

Attach Id ( 1189202 ) not integer for post_thumbnail 1189203

1

Attach Id ( 1189205 ) not integer for post_thumbnail 1189206

1

Attach Id ( 1189268 ) not integer for post_thumbnail 1189269

1

Attach Id ( 1189282 ) not integer for post_thumbnail 1189286

1

Attach Id ( 1189314 ) not integer for post_thumbnail 1189315

1

Attach Id ( 1189327 ) not integer for post_thumbnail 1189328

1

Attach Id ( 1189332 ) not integer for post_thumbnail 1189333

1

Attach Id ( 1189338 ) not integer for post_thumbnail 1189340

1

Attach Id ( 1189418 ) not integer for post_thumbnail 1189419

1

Attach Id ( 1189521 ) not integer for post_thumbnail 1189522

1

Attach Id ( 1189524 ) not integer for post_thumbnail 1189525

1

Attach Id ( 1189652 ) not integer for post_thumbnail 1189653

1

Attach Id ( 1189739 ) not integer for post_thumbnail 1189740

1

Attach Id ( 1190104 ) not integer for post_thumbnail 1190107

1

Attach Id ( 1190134 ) not integer for post_thumbnail 1190137

1

Attach Id ( 1190139 ) not integer for post_thumbnail 1190140

1

Attach Id ( 1190167 ) not integer for post_thumbnail 1190168

1

Attach Id ( 1190170 ) not integer for post_thumbnail 1190171

1

Attach Id ( 1190173 ) not integer for post_thumbnail 1190174

1

Attach Id ( 1190176 ) not integer for post_thumbnail 1190177

1

Attach Id ( 1190179 ) not integer for post_thumbnail 1190180

1

Attach Id ( 1190182 ) not integer for post_thumbnail 1190183

1

Attach Id ( 1190185 ) not integer for post_thumbnail 1190186

1

Attach Id ( 1190514 ) not integer for post_thumbnail 1190515

1

Attach Id ( 1190535 ) not integer for post_thumbnail 1190536

1

Attach Id ( 1190538 ) not integer for post_thumbnail 1190539

1

Attach Id ( 1190541 ) not integer for post_thumbnail 1190542

1

Attach Id ( 1190610 ) not integer for post_thumbnail 1190611

1

Attach Id ( 1190613 ) not integer for post_thumbnail 1190615

1

Attach Id ( 1190617 ) not integer for post_thumbnail 1190618

1

Attach Id ( 1190645 ) not integer for post_thumbnail 1190646

1

Attach Id ( 1190648 ) not integer for post_thumbnail 1190649

1

Attach Id ( 1190659 ) not integer for post_thumbnail 1190663

1

Attach Id ( 1190713 ) not integer for post_thumbnail 1190714

1

Attach Id ( 1190716 ) not integer for post_thumbnail 1190717

1

Attach Id ( 1190719 ) not integer for post_thumbnail 1190720

1

Attach Id ( 1190746 ) not integer for post_thumbnail 1190747

1

Attach Id ( 1190749 ) not integer for post_thumbnail 1190750

1

Attach Id ( 1190803 ) not integer for post_thumbnail 1190804

1

Attach Id ( 1190806 ) not integer for post_thumbnail 1190807

1

Attach Id ( 1190809 ) not integer for post_thumbnail 1190810

1

Attach Id ( 1190812 ) not integer for post_thumbnail 1190814

1

Attach Id ( 1190822 ) not integer for post_thumbnail 1190823

1

Attach Id ( 1190825 ) not integer for post_thumbnail 1190826

1

Attach Id ( 1190828 ) not integer for post_thumbnail 1190829

1

Attach Id ( 1190840 ) not integer for post_thumbnail 1190845

1

Attach Id ( 1190852 ) not integer for post_thumbnail 1190857

1

Attach Id ( 1190931 ) not integer for post_thumbnail 1190932

1

Attach Id ( 1190936 ) not integer for post_thumbnail 1190937

1

Attach Id ( 1190939 ) not integer for post_thumbnail 1190940

1

Attach Id ( 1190985 ) not integer for post_thumbnail 1190986

1

Attach Id ( 1190988 ) not integer for post_thumbnail 1190989

1

Attach Id ( 1190990 ) not integer for post_thumbnail 1190994

1

Attach Id ( 1190997 ) not integer for post_thumbnail 1190999

1

Attach Id ( 1191002 ) not integer for post_thumbnail 1191003

1

Attach Id ( 1191005 ) not integer for post_thumbnail 1191006

1

Attach Id ( 1191048 ) not integer for post_thumbnail 1191049

1

