{"id":944,"date":"2023-12-19T11:23:00","date_gmt":"2023-12-19T11:23:00","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=944"},"modified":"2025-09-23T11:26:12","modified_gmt":"2025-09-23T10:26:12","slug":"understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/","title":{"rendered":"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">In the dynamic world of cybersecurity, understanding the implications of receiving an unprompted&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/One-time_password\" target=\"_blank\" rel=\"noreferrer noopener\">one-time passcode (OTP)<\/a>&nbsp;is crucial. This occurrence often signals a significant security threat: the potential theft of your credentials. Typically, cybercriminals acquire these credentials through various methods, including phishing, credential stuffing, information-stealing malware, or social engineering attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">What happens once stolen credentials are obtained<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Once acquired, these stolen credentials open doors to numerous malicious activities. Attackers may use them to infiltrate corporate networks, engaging in data theft, espionage, or launching ransomware attacks. In the consumer sphere, these credentials enable financial fraud on online retail accounts. The existence of marketplaces where stolen consumer accounts are traded, sometimes for as little as 1 EUR, exacerbates the issue. These marketplaces include accounts from major retailers like Amazon, Marriot Bonvoy, Dunkin, and Instacart.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Implementing MFA to help combat credential theft<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">To combat this,&nbsp;<a href=\"https:\/\/conscia.com\/whitepaper\/how-you-successfully-introduce-mfa-multi-factor-authentication\/\">many companies have implemented multi-factor authentication (MFA)<\/a>. MFA adds an extra layer of security, requiring a secondary form of verification, like an OTP via email or text, a passcode from an authenticator app, or a hardware security key to access an account. This measure significantly hinders unauthorized access, even if your credentials are compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Unprompted MFA<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">However, receiving an OTP without initiating a login attempt is a critical red flag. Such instances suggest that someone else is trying to use your credentials. It\u2019s&nbsp;<strong>imperative to change your password immediately<\/strong>&nbsp;in these scenarios and apply the same change to any other accounts sharing the same password.&nbsp;<strong>Relying solely on MFA for protection is a risky strategy<\/strong>, as there have been instances where attackers bypassed MFA. Moreover,&nbsp;<strong>while SMS and email for 2FA provide added security, they are also the most vulnerable to attacks<\/strong>, such as SIM swapping. In such cases, attackers gain control over your OTPs, potentially resetting your passwords without your knowledge.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Better MFA Methods<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>A safer alternative is using authentication apps, hardware security keys, or passkeys<\/strong>, which require physical access to your device. This adds an extra hurdle for attackers in overcoming multi-factor authentication challenges. Cybersecurity and User Experience do not always go hand-in-hand, or rather never do. However, it is up to your threat model and risk assessment which measures you might take to protect your credentials.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the dynamic world of cybersecurity, understanding the implications of receiving an unprompted&nbsp;one-time passcode (OTP)&nbsp;is crucial. This occurrence often signals a significant security threat: the potential theft of your credentials. Typically, cybercriminals acquire these credentials through various methods, including phishing, credential stuffing, information-stealing malware, or social engineering attacks. What happens once stolen credentials are obtained [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":945,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"In the dynamic world of cybersecurity, understanding the implications of receiving an unprompted&nbsp;one-time passcode (OTP)&nbsp;is crucial. This occurrence often signals a significant security threat: the potential theft of your credentials. Typically, cybercriminals acquire these credentials through various methods, including phishing, credential stuffing, information-stealing malware, or social engineering attacks. What happens once stolen credentials are obtained [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-19T11:23:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T10:26:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity\",\"datePublished\":\"2023-12-19T11:23:00+00:00\",\"dateModified\":\"2025-09-23T10:26:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\"},\"wordCount\":387,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\",\"url\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\",\"name\":\"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg\",\"datePublished\":\"2023-12-19T11:23:00+00:00\",\"dateModified\":\"2025-09-23T10:26:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity","og_description":"In the dynamic world of cybersecurity, understanding the implications of receiving an unprompted&nbsp;one-time passcode (OTP)&nbsp;is crucial. This occurrence often signals a significant security threat: the potential theft of your credentials. Typically, cybercriminals acquire these credentials through various methods, including phishing, credential stuffing, information-stealing malware, or social engineering attacks. What happens once stolen credentials are obtained [&hellip;]","og_url":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/","og_site_name":"Conscia Ireland","article_published_time":"2023-12-19T11:23:00+00:00","article_modified_time":"2025-09-23T10:26:12+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity","datePublished":"2023-12-19T11:23:00+00:00","dateModified":"2025-09-23T10:26:12+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/"},"wordCount":387,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"image":{"@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/","url":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/","name":"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg","datePublished":"2023-12-19T11:23:00+00:00","dateModified":"2025-09-23T10:26:12+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#primaryimage","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/mfa_655157230-hd.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/understanding-the-risks-of-unprompted-one-time-passcodes-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=944"}],"version-history":[{"count":1,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/944\/revisions"}],"predecessor-version":[{"id":946,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/944\/revisions\/946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media\/945"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=944"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=944"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=944"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=944"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=944"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}