{"id":49461,"date":"2014-09-30T01:55:00","date_gmt":"2014-09-30T01:55:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=49461"},"modified":"2014-09-30T01:55:00","modified_gmt":"2014-09-30T01:55:00","slug":"linux-exposed-vulnerable","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/","title":{"rendered":"Linux Exposed as Vulnerable"},"content":{"rendered":"<p><\/p>\n<p><i><font SIZE=\"2\">This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).&#8211;PC Pitstop.<\/i><\/font><\/p>\n<h3Linux Exposed as Vulnerable><\/h3>\n<p>by Fox Van Allen for Techlicious<\/p>\n<p>Security researchers from around the net are sounding the alarm over a recently discovered computer bug named Shellshock (Bash). It\u2019s a massive security hole that&#8217;s arguably worse than the Heartbleed bug from earlier this year. Here\u2019s what you need to know about this new threat, and what you need to know to stay protected from the fallout.<\/p>\n<p><strong>What is Shellshock (and Bash)?<\/strong><\/p>\n<p>Shellshock is a security hole located in a component of the Unix operating system called Bash that handles commands. Few computers these days run Unix itself \u2013 it\u2019s an antiquated OS conceived many decades ago. But since Unix is the grandfather of the Linux and Mac OS X operating systems, they too contain the Shellshock Bash vulnerability. Nearly half of the webservers currently in operation run Linux, so that\u2019s a very big problem.<\/p>\n<p>The vulnerability would let hackers run virtually any command on the machine they want. A person could steal your personal and financial data from one of the many, many website servers that currently run a version of Linux. Or they could connect to your connected home network and turn on your Wi-fi home security camera (again, Linux-based) to spy on you. Or they could take over your MacBook. The possibilities are nearly endless, simply because the Shellshock bug can be exploited in so many ways.<\/p>\n<h3><a href=\"http:\/\/www.techlicious.com\/blog\/shellshock-bash-vulnerability-os-x-linux\/\" target=\"_blank\">Article continued here<\/a><\/h3>\n<p>This excerpt appears with the permission of Techlicious.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).<\/p>\n","protected":false},"author":28,"featured_media":49467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[671],"tags":[623],"class_list":["post-49461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techlicious","tag-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Linux Exposed as Vulnerable<\/title>\n<meta name=\"description\" content=\"Linux Exposed as Vulnerable - This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux Exposed as Vulnerable\" \/>\n<meta property=\"og:description\" content=\"Linux Exposed as Vulnerable - This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-30T01:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shellshock150.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Techlicious\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Techlicious\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/\"},\"author\":{\"name\":\"Techlicious\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/00ed303fb3673e23b03fdf5893ec6ab9\"},\"headline\":\"Linux Exposed as Vulnerable\",\"datePublished\":\"2014-09-30T01:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/\"},\"wordCount\":286,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shellshock150.jpg\",\"keywords\":[\"linux\"],\"articleSection\":[\"Techlicious\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/\",\"name\":\"Linux Exposed as Vulnerable\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shellshock150.jpg\",\"datePublished\":\"2014-09-30T01:55:00+00:00\",\"description\":\"Linux Exposed as Vulnerable - This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shellshock150.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/shellshock150.jpg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/linux-exposed-vulnerable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux Exposed as Vulnerable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/00ed303fb3673e23b03fdf5893ec6ab9\",\"name\":\"Techlicious\",\"description\":\"Techlicious was founded by consumer tech guru, Suzanne Kantra, Techlicious is your daily scoop on everything from the best new mobile phones and apps to holiday shopping guides to step-by-step instructions for protecting your privacy on the Internet.\",\"sameAs\":[\"http:\\\/\\\/techlicious.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/techlicious\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux Exposed as Vulnerable","description":"Linux Exposed as Vulnerable - This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/","og_locale":"en_US","og_type":"article","og_title":"Linux Exposed as Vulnerable","og_description":"Linux Exposed as Vulnerable - This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).","og_url":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2014-09-30T01:55:00+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shellshock150.jpg","type":"image\/jpeg"}],"author":"Techlicious","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Techlicious","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/"},"author":{"name":"Techlicious","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/00ed303fb3673e23b03fdf5893ec6ab9"},"headline":"Linux Exposed as Vulnerable","datePublished":"2014-09-30T01:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/"},"wordCount":286,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shellshock150.jpg","keywords":["linux"],"articleSection":["Techlicious"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/","url":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/","name":"Linux Exposed as Vulnerable","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shellshock150.jpg","datePublished":"2014-09-30T01:55:00+00:00","description":"Linux Exposed as Vulnerable - This story about Shellshock is the most important one of the week. Poking a big hole in the cloak of perceived invulnerability for Linux. And also impacts many accessories beyond the PC itself (e.g., IP cams, routers, etc).","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shellshock150.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/shellshock150.jpg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/linux-exposed-vulnerable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux Exposed as Vulnerable"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/00ed303fb3673e23b03fdf5893ec6ab9","name":"Techlicious","description":"Techlicious was founded by consumer tech guru, Suzanne Kantra, Techlicious is your daily scoop on everything from the best new mobile phones and apps to holiday shopping guides to step-by-step instructions for protecting your privacy on the Internet.","sameAs":["http:\/\/techlicious.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/techlicious\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/49461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=49461"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/49461\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/49467"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=49461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=49461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=49461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}