{"id":11694,"date":"2019-02-13T14:12:14","date_gmt":"2019-02-13T13:12:14","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11694"},"modified":"2020-01-02T11:25:31","modified_gmt":"2020-01-02T10:25:31","slug":"what-is-credit-card-skimming","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/","title":{"rendered":"Guest author Article &#8211; What is credit card skimming ?"},"content":{"rendered":"<p><em>This article was written during a challenge organised with several HEC students to write articles about cybersecurity. So it has been written by our guest author, El Farouk EL AZIZI, student from HEC Business School.<\/em><\/p>\n<h1>What is credit card skimming ?<\/h1>\n<p><strong>Skimming<\/strong> is the crime of getting private information about someone else\u2019s <strong>credit card<\/strong> in an otherwise normal transaction. The thief can procure a victim\u2019s card number using basic methods such as photocopying receipts or more advanced methods such as using a <strong>small electronic devic<\/strong>e (Skimmer) to swipe and store hundred of victims&#8217; card numbers.<\/p>\n<p>When a Credit or Debit Card is swiped through a skimmer, it stores all the information stored in the card\u2019s magnetic stripe. This last one contains the credit card\u2019s numbers and expiration date and all other details related to it. Credit card skimmers are often <strong>placed over the card swipe mechanism<\/strong> on almost any type of credit card reader (ATM, gas station, etc.).<\/p>\n<p>For ATMs for example, <strong>the thief installs a device that fits over the real ATM<\/strong> card-reader slot. Consequently, ATM users (bank &amp; customers) do not know that their information is being intercepted as their card is inserted into a false reader. While using the ATM, <strong>the skimmer duplicates the data stored in the card<\/strong>. Sometimes, it is paired with a camera that records the user entering his PIN code. Another technique used is a <strong>keypad overlay<\/strong> that matches up with the buttons of the legitimate keypad below it and presses them while operated, but records or remotely transmits the keylog of the PIN entered.<\/p>\n<p>Once the<strong> victim\u2019s credit card information is stolen<\/strong>, thieves can either create a cloned card to proceed to p<strong>urchases in stores<\/strong> or <strong>sell the credit card information<\/strong> on the Darknet. Victims are generally unaware of the theft until they notice unauthorized charges on their account and as thieves are generally hard to track down. But for a large part of them, it is possible for card issuers to detect them. The issuer collects every customer\u2019s claims related to fraudulent transactions, and then uses data mining (regression) to discover insights, the relationship among them and the associated merchants. <strong>For example if a large amount of abused customers use a particular merchant, this last one will be investigated<\/strong>. Other sophisticated algorithms can also search for patterns of fraud.<\/p>\n<p><strong>Credit card skimming has expanded and takes place nowadays in every corner of the world<\/strong>. This practice is present from Europe to South Africa and is expected to grow in developing countries, as credit cards users are growing.<\/p>\n<h1>How to protect from credit card skimming ?<\/h1>\n<p>According the Fair Isaac Corporation (FICO), the number of compromised ATMs and points of sales in USA jumped 21 percent during the first six months of 2017. That comes on the heels of a 70% increase between 2015 and 2016. There are no statistics regarding Gas Pump Skimming since it\u2019s a local crime and not centrally tracked. <strong>However the risk of theft is quite significant<\/strong> : according to the National Association for Convenience Stores, 29 Million Americans refuel every day using their credit card, a single compromised pump can capture data from 30 to 100 cards per day. And when skimming occurs at a gas station, it is usually limited to one pump which makes it more difficult to spot.<\/p>\n<p><strong>Credit Card skimming is becoming a serious and real threat<\/strong> of the modern digitalized world and governments are becoming aware of this. Many ATMs worldwide are now equipped with a guide to help people identify whether the ATM is compromised or not. Banks may also not process suspicious charges until the identity of the one who initiated the transaction is verified. However progress is still needed. In US for instance, gas pumps received a three-year extension on EMV transition in 2017, meaning that fuel pumps will continue to be field for fraudsters with skimmers until October 2020. <strong>Therefore, we should all be cautious and adapt our behaviour to avoid and\/or counter skimmers<\/strong>. Firstly, everyone must watch where they shop with their credit card. Secondly, people should check the ATM before using it. Skimmers are generally produced using a 3D printer, there should be therefore some noticeable differences. Finally, we should act in a responsible manner, for example we should never fall to those \u201ccredit card cleaning\u201c scams where thieves claim to clean the magnetic strip on your credit card to help it work better (whereas he plugs it into a skimmer) or we can rely on apps that helps detects skimmers such as \u201cSkimmer Scanner\u201d a free skimmer scanner Android app released in September 2017 .