Attach Id ( 1191051 ) not integer for post_thumbnail 1191052

1

Attach Id ( 1191065 ) not integer for post_thumbnail 1191066

1

Attach Id ( 1191068 ) not integer for post_thumbnail 1191069

1

Attach Id ( 1191071 ) not integer for post_thumbnail 1191072

1

Attach Id ( 1191074 ) not integer for post_thumbnail 1191075

1

Attach Id ( 1191175 ) not integer for post_thumbnail 1191176

1

Attach Id ( 1191178 ) not integer for post_thumbnail 1191179

1

Attach Id ( 1191181 ) not integer for post_thumbnail 1191182

1

Attach Id ( 1191204 ) not integer for post_thumbnail 1191205

1

Attach Id ( 1191207 ) not integer for post_thumbnail 1191208

1

Attach Id ( 1191214 ) not integer for post_thumbnail 1191216

1

Attach Id ( 1191242 ) not integer for post_thumbnail 1191243

1

Attach Id ( 1191329 ) not integer for post_thumbnail 1191330

1

Attach Id ( 1191332 ) not integer for post_thumbnail 1191333

1

Attach Id ( 1191335 ) not integer for post_thumbnail 1191336

1

Attach Id ( 1191338 ) not integer for post_thumbnail 1191339

1

Attach Id ( 1191409 ) not integer for post_thumbnail 1191410

1

Attach Id ( 1191412 ) not integer for post_thumbnail 1191413

1

Attach Id ( 1191946 ) not integer for post_thumbnail 1191947

1

Attach Id ( 1192032 ) not integer for post_thumbnail 1192033

1

Attach Id ( 1192035 ) not integer for post_thumbnail 1192036

1

Attach Id ( 1192038 ) not integer for post_thumbnail 1192039

1

Attach Id ( 1192041 ) not integer for post_thumbnail 1192042

1

Attach Id ( 1192095 ) not integer for post_thumbnail 1192096

1

Attach Id ( 1192203 ) not integer for post_thumbnail 1192205

1

Attach Id ( 1192350 ) not integer for post_thumbnail 1192351

1

Attach Id ( 1192359 ) not integer for post_thumbnail 1192362

1

Attach Id ( 1192419 ) not integer for post_thumbnail 1192423

1

Attach Id ( 1192425 ) not integer for post_thumbnail 1192426

1

Attach Id ( 1192467 ) not integer for post_thumbnail 1192468

1

Attach Id ( 1192470 ) not integer for post_thumbnail 1192471

1

Attach Id ( 1192473 ) not integer for post_thumbnail 1192474

1

Attach Id ( 1192476 ) not integer for post_thumbnail 1192477

1

Attach Id ( 1192509 ) not integer for post_thumbnail 1192513

1

Attach Id ( 1192519 ) not integer for post_thumbnail 1192522

1

Attach Id ( 1192553 ) not integer for post_thumbnail 1192554

1

Attach Id ( 1192556 ) not integer for post_thumbnail 1192557

1

Attach Id ( 1192563 ) not integer for post_thumbnail 1192567

1

Attach Id ( 1192571 ) not integer for post_thumbnail 1192572

1

Attach Id ( 1192643 ) not integer for post_thumbnail 1192645

1

Attach Id ( 1192648 ) not integer for post_thumbnail 1192649

1

Attach Id ( 1192651 ) not integer for post_thumbnail 1192652

1

Attach Id ( 1192654 ) not integer for post_thumbnail 1192655

1

Attach Id ( 1192699 ) not integer for post_thumbnail 1192700

1

Attach Id ( 1192702 ) not integer for post_thumbnail 1192703

1

Attach Id ( 1192764 ) not integer for post_thumbnail 1192765

1

Attach Id ( 1192767 ) not integer for post_thumbnail 1192768

1

Attach Id ( 1192786 ) not integer for post_thumbnail 1192787

1

Attach Id ( 1192789 ) not integer for post_thumbnail 1192790

1

Attach Id ( 1192802 ) not integer for post_thumbnail 1192803

1

Attach Id ( 1192813 ) not integer for post_thumbnail 1192814

1

Attach Id ( 1192817 ) not integer for post_thumbnail 1192818

1

Attach Id ( 1192824 ) not integer for post_thumbnail 1192825

1

Attach Id ( 1192918 ) not integer for post_thumbnail 1192920

1

Attach Id ( 1192922 ) not integer for post_thumbnail 1192924

1

Attach Id ( 1192984 ) not integer for post_thumbnail 1192988

1

Attach Id ( 1193098 ) not integer for post_thumbnail 1193099

1

