{"id":396,"date":"2016-12-26T12:50:56","date_gmt":"2016-12-26T12:50:56","guid":{"rendered":"https:\/\/xnspy.com\/blog\/de\/?p=396"},"modified":"2016-12-02T12:53:28","modified_gmt":"2016-12-02T12:53:28","slug":"wie-sie-cyberspionage-in-ihrem-start-up-vermeiden","status":"publish","type":"post","link":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html","title":{"rendered":"Wie Sie Cyberspionage in Ihrem Start-up vermeiden"},"content":{"rendered":"<p>T\u00e4glich gibt es unz\u00e4hlige neue Gesch\u00e4ftsideen. Wir haben den Schritt gemacht von der Dot-Com-Welt hin zu einem Universum mobiler Applikationen. T\u00e4glich werden dem Store gleich <a href=\"https:\/\/www.adjust.com\/assets\/downloads\/AppleAppStore_Report2014.pdf\">60.000<\/a> neue Apps hinzugef\u00fcgt und Investoren erhalten Millionen Ideen f\u00fcr Apps auf den Schreibtisch. Es geht schlie\u00dflich um die <em>Idee<\/em>, nicht wahr? Es geht nicht mehr darum, eine bestehende Nachfrage mit einem entsprechenden Angebot zu begegnen. Es geht darum, im Markt eine Nische zu finden und eine Nachfrage zu <em>schaffen, <\/em>eine Nachfrage zu schaffen, von denen die Menschen gar nicht wussten, dass es sie in ihrem Leben gibt.<\/p>\n<p>Wenn Sie also Ihr Start-up-Unternehmen gr\u00fcnden, dann ist diese eine Idee das wertvollste Asset in Ihrem Arsenal. Diese Idee kann in die Hosen gehen und bedeuten, dass Sie am n\u00e4chsten Tag Ihr Unternehmen schlie\u00dfen m\u00fcssen, oder sie kann Sie zum Million\u00e4r machen.<\/p>\n<p>Was passiert, wenn eine Idee gestohlen wird? Was passiert, wenn diese einzige Sache, auf die Sie bauen, aus Ihren H\u00e4nden gerissen wird? Was, wenn diese Idee von einem Insider gestohlen wird?<\/p>\n<h2>Das Ausma\u00df von Cyber-Spionage<\/h2>\n<p>Ob Sie es glauben oder nicht, Cyber-Spionage ist die gr\u00f6\u00dfte Bedrohung unserer Zeit. Und es gibt so viele Beispiele, die es gibt, wodurch Sie das Ausma\u00df des Ganzen besser einsch\u00e4tzen k\u00f6nnen. Nehmen Sie als Beispiel den Zwischenfall mit den <a href=\"https:\/\/www.veracode.com\/blog\/2015\/07\/rise-global-cyberattacks-highlights-dangers-cyberespionage-sw\">chinesischen Hackern<\/a>, bei dem Informationen \u00fcber fast 4 Millionen Regierungsbeamte ver\u00f6ffentlicht wurden. Oder die bekannten <a href=\"https:\/\/wikileaks.org\/\">Wikileaks<\/a>,\u00a0 die Politiker auf der ganzen Welt vor den Vorhang holen? Dann gab es noch die alles ver\u00e4ndernden <a href=\"https:\/\/www.occrp.org\/en\/panamapapers\/spies-and-shadowy-allies\/\">Panama Papers<\/a>, die als Teil eines riesigen Spionagekartells ver\u00f6ffentlicht wurden.<\/p>\n<p>Jemand k\u00f6nnte nun sagen, dass die oben angef\u00fchrten Beispiele mehr Gutes als Schlechtes bewirkt haben (was die der \u00d6ffentlichkeit zur Verf\u00fcgung gestellten Informationen betrifft), der Grund, warum wir diese angef\u00fchrt haben \u2013 wir wollten Ihnen das Ausma\u00df von Cyber-Spionage erkl\u00e4ren. \u00dcbertragen Sie nun das Konzept auf Ihr kleines Unternehmen, wo es um weniger geht (und keine internationalen Player lol). Stellen Sie sich vor, Ihre Idee wird gestohlen und von einem Ihrer eigenen Mitarbeiter an Ihre Konkurrenten verkauft.<\/p>\n<p>Und das k\u00f6nnen Sie dagegen tun.<\/p>\n<h2>Cyber-Spionage pragmatisch bek\u00e4mpfen<\/h2>\n<p>Zuerst m\u00fcssen Sie alle Daten \u00fcberwachen, die aus Ihrem B\u00fcro \u00fcbermittelt werden und die im B\u00fcro eingehen. Genau das macht unser Mitarbeiter-\u00dcberwachungstool. Wenn Sie es einmal auf den Ger\u00e4ten Ihrer Angestellten installiert haben, sind Sie in der Lage zu sehen, was sie mit ihren Telefonen machen.<\/p>\n<p>Sie k\u00f6nnen zum Beispiel:<\/p>\n<ul>\n<li>Alle eingehenden und ausgehenden E-Mails lesen. Sie wissen, mit wem Ihre Angestellten kommunizieren und welche Informationen \u00fcbermittelt werden.<\/li>\n<li>Alle Fotos durchsuchen, die ausgetauscht werden. H\u00e4ufig stellt man fest, dass Angestellte Daten stehlen, indem Sie Fotos Ihrer Dokumente machen und diese an Konkurrenten senden. Durch die \u00dcberwachung der Fotos k\u00f6nnen Sie das verhindern.<\/li>\n<li>Alle IM-Nachrichten und SMS lesen. Auf diese Weise k\u00f6nnen Sie auch die ausgetauschten Textnachrichten im Auge behalten.