{"id":512414,"date":"2026-05-15T10:53:08","date_gmt":"2026-05-15T05:23:08","guid":{"rendered":"https:\/\/blog.in.springverify.com\/?p=512414"},"modified":"2026-05-15T10:53:09","modified_gmt":"2026-05-15T05:23:09","slug":"proxy-interviews-identity-fraud-remote-hiring","status":"publish","type":"post","link":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/","title":{"rendered":"Proxy Interviews &#038; Identity Fraud in Remote Hiring"},"content":{"rendered":"\n<p>A Bangalore startup hired a &#8220;senior data scientist&#8221; through four rounds of video interviews. Impressive technical knowledge. Great communication. Strong cultural fit. Three weeks in, the engineering lead noticed something odd: this person&#8217;s coding style was completely different from the live assessment. Their Slack writing style had changed. Even their accent on internal calls was subtly different from the interviews.<\/p>\n\n\n\n<p>They&#8217;d hired a proxy. The person who interviewed was not the person sitting in the home office in Electronic City writing code.<\/p>\n\n\n\n<p>The investigation revealed a Telegram group offering &#8220;interview-as-a-service&#8221; for Rs. 35,000 per engagement, with a guarantee: if the candidate doesn&#8217;t clear, the next attempt is free.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Welcome to India&#8217;s Proxy Interview Industry<\/h2>\n\n\n\n<p>Proxy interviews existed before COVID. Remote hiring turned them from a rare oddity into a scalable, marketed service. Services across India now charge Rs. 20,000-50,000 to provide a &#8220;professional interviewer&#8221; who impersonates the actual candidate through video calls. Some offer packages: proxy for all rounds, coaching between rounds, and a &#8220;support buddy&#8221; who feeds answers via WhatsApp during the first month of work.<\/p>\n\n\n\n<p>NASSCOM flagged this as a growing concern in Indian IT as early as 2022. Multiple Reddit threads from Indian recruiters describe discovering proxies weeks or months into employment. One thread documented a Hyderabad-based proxy ring that serviced over 200 candidates in a single year \u2014 each paying Rs. 30,000-40,000 for interviews at TCS, Infosys, and Wipro vendor positions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_It_Actually_Works\"><\/span>How It Actually Works<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>The basic version:<\/strong>&nbsp;Candidate A (average skills, wants the job) pays Candidate B (strong skills, wants the money) to take the video interviews. Candidate A joins the company. The deception relies on one fact: most companies never compare the face on the interview video with the face on the identity document.<\/p>\n\n\n\n<p><strong>The sophisticated version:<\/strong>&nbsp;Real-time answer feeding. The proxy sits off-camera and feeds technical answers through an earpiece or a second screen while the actual candidate speaks on camera. Harder to detect because the right person is visible \u2014 just not the right brain.<\/p>\n\n\n\n<p><strong>The AI-enhanced version (emerging):<\/strong>&nbsp;Deepfake filters that overlay the candidate&#8217;s face on the proxy&#8217;s video feed. A proxy in Koramangala talks while the candidate&#8217;s face in Whitefield moves on screen. Still rare, but technically feasible with consumer-grade tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Detection_Methods_That_Actually_Work\"><\/span>Detection Methods That Actually Work<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>1. Liveness verification during onboarding.<\/strong>&nbsp;Compare a live facial capture during digital onboarding with the photo on the Aadhaar used for identity verification AND with a screenshot from the recorded interview. Three-point face match. If the person joining doesn&#8217;t match either the ID or the interview, it&#8217;s caught immediately. This single step defeats 95% of proxy attempts.<\/p>\n\n\n\n<p><strong>2. Interview recording + onboarding face match.<\/strong>&nbsp;Record at least one video interview (with candidate consent \u2014 mention it in your interview scheduling email). During onboarding, compare faces. SpringVerify&#8217;s Aadhaar-based facial match with liveness detection provides the technical infrastructure for this comparison.<\/p>\n\n\n\n<p><strong>3. Multi-point identity verification.<\/strong>&nbsp;Aadhaar face match + PAN verification + a live selfie during onboarding. Three independent identity confirmations that are extremely difficult to defeat simultaneously.<\/p>\n\n\n\n<p><strong>4. In-interview signals to watch for.