Attach Id ( 1193101 ) not integer for post_thumbnail 1193102

1

Attach Id ( 1193104 ) not integer for post_thumbnail 1193106

1

Attach Id ( 1193128 ) not integer for post_thumbnail 1193129

1

Attach Id ( 1194111 ) not integer for post_thumbnail 1194113

1

Attach Id ( 1194178 ) not integer for post_thumbnail 1194182

1

Attach Id ( 1194261 ) not integer for post_thumbnail 1194263

1

Attach Id ( 1194420 ) not integer for post_thumbnail 1194421

1

Attach Id ( 1194542 ) not integer for post_thumbnail 1194544

1

Attach Id ( 1194577 ) not integer for post_thumbnail 1194578

1

Attach Id ( 1194584 ) not integer for post_thumbnail 1194585

1

Attach Id ( 1194636 ) not integer for post_thumbnail 1194638

1

Attach Id ( 1195157 ) not integer for post_thumbnail 1195158

1

Attach Id ( 1195845 ) not integer for post_thumbnail 1195846

1

Attach Id ( 1195942 ) not integer for post_thumbnail 1195943

1

Attach Id ( 1195945 ) not integer for post_thumbnail 1195946

1

Attach Id ( 1197005 ) not integer for post_thumbnail 1197030

1

Attach Id ( 1197262 ) not integer for post_thumbnail 1197263

1

Attach Id ( 1197265 ) not integer for post_thumbnail 1197266

1

Attach Id ( 1197268 ) not integer for post_thumbnail 1197269

1

Attach Id ( 1197271 ) not integer for post_thumbnail 1197272

1

Attach Id ( 1197274 ) not integer for post_thumbnail 1197275

1

Attach Id ( 1197277 ) not integer for post_thumbnail 1197278

1

Attach Id ( 1197302 ) not integer for post_thumbnail 1197303

1

Attach Id ( 1197458 ) not integer for post_thumbnail 1197459

1

Attach Id ( 1197528 ) not integer for post_thumbnail 1197529

1

Attach Id ( 1197531 ) not integer for post_thumbnail 1197533

1

Attach Id ( 1197535 ) not integer for post_thumbnail 1197536

1

Attach Id ( 1197617 ) not integer for post_thumbnail 1197619

1

Attach Id ( 1197756 ) not integer for post_thumbnail 1197757

1

Attach Id ( 1197770 ) not integer for post_thumbnail 1197771

1

Attach Id ( 1197775 ) not integer for post_thumbnail 1197776

1

Attach Id ( 1197778 ) not integer for post_thumbnail 1197779

1

Attach Id ( 1197781 ) not integer for post_thumbnail 1197782

1

Attach Id ( 1197806 ) not integer for post_thumbnail 1197807

1

Attach Id ( 1197811 ) not integer for post_thumbnail 1197812

1

Attach Id ( 1197843 ) not integer for post_thumbnail 1197845

1

Attach Id ( 1197848 ) not integer for post_thumbnail 1197849

1

Attach Id ( 1197851 ) not integer for post_thumbnail 1197852

1

Attach Id ( 1197854 ) not integer for post_thumbnail 1197855

1

Attach Id ( 1197857 ) not integer for post_thumbnail 1197858

1

Attach Id ( 1197969 ) not integer for post_thumbnail 1197970

1

Attach Id ( 1197971 ) not integer for post_thumbnail 1197978

1

Attach Id ( 1198003 ) not integer for post_thumbnail 1198004

1

Attach Id ( 1198090 ) not integer for post_thumbnail 1198094

1

Attach Id ( 1198096 ) not integer for post_thumbnail 1198100

1

Attach Id ( 1198110 ) not integer for post_thumbnail 1198111

1

Attach Id ( 1198113 ) not integer for post_thumbnail 1198114

1

Attach Id ( 1198116 ) not integer for post_thumbnail 1198117

1

Attach Id ( 1198119 ) not integer for post_thumbnail 1198120

1

Attach Id ( 1198122 ) not integer for post_thumbnail 1198123

1

Attach Id ( 1198204 ) not integer for post_thumbnail 1198205

1

Attach Id ( 1198207 ) not integer for post_thumbnail 1198208

1

Attach Id ( 1198256 ) not integer for post_thumbnail 1198257

1

Attach Id ( 1198259 ) not integer for post_thumbnail 1198260

1

Attach Id ( 1198358 ) not integer for post_thumbnail 1198359

1

Attach Id ( 1198360 ) not integer for post_thumbnail 1198361

1

Attach Id ( 1198431 ) not integer for post_thumbnail 1198432

1

Attach Id ( 1198446 ) not integer for post_thumbnail 1198447