<\/li>\n<li>Telefonanrufe aufzeichnen. Sie k\u00f6nnen alle Kontakte im Auge behalten und Telefonunterhaltungen zuh\u00f6ren, w\u00e4hrend sie stattfinden.<\/li>\n<\/ul>\n<p>Sie m\u00fcssen sicherstellen, dass Sie Ihren Angestellten zu jeder Zeit einen Schritt voraus sind. Wenn die Kommunikation transparent ist, dann gibt es nicht viele M\u00f6glichkeiten, wie die Angestellten Informationen unbemerkt weiterverbreiten. Die Angestellten\u00fcberwachung mit XNSPY sorgt daf\u00fcr, dass Sie Ihr Schicksal selber in der Hand haben.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00e4glich gibt es unz\u00e4hlige neue Gesch\u00e4ftsideen. Wir haben den Schritt gemacht von der Dot-Com-Welt hin zu einem Universum mobiler Applikationen. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":343,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[135],"tags":[136,139,140,137,138],"class_list":["post-396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-spionage","tag-cyber-spionage","tag-cyberspionage","tag-pragmatisch","tag-start-up","tag-vermeiden"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wie Sie Cyberspionage in Ihrem Start-up vermeiden - XNSPY Offizieller deutscher Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wie Sie Cyberspionage in Ihrem Start-up vermeiden - XNSPY Offizieller deutscher Blog\" \/>\n<meta property=\"og:description\" content=\"T\u00e4glich gibt es unz\u00e4hlige neue Gesch\u00e4ftsideen. Wir haben den Schritt gemacht von der Dot-Com-Welt hin zu einem Universum mobiler Applikationen. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html\" \/>\n<meta property=\"og:site_name\" content=\"XNSPY Offizieller deutscher Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-26T12:50:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenny Nicole\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenny Nicole\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html\",\"url\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html\",\"name\":\"Wie Sie Cyberspionage in Ihrem Start-up vermeiden - XNSPY Offizieller deutscher Blog\",\"isPartOf\":{\"@id\":\"https:\/\/xnspy.com\/blog\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png\",\"datePublished\":\"2016-12-26T12:50:56+00:00\",\"author\":{\"@id\":\"https:\/\/xnspy.com\/blog\/de\/#\/schema\/person\/f4e845622858bcc933967f858e88ef38\"},\"breadcrumb\":{\"@id\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#primaryimage\",\"url\":\"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png\",\"contentUrl\":\"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png\",\"width\":750,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xnspy.com\/blog\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wie Sie Cyberspionage in Ihrem Start-up vermeiden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xnspy.com\/blog\/de\/#website\",\"url\":\"https:\/\/xnspy.com\/blog\/de\/\",\"name\":\"XNSPY Offizieller deutscher Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xnspy.com\/blog\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/xnspy.com\/blog\/de\/#\/schema\/person\/f4e845622858bcc933967f858e88ef38\",\"name\":\"Jenny Nicole\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/xnspy.com\/blog\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5489a6e2247270b428c7ebe306cf87ccc02fc153e2475fe864f134293f132761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5489a6e2247270b428c7ebe306cf87ccc02fc153e2475fe864f134293f132761?s=96&d=mm&r=g\",\"caption\":\"Jenny Nicole\"},\"description\":\"Jenny Nicole is a dedicated content writer and a work-from-home mom who loves sharing her insights on parenting, homeschooling, and family well-being. With a strong passion for helping parents navigate the challenges of modern digital life, she often writes about topics like children\u2019s online safety, cyberbullying, and healthy screen habits. Balancing motherhood and writing, Jenny brings authenticity and warmth to every piece she creates. Through her work, she hopes to empower other parents to make informed choices, build stronger family connections, and create safer online environments for their kids.