<\/strong>&nbsp;Eyes consistently looking to the left or right (reading from a hidden screen). Audio latency or echo suggesting a relay setup. Reluctance to turn on camera or share screen. Technical depth that varies dramatically between rounds (different proxies for different rounds). Asking to reschedule when you request a surprise technical round.<\/p>\n\n\n\n<p><strong>5. First-week verification tasks.<\/strong>&nbsp;A short technical task in the first week that mirrors interview assessment complexity. If someone solved a system design problem eloquently in the interview but struggles with basic implementation in week one, investigate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_to_Do_If_You_Suspect_a_Proxy\"><\/span>What to Do If You Suspect a Proxy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Don&#8217;t accuse immediately.<\/strong>&nbsp;Request a video call with camera on, citing &#8220;onboarding documentation needs.&#8221; Compare the face to interview recordings. If there&#8217;s a mismatch, escalate to HR and Legal before confronting the employee.<\/p>\n\n\n\n<p><strong>Document evidence.<\/strong>&nbsp;Screenshot comparisons, interview recordings, liveness check results. You&#8217;ll need this for termination proceedings.<\/p>\n\n\n\n<p><strong>Review your employment contract.<\/strong>&nbsp;Most contracts include a clause on misrepresentation of credentials. Identity fraud during hiring typically constitutes grounds for immediate termination, but consult your legal team on the specific process.<\/p>\n\n\n\n<p><strong>Report to the proxy service<\/strong>&nbsp;if you can identify it. While there&#8217;s no specific law criminalizing proxy interviews, identity fraud and impersonation have provisions under the Indian Penal Code (Section 419: cheating by personation).<\/p>\n\n\n\n<p>SpringVerify&#8217;s identity verification suite \u2014 Aadhaar-based facial match with liveness detection, multi-document verification, and onboarding-stage identity confirmation \u2014 is specifically designed to close the proxy gap that document-only verification leaves wide open.<\/p>\n\n\n\n<p><strong>Key Takeaways:<\/strong><\/p>\n\n\n\n<p>\u2022Proxy interview services are a marketed industry in India, operating openly on Telegram for Rs. 20,000-50,000<\/p>\n\n\n\n<p>\u2022Three-point face match (interview recording + Aadhaar photo + live onboarding selfie) defeats 95% of proxies<\/p>\n\n\n\n<p>\u2022Record at least one interview round with candidate consent \u2014 this is your comparison baseline<\/p>\n\n\n\n<p>\u2022First-week technical tasks that mirror interview complexity are a behavioral proxy detection layer<\/p>\n\n\n\n<p>\u2022Identity fraud during hiring constitutes grounds for termination under most employment contracts \u2014 document everything<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Bangalore startup hired a &#8220;senior data scientist&#8221; through four rounds of video interviews. Impressive technical knowledge. Great communication. Strong cultural fit. Three weeks in, the engineering lead noticed something odd: this person&#8217;s coding style was completely different from the live assessment. Their Slack writing style had changed. Even their accent on internal calls was<\/p>\n","protected":false},"author":1026,"featured_media":512415,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[102674],"tags":[65,69,130,131],"class_list":["post-512414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sv-in-customers","tag-hiring","tag-hr","tag-springverify","tag-springverify-india","disable-dropcap","disable-2-columns"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proxy Interviews &amp; Identity Fraud in Remote Hiring: How to Detect &amp; Prevent - Springverify Blog<\/title>\n<meta name=\"description\" content=\"Proxy interviews and identity fraud are rising in remote hiring. Learn how to detect impersonation, fake candidates, and protect your hiring process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proxy Interviews &amp; Identity Fraud in Remote Hiring: How to Detect &amp; Prevent - Springverify Blog\" \/>\n<meta property=\"og:description\" content=\"Proxy interviews and identity fraud are rising in remote hiring. Learn how to detect impersonation, fake candidates, and protect your hiring process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/\" \/>\n<meta property=\"og:site_name\" content=\"SpringVerify Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T05:23:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-15T05:23:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2026\/05\/Untitled-design-80.png?v=1778822584\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Khyati