{"id":4408,"date":"2020-10-30T21:01:22","date_gmt":"2020-10-30T20:01:22","guid":{"rendered":"https:\/\/webhosting.de\/?p=4408"},"modified":"2021-12-27T20:35:51","modified_gmt":"2021-12-27T19:35:51","slug":"caos-del-administrador-de-contrasenas-tratando-orden-en-contrasena","status":"publish","type":"post","link":"https:\/\/webhosting.de\/es\/passwortmanager-bringen-ordnung-ins-passwortchaos\/","title":{"rendered":"Los administradores de contrase\u00f1as ponen orden en el caos de las contrase\u00f1as"},"content":{"rendered":"<p>Para garantizar la seguridad permanente, siempre se deben utilizar contrase\u00f1as complejas y, sobre todo, cambiadas regularmente para las cuentas de correo electr\u00f3nico o el acceso en l\u00ednea. Sin embargo, mucha gente est\u00e1 abrumada con la tarea de recordar todas las contrase\u00f1as. Un administrador de contrase\u00f1as deber\u00eda resolver este problema.<\/p>\n<h2>\u00bfQu\u00e9 hacen realmente los administradores de contrase\u00f1as?<\/h2>\n<p>Los gestores de contrase\u00f1as se utilizan para almacenar y gestionar diversas contrase\u00f1as y datos de acceso (por ejemplo, para las cuentas de correo electr\u00f3nico o el acceso a tiendas online). El almacenamiento se realiza en un archivo encriptado <a href=\"https:\/\/webhosting.de\/es\/datenbank-server\/\">Base de datos<\/a>para garantizar una seguridad suficiente. Las bases de datos utilizan diferentes algoritmos de cifrado. Un algoritmo de encriptaci\u00f3n com\u00fan se llama \"Twofish\". Muchos gestores de contrase\u00f1as funcionan con este algoritmo. Adem\u00e1s, un gran n\u00famero de otros programas utilizan un formato de base de datos similar o igual. La base de datos creada por el programa se almacena en el disco duro de su ordenador. Para acceder a la base de datos, hay que introducir una contrase\u00f1a maestra, que se llama contrase\u00f1a maestra. As\u00ed, en lugar de tener que memorizar innumerables contrase\u00f1as, al utilizar un gestor de contrase\u00f1as basta con recordar una sola. Tras introducir la contrase\u00f1a maestra, se accede a la base de datos con las contrase\u00f1as almacenadas para los accesos individuales de los usuarios o cuentas de usuario.<\/p>\n<h2>Para usar el administrador de contrase\u00f1as<\/h2>\n<p>Para mantener una visi\u00f3n de conjunto, las entradas de las distintas cuentas de usuario y sus datos de acceso pueden organizarse seg\u00fan distintas categor\u00edas. Por ejemplo, es posible clasificar las entradas seg\u00fan cuentas de correo electr\u00f3nico, cuentas de banca en l\u00ednea y cuentas de diversas tiendas en l\u00ednea y guardarlas en la base de datos. Si ahora quieres acceder a una cuenta de cliente de una tienda online, por ejemplo, primero abre la base de datos con las contrase\u00f1as guardadas utilizando la contrase\u00f1a maestra. A continuaci\u00f3n, copie de la base de datos la contrase\u00f1a all\u00ed guardada y p\u00e9guela en el campo de entrada correspondiente en el acceso a la tienda online. Con muchos programas, este proceso puede incluso simplificarse simplemente haciendo clic en los enlaces correspondientes de la tienda online. Los campos correspondientes para la <a href=\"https:\/\/webhosting.de\/es\/benutzernamen-in-wordpress-nachtraeglich-aendern\/\">Nombres de usuario<\/a> as\u00ed como la contrase\u00f1a del acceso en l\u00ednea puede incluso ser introducida con la necesaria <a href=\"https:\/\/webhosting.de\/es\/personenbezogene-daten-sozialen-netzwerken\/\">Datos<\/a> se rellenar\u00e1 autom\u00e1ticamente. Para abrir el acceso a una tienda online o a otra aplicaci\u00f3n protegida por contrase\u00f1a, en el futuro s\u00f3lo habr\u00e1 que abrir primero el gestor de contrase\u00f1as y seleccionar el acceso correspondiente.<\/p>\n<h2>Cuando se necesitan nuevas contrase\u00f1as<\/h2>\n<p>Incluso si necesitas nuevas contrase\u00f1as para el acceso en l\u00ednea, el administrador de contrase\u00f1as puede ayudarte. Con la ayuda de un generador de contrase\u00f1as integrado en muchos programas, se pueden generar y almacenar en segundos nuevas y sobre todo complejas y por lo tanto seguras contrase\u00f1as. Las contrase\u00f1as demasiado f\u00e1ciles de elegir y por lo tanto inseguras son ahora cosa del pasado. Por cierto: ahora tambi\u00e9n hay aplicaciones especiales para tel\u00e9fonos inteligentes o incluso tabletas que permiten el acceso a bases de datos protegidas por contrase\u00f1a desde la carretera.