{"id":4834,"date":"2015-11-03T14:44:41","date_gmt":"2015-11-03T17:44:41","guid":{"rendered":"https:\/\/ostec.blog\/generico\/proxy-web-categorias"},"modified":"2020-08-27T14:42:27","modified_gmt":"2020-08-27T17:42:27","slug":"web-proxy-categorization","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/","title":{"rendered":"Web Proxy: Essentials on content categorization"},"content":{"rendered":"<p>[rev_slider alias=&#8221;ebook-filtro-web-360&#215;280&#8243;][\/rev_slider]\u00a0The internet presents a growing variety of websites, covering a multitude of contents for audiences with differentiated consumption needs. This feature makes the Internet a very rich environment, helping users to form concepts and obtain information, more efficiently. In contrast, the breadth of websites distributed in the network presents a representative challenge regarding the control of user accesses, especially in corporate environments.<\/p>\n<p>Most companies adopt measures to control employees&#8217; accesses, including the establishment of Internet use policies and logical control mechanisms, with the objective of guaranteeing employee productivity and the safety of the company&#8217;s assets. Thus, content categorization control appears as a way to facilitate the construction and maintenance of access rules, based on categorized websites, allowing administrators to more efficiently control user access.<\/p>\n<p>In this post, you will have access to relevant content categorization information, and how this can improve the effectiveness of security policies, applied in enterprise environments. Keep reading!<\/p>\n<h2>What are categories and how do they work?<\/h2>\n<p>Categories are common sets of URLs that offer the same content type, and because of that, they are represented in a unique way. For example, an entertainment category has a set of websites whose content reflects its description or purpose.<\/p>\n<p>There are a few billion websites on the internet, because of this, categorization offers a faster and much safer way for managing internet access policies. These bases are maintained by specialized companies and updated very frequently.<\/p>\n<p>Beware of free databases; there is usually a high incidence of false positives that, depending on the size of the structure, it becomes unfeasible to use. A good database should not only have many websites, but they should be very well classified.<\/p>\n<p>Due to the number of international websites with content offered in different languages, the more internationalized the database, the more security for companies, since a certain category will not only reflect content of a country.<\/p>\n<p>The dynamic categorization of URLs is based on a database of billions of websites, duly classified by specialized companies, enabling the easy management of access, ensuring protection against threats and adherence to the policies of use of the internet resource. Thousands of URLs have already been categorized, and new websites are ranked in real time, generating daily updates in the category base, automatically. The most traditional categories adopted in companies are games, social networks and adult content, among others. There are, however, several other possibilities defined based on the needs of each business.<\/p>\n<h2>Web proxy with category-based control<\/h2>\n<h3>Safety<\/h3>\n<p>The use of rules based on categories brings greater effectiveness in controlling access to websites, since there are categories of URLs associated with spyware, phishing, keylogging, and distribution of viruses. It is worth mentioning that the manual maintenance of access lists, contemplating URLs with these characteristics, in order to use them in the web proxy, is an inefficient form of control of the accesses in a corporate environment, being little feasible its application in most of the businesses.<\/p>\n<h3>Efficiency<\/h3>\n<p>The use of categories in the construction of navigation control rules makes the configuration process much more efficient, reducing coverage failures and minimizing the time invested by the IT analyst in structuring and maintaining them. Investments in the acquisition of solutions, focused on categorization, are quickly justified, through the benefits provided by the solution.<\/p>\n<h3>Content inappropriate or harmful to the corporate environment<\/h3>\n<p>The policies of access to websites, usually adopted by companies, besides addressing concepts of productivity and security are aimed at formalizing content not appropriate or compatible with the work environment. The categorization of URLs also helps in the process of adherence to this demand, allowing restriction of access to websites related to adult content, drugs, games, political organizations and others.<\/p>\n<h3>Control over social media<\/h3>\n<p>Recent research proves the loss of productivity associated with uncontrolled use of social media such as Facebook, Twitter, Linkedin and Youtube, during work hours. The access control by categories is a great ally to control these accesses, allowing the definition of personalized rules of access, based on sectors and schedules, guaranteeing full adherence to the access policies adopted by the company.