Ojha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@springroleinc\" \/>\n<meta name=\"twitter:site\" content=\"@springroleinc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Khyati Ojha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/\"},\"author\":{\"name\":\"Khyati Ojha\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#\\\/schema\\\/person\\\/477047b2c0a8d3a260c90f0cb7faa996\"},\"headline\":\"Proxy Interviews &#038; Identity Fraud in Remote Hiring\",\"datePublished\":\"2026-05-15T05:23:08+00:00\",\"dateModified\":\"2026-05-15T05:23:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/\"},\"wordCount\":838,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.in.springverify.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Untitled-design-80.png?v=1778822584\",\"keywords\":[\"Hiring\",\"HR\",\"Springverify\",\"Springverify India\"],\"articleSection\":[\"SV India\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/\",\"url\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/\",\"name\":\"Proxy Interviews & Identity Fraud in Remote Hiring: How to Detect & Prevent - Springverify Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.in.springverify.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Untitled-design-80.png?v=1778822584\",\"datePublished\":\"2026-05-15T05:23:08+00:00\",\"dateModified\":\"2026-05-15T05:23:09+00:00\",\"description\":\"Proxy interviews and identity fraud are rising in remote hiring. Learn how to detect impersonation, fake candidates, and protect your hiring process.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.in.springverify.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Untitled-design-80.png?v=1778822584\",\"contentUrl\":\"https:\\\/\\\/blog.in.springverify.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Untitled-design-80.png?v=1778822584\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/proxy-interviews-identity-fraud-remote-hiring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.in.springverify.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proxy Interviews &#038; Identity Fraud in Remote Hiring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.in.springverify.com\\\/\",\"name\":\"SpringVerify Blog\",\"description\":\"Background Check and Employment Verification Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.in.springverify.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#organization\",\"name\":\"Springworks\",\"url\":\"https:\\\/\\\/blog.in.springverify.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.in.springverify.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Springworks-Blog-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.in.springverify.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Springworks-Blog-1.png\",\"width\":548,\"height\":79,\"caption\":\"Springworks\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/springroleinc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.in.springverify.com\\\/#\\\/schema\\\/person\\\/477047b2c0a8d3a260c90f0cb7faa996\",\"name\":\"Khyati Ojha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/365be15312138d65fb8564188c3a34fc14332ad5b2efafa618959352167265f1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/365be15312138d65fb8564188c3a34fc14332ad5b2efafa618959352167265f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/365be15312138d65fb8564188c3a34fc14332ad5b2efafa618959352167265f1?s=96&d=mm&r=g\",\"caption\":\"Khyati Ojha\"},\"url\":\"https:\\\/\\\/blog.in.springverify.com\\\/author\\\/khyati-ojha\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proxy Interviews & Identity Fraud in Remote Hiring: How to Detect & Prevent - Springverify Blog","description":"Proxy interviews and identity fraud are rising in remote hiring. Learn how to detect impersonation, fake candidates, and protect your hiring process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/","og_locale":"en_US","og_type":"article","og_title":"Proxy Interviews & Identity Fraud in Remote Hiring: How to Detect & Prevent - Springverify Blog","og_description":"Proxy interviews and identity fraud are rising in remote hiring. Learn how to detect impersonation, fake candidates, and protect your hiring process.","og_url":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/","og_site_name":"SpringVerify Blog","article_published_time":"2026-05-15T05:23:08+00:00","article_modified_time":"2026-05-15T05:23:09+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2026\/05\/Untitled-design-80.png?v=1778822584","type":"image\/png"}],"author":"Khyati