<\/p>\n<h2>Una vida segura y f\u00e1cil con el administrador de contrase\u00f1as<\/h2>\n<p>A menudo es tambi\u00e9n una cuesti\u00f3n de conveniencia si se seleccionan contrase\u00f1as suficientemente seguras y si se cambian a intervalos regulares. La gente suele usar la misma contrase\u00f1a (simple e insegura) durante a\u00f1os. S\u00f3lo cuando esto sucede y la contrase\u00f1a se ha perdido por el correspondiente ataque de un hacker, el usuario se da cuenta de lo dif\u00edcil y laborioso que es cambiar todas las contrase\u00f1as para el acceso en l\u00ednea. Por supuesto, el uso de un administrador de contrase\u00f1as es un poco desconocido al principio, pero se convierte en algo natural relativamente r\u00e1pido. Los datos almacenados en la base de datos del administrador de contrase\u00f1as se mantienen siempre actualizados y se almacenan en forma codificada, ya sea el administrador de contrase\u00f1as del PC, de la computadora Mac o incluso de una aplicaci\u00f3n del tel\u00e9fono inteligente o del tablet. Por cierto, las bases de datos s\u00f3lo pueden recuperarse y descifrarse con dispositivos que hayan sido autorizados previamente para acceder a la base de datos. La transmisi\u00f3n de datos encriptados permite un alto nivel de seguridad tanto en casa como en los desplazamientos.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Um eine dauerhafte Sicherheit zu gew\u00e4hrleisten, sollten Sie stets komplexe und vor allem regelm\u00e4\u00dfig ver\u00e4nderte Passw\u00f6rter f\u00fcr E-Mail-Konten oder online Zug\u00e4nge verwenden. Viele Leute sind allerdings damit \u00fcberfordert, sich die Passw\u00f6rter alle zu merken. Ein Passwortmanager soll dieses Problem l\u00f6sen. Was machen Passwortmanager eigentlich? Passwortmanager dienen dazu, verschiedene Passw\u00f6rter und Zugangsdaten (beispielsweise f\u00fcr E-Mail-Konten oder [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[673,794],"tags":[],"class_list":["post-4408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer_und_internet","category-sicherheit-computer_und_internet"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"0","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":"","_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1640635868:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1640633798","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1640633788","rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4255","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"password-manager-bringing-order-into-password-chaos","_trp_automatically_translated_slug_lv":"password-manager-bringing-order-into-password-chaos","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"password-manager-bringinging-order-into-password-chaos","_trp_automatically_translated_slug_ja":"%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e7%ae%a1%e7%90%86%e8%80%85%e5%91%bd%e4%bb%a4%e3%82%a4%e3%83%b3%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%82%ab%e3%82%aa%e3%82%b9","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":"{{unknown}}","_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1640633778","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1640633780","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1640633781","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1640633781","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":"<iframe title=\"Firewall: Wie du die Web Application Firewall im Plesk Men\u00fc verwendest und deine Website sch\u00fctzt.\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CzAjqyJtEaw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_7ea3429961cf98fa85da9747683af827":"1640633757","_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"950","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":"7","rank_math_contentai_score":null,"ilj_limitincominglinks":"","ilj_maxincominglinks":"1","ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":"","ilj_linksperparagraph":"1","ilj_blacklistdefinition":[],"ilj_linkdefinition":["passwortmanager bringen ordnung ins passwortchaos"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"","_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"1258","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/4408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/comments?post=4408"}],"version-history":[{"count":1,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/4408\/revisions"}],"predecessor-version":[{"id":8115,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/4408\/revisions\/8115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media\/1258"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media?parent=4408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/categories?post=4408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/tags?post=4408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}