\",\"url\":\"https:\/\/xnspy.com\/blog\/de\/author\/kido\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wie Sie Cyberspionage in Ihrem Start-up vermeiden - XNSPY Offizieller deutscher Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html","og_locale":"de_DE","og_type":"article","og_title":"Wie Sie Cyberspionage in Ihrem Start-up vermeiden - XNSPY Offizieller deutscher Blog","og_description":"T\u00e4glich gibt es unz\u00e4hlige neue Gesch\u00e4ftsideen. Wir haben den Schritt gemacht von der Dot-Com-Welt hin zu einem Universum mobiler Applikationen. [&hellip;]","og_url":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html","og_site_name":"XNSPY Offizieller deutscher Blog","article_published_time":"2016-12-26T12:50:56+00:00","og_image":[{"width":750,"height":500,"url":"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png","type":"image\/png"}],"author":"Jenny Nicole","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Jenny Nicole","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html","url":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html","name":"Wie Sie Cyberspionage in Ihrem Start-up vermeiden - XNSPY Offizieller deutscher Blog","isPartOf":{"@id":"https:\/\/xnspy.com\/blog\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#primaryimage"},"image":{"@id":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#primaryimage"},"thumbnailUrl":"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png","datePublished":"2016-12-26T12:50:56+00:00","author":{"@id":"https:\/\/xnspy.com\/blog\/de\/#\/schema\/person\/f4e845622858bcc933967f858e88ef38"},"breadcrumb":{"@id":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#primaryimage","url":"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png","contentUrl":"https:\/\/xnspy.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2016\/08\/10.png","width":750,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/xnspy.com\/blog\/de\/wie-sie-cyberspionage-in-ihrem-start-up-vermeiden.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xnspy.com\/blog\/de\/"},{"@type":"ListItem","position":2,"name":"Wie Sie Cyberspionage in Ihrem Start-up vermeiden"}]},{"@type":"WebSite","@id":"https:\/\/xnspy.com\/blog\/de\/#website","url":"https:\/\/xnspy.com\/blog\/de\/","name":"XNSPY Offizieller deutscher Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xnspy.com\/blog\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/xnspy.com\/blog\/de\/#\/schema\/person\/f4e845622858bcc933967f858e88ef38","name":"Jenny Nicole","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/xnspy.com\/blog\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5489a6e2247270b428c7ebe306cf87ccc02fc153e2475fe864f134293f132761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5489a6e2247270b428c7ebe306cf87ccc02fc153e2475fe864f134293f132761?s=96&d=mm&r=g","caption":"Jenny Nicole"},"description":"Jenny Nicole is a dedicated content writer and a work-from-home mom who loves sharing her insights on parenting, homeschooling, and family well-being. With a strong passion for helping parents navigate the challenges of modern digital life, she often writes about topics like children\u2019s online safety, cyberbullying, and healthy screen habits. Balancing motherhood and writing, Jenny brings authenticity and warmth to every piece she creates. Through her work, she hopes to empower other parents to make informed choices, build stronger family connections, and create safer online environments for their kids.","url":"https:\/\/xnspy.com\/blog\/de\/author\/kido"}]}},"_links":{"self":[{"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/posts\/396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/comments?post=396"}],"version-history":[{"count":2,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/posts\/396\/revisions"}],"predecessor-version":[{"id":398,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/posts\/396\/revisions\/398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/media\/343"}],"wp:attachment":[{"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/media?parent=396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/categories?post=396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xnspy.com\/blog\/de\/wp-json\/wp\/v2\/tags?post=396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}