<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was written during a challenge organised with several HEC students to write articles about cybersecurity. So it has been written by our guest author, El Farouk EL AZIZI, student from HEC Business School. What is credit card skimming&#8230;<\/p>\n","protected":false},"author":1339,"featured_media":11706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3268,2777],"tags":[3328],"coauthors":[3107],"class_list":["post-11694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-for-financial-services-en","category-cybersecurity-digital-trust","tag-financial-services-cyber-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guest author Article - What is credit card skimming ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"This article about credit card skimming was written by our guest author, El Farouk EL AZIZI, student from HEC Business School.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guest author Article - What is credit card skimming ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"This article about credit card skimming was written by our guest author, El Farouk EL AZIZI, student from HEC Business School.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-13T13:12:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:25:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4743\" \/>\n\t<meta property=\"og:image:height\" content=\"3163\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ElFaroukElAziz1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ElFaroukElAziz1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\"},\"author\":{\"name\":\"ElFaroukElAziz1\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f2cac6133661225d94a71c3a1b3a53a0\"},\"headline\":\"Guest author Article &#8211; What is credit card skimming ?\",\"datePublished\":\"2019-02-13T13:12:14+00:00\",\"dateModified\":\"2020-01-02T10:25:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\"},\"wordCount\":772,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg\",\"keywords\":[\"financial services cyber\"],\"articleSection\":[\"Cyber for Financial Services\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\",\"name\":\"Guest author Article - What is credit card skimming ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg\",\"datePublished\":\"2019-02-13T13:12:14+00:00\",\"dateModified\":\"2020-01-02T10:25:31+00:00\",\"description\":\"This article about credit card skimming was written by our guest author, El Farouk EL AZIZI, student from HEC Business School.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg\",\"width\":4743,\"height\":3163,\"caption\":\"motivation concept with businessman flat design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guest author Article &#8211; What is credit card skimming ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f2cac6133661225d94a71c3a1b3a53a0\",\"name\":\"ElFaroukElAziz1\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/elfaroukelaziz1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guest author Article - What is credit card skimming ? - RiskInsight","description":"This article about credit card skimming was written by our guest author, El Farouk EL AZIZI, student from HEC Business School.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/","og_locale":"en_US","og_type":"article","og_title":"Guest author Article - What is credit card skimming ? - RiskInsight","og_description":"This article about credit card skimming was written by our guest author, El Farouk EL AZIZI, student from HEC Business School.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/","og_site_name":"RiskInsight","article_published_time":"2019-02-13T13:12:14+00:00","article_modified_time":"2020-01-02T10:25:31+00:00","og_image":[{"width":4743,"height":3163,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg","type":"image\/jpeg"}],"author":"ElFaroukElAziz1","twitter_misc":{"Written by":"ElFaroukElAziz1","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/"},"author":{"name":"ElFaroukElAziz1","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f2cac6133661225d94a71c3a1b3a53a0"},"headline":"Guest author Article &#8211; What is credit card skimming ?","datePublished":"2019-02-13T13:12:14+00:00","dateModified":"2020-01-02T10:25:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/"},"wordCount":772,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg","keywords":["financial services cyber"],"articleSection":["Cyber for Financial Services","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/","name":"Guest author Article - What is credit card skimming ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg","datePublished":"2019-02-13T13:12:14+00:00","dateModified":"2020-01-02T10:25:31+00:00","description":"This article about credit card skimming was written by our guest author, El Farouk EL AZIZI, student from HEC Business School.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/02\/Fotolia_65071536_Subscription_Monthly_XXL-motivation\u00a9-beachboyx10.jpg","width":4743,"height":3163,"caption":"motivation concept with businessman flat design."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/02\/what-is-credit-card-skimming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Guest author Article &#8211; What is credit card skimming ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f2cac6133661225d94a71c3a1b3a53a0","name":"ElFaroukElAziz1","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/elfaroukelaziz1\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1339"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11694"}],"version-history":[{"count":12,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11694\/revisions"}],"predecessor-version":[{"id":11708,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11694\/revisions\/11708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11706"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11694"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}