Ojha","twitter_card":"summary_large_image","twitter_creator":"@springroleinc","twitter_site":"@springroleinc","twitter_misc":{"Written by":"Khyati Ojha","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#article","isPartOf":{"@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/"},"author":{"name":"Khyati Ojha","@id":"https:\/\/blog.in.springverify.com\/#\/schema\/person\/477047b2c0a8d3a260c90f0cb7faa996"},"headline":"Proxy Interviews &#038; Identity Fraud in Remote Hiring","datePublished":"2026-05-15T05:23:08+00:00","dateModified":"2026-05-15T05:23:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/"},"wordCount":838,"publisher":{"@id":"https:\/\/blog.in.springverify.com\/#organization"},"image":{"@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2026\/05\/Untitled-design-80.png?v=1778822584","keywords":["Hiring","HR","Springverify","Springverify India"],"articleSection":["SV India"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/","url":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/","name":"Proxy Interviews & Identity Fraud in Remote Hiring: How to Detect & Prevent - Springverify Blog","isPartOf":{"@id":"https:\/\/blog.in.springverify.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#primaryimage"},"image":{"@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2026\/05\/Untitled-design-80.png?v=1778822584","datePublished":"2026-05-15T05:23:08+00:00","dateModified":"2026-05-15T05:23:09+00:00","description":"Proxy interviews and identity fraud are rising in remote hiring. Learn how to detect impersonation, fake candidates, and protect your hiring process.","breadcrumb":{"@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#primaryimage","url":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2026\/05\/Untitled-design-80.png?v=1778822584","contentUrl":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2026\/05\/Untitled-design-80.png?v=1778822584","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/blog.in.springverify.com\/proxy-interviews-identity-fraud-remote-hiring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.in.springverify.com\/"},{"@type":"ListItem","position":2,"name":"Proxy Interviews &#038; Identity Fraud in Remote Hiring"}]},{"@type":"WebSite","@id":"https:\/\/blog.in.springverify.com\/#website","url":"https:\/\/blog.in.springverify.com\/","name":"SpringVerify Blog","description":"Background Check and Employment Verification Resources","publisher":{"@id":"https:\/\/blog.in.springverify.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.in.springverify.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.in.springverify.com\/#organization","name":"Springworks","url":"https:\/\/blog.in.springverify.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.in.springverify.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2021\/09\/Springworks-Blog-1.png","contentUrl":"https:\/\/blog.in.springverify.com\/wp-content\/uploads\/2021\/09\/Springworks-Blog-1.png","width":548,"height":79,"caption":"Springworks"},"image":{"@id":"https:\/\/blog.in.springverify.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/springroleinc"]},{"@type":"Person","@id":"https:\/\/blog.in.springverify.com\/#\/schema\/person\/477047b2c0a8d3a260c90f0cb7faa996","name":"Khyati Ojha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/365be15312138d65fb8564188c3a34fc14332ad5b2efafa618959352167265f1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/365be15312138d65fb8564188c3a34fc14332ad5b2efafa618959352167265f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/365be15312138d65fb8564188c3a34fc14332ad5b2efafa618959352167265f1?s=96&d=mm&r=g","caption":"Khyati Ojha"},"url":"https:\/\/blog.in.springverify.com\/author\/khyati-ojha\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/posts\/512414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/users\/1026"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/comments?post=512414"}],"version-history":[{"count":1,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/posts\/512414\/revisions"}],"predecessor-version":[{"id":512416,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/posts\/512414\/revisions\/512416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/media\/512415"}],"wp:attachment":[{"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/media?parent=512414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/categories?post=512414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.in.springverify.com\/wp-json\/wp\/v2\/tags?post=512414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}