1

Attach Id ( 1198585 ) not integer for post_thumbnail 1198586

1

Attach Id ( 1199686 ) not integer for post_thumbnail 1199704

1

Attach Id ( 1199728 ) not integer for post_thumbnail 1199729

1

Attach Id ( 1199810 ) not integer for post_thumbnail 1199811

1

Attach Id ( 1199813 ) not integer for post_thumbnail 1199814

1

Attach Id ( 1199816 ) not integer for post_thumbnail 1199817

1

Attach Id ( 1199819 ) not integer for post_thumbnail 1199820

1

Attach Id ( 1199822 ) not integer for post_thumbnail 1199823

1

Attach Id ( 1199861 ) not integer for post_thumbnail 1199864

1

Attach Id ( 1199895 ) not integer for post_thumbnail 1199896

1

Attach Id ( 1200001 ) not integer for post_thumbnail 1200002

1

Attach Id ( 1200022 ) not integer for post_thumbnail 1200026

1

Attach Id ( 1201169 ) not integer for post_thumbnail 1200107

1

Attach Id ( 1200131 ) not integer for post_thumbnail 1200132

1

Attach Id ( 1200219 ) not integer for post_thumbnail 1200220

1

Attach Id ( 1200222 ) not integer for post_thumbnail 1200223

1

Attach Id ( 1200225 ) not integer for post_thumbnail 1200226

1

Attach Id ( 1200232 ) not integer for post_thumbnail 1200233

1

Attach Id ( 1200283 ) not integer for post_thumbnail 1200284

1

Attach Id ( 1200316 ) not integer for post_thumbnail 1200320

1

Attach Id ( 1200413 ) not integer for post_thumbnail 1200414

1

Attach Id ( 1200417 ) not integer for post_thumbnail 1200418

1

Attach Id ( 1200466 ) not integer for post_thumbnail 1200467

1

Attach Id ( 1200485 ) not integer for post_thumbnail 1200491

1

Attach Id ( 1200510 ) not integer for post_thumbnail 1200511

1

Attach Id ( 1200523 ) not integer for post_thumbnail 1200524

1

Attach Id ( 1200526 ) not integer for post_thumbnail 1200527

1

Attach Id ( 1200529 ) not integer for post_thumbnail 1200530

1

Attach Id ( 1200532 ) not integer for post_thumbnail 1200533

1

Attach Id ( 1200535 ) not integer for post_thumbnail 1200536

1

Attach Id ( 1200560 ) not integer for post_thumbnail 1200561

1

Attach Id ( 1200562 ) not integer for post_thumbnail 1200563

1

Attach Id ( 1200669 ) not integer for post_thumbnail 1200673

1

Attach Id ( 1200675 ) not integer for post_thumbnail 1200676

1

Attach Id ( 1200681 ) not integer for post_thumbnail 1200682

1

Attach Id ( 1200719 ) not integer for post_thumbnail 1200720

1

Attach Id ( 1200764 ) not integer for post_thumbnail 1200765

1

Attach Id ( 1200767 ) not integer for post_thumbnail 1200768

1

Attach Id ( 1200780 ) not integer for post_thumbnail 1200784

1

Attach Id ( 1200816 ) not integer for post_thumbnail 1200817

1

Attach Id ( 1200819 ) not integer for post_thumbnail 1200820

1

Attach Id ( 1200832 ) not integer for post_thumbnail 1200833

1

Attach Id ( 1200835 ) not integer for post_thumbnail 1200836

1

Attach Id ( 1200865 ) not integer for post_thumbnail 1200866

1

Attach Id ( 1200987 ) not integer for post_thumbnail 1200989

1

Attach Id ( 1200999 ) not integer for post_thumbnail 1201000

1

Attach Id ( 1201007 ) not integer for post_thumbnail 1201009

1

Attach Id ( 1201052 ) not integer for post_thumbnail 1201053

1

Attach Id ( 1201108 ) not integer for post_thumbnail 1201112

1

Attach Id ( 1201114 ) not integer for post_thumbnail 1201115

1

Attach Id ( 1201117 ) not integer for post_thumbnail 1201118

1

Attach Id ( 1201125 ) not integer for post_thumbnail 1201126

1

Attach Id ( 1201284 ) not integer for post_thumbnail 1201285

1

Attach Id ( 1201289 ) not integer for post_thumbnail 1201290

1

Attach Id ( 1201303 ) not integer for post_thumbnail 1201304

1

Attach Id ( 1201306 ) not integer for post_thumbnail 1201307

1

Attach Id ( 1201309 ) not integer for post_thumbnail 1201310