<\/p>\n<h2>Custom Policies<\/h2>\n<p>The control performed from categories does not detract from the administrator&#8217;s flexibility and the ability to work with lists and generate exceptions in groups of websites. Thus, content categorization allows additional URLs to be added to build access rules in line with business needs.<\/p>\n<h2>Categorizing URLs for increased efficiency and safety<\/h2>\n<p>As discussed in the previous paragraphs, manually creating access policies based on rules that use lists created manually by IT staff members, is somewhat inefficient and insecure, depending on the level of safety required by the business. In this sense, the control based on categories adds a fundamental layer of security, allowing it to manage in a more assertive way the accesses to the internet. It is worth mentioning the importance of paying attention to the free and public databases used in URL categorization engines, which are usually limited and generate a false sense of security. As a rule of thumb, companies should look for specialized vendors who offer up-to-date solutions, enhancing the company&#8217;s expertise in security concepts.<\/p>\n<p>Do you know the concept of content categorization based on URLs? Share your experiences with us in the comments!<\/p>\n<p>[rev_slider alias=&#8221;hor-ebook-filtro-conteudo-web&#8221;][\/rev_slider]<\/p>\n<h2>Keep reading<\/h2>\n<p>[latest_post type=&#8217;boxes&#8217; number_of_posts=&#8217;3&#8242; number_of_colums=&#8217;3&#8242; order_by=&#8217;date&#8217; order=&#8217;ASC&#8217; category=&#8217;problem-recognition&#8217; text_length=&#8217;100&#8242; title_tag=&#8217;h4&#8242; display_category=&#8217;0&#8242; display_time=&#8217;0&#8242; display_comments=&#8217;0&#8242; display_like=&#8217;0&#8242; display_share=&#8217;0&#8242;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[rev_slider alias=&#8221;ebook-filtro-web-360&#215;280&#8243;][\/rev_slider]\u00a0The internet presents a growing variety of websites, covering a multitude of contents for audiences with differentiated consumption needs. This feature makes the Internet a very rich environment, helping users to form concepts and obtain information, more efficiently. In contrast, the breadth of websites distributed in the network presents a representative challenge regarding the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12746,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[988,991,992,411],"tags":[1495,1639],"class_list":["post-4834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-loss-or-leakage","category-internet-productivity","category-learning-and-discovery","category-perimeter","tag-categorizacao-de-conteudo-en","tag-proxy-web-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web Proxy: Essentials on content categorization - OSTEC Blog<\/title>\n<meta name=\"description\" content=\"In this post you will have access to information on content categorization, using proxy web categories, and how this can improve the efficiency of your team\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Proxy: Essentials on content categorization - OSTEC Blog\" \/>\n<meta property=\"og:description\" content=\"In this post you will have access to information on content categorization, using proxy web categories, and how this can improve the efficiency of your team\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-03T17:44:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-27T17:42:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"Web Proxy: Essentials on content categorization\",\"datePublished\":\"2015-11-03T17:44:41+00:00\",\"dateModified\":\"2020-08-27T17:42:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\"},\"wordCount\":938,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg\",\"keywords\":[\"categorizacao de conteudo\",\"proxy web\"],\"articleSection\":[\"Information loss or leakage\",\"Internet productivity\",\"Learning and discovery\",\"Perimeter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\",\"name\":\"Web Proxy: Essentials on content categorization - OSTEC Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg\",\"datePublished\":\"2015-11-03T17:44:41+00:00\",\"dateModified\":\"2020-08-27T17:42:27+00:00\",\"description\":\"In this post you will have access to information on content categorization, using proxy web categories, and how this can improve the efficiency of your team\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg\",\"width\":928,\"height\":534,\"caption\":\"Cabos conectados em um modem\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Proxy: Essentials on content categorization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Proxy: Essentials on content categorization - OSTEC Blog","description":"In this post you will have access to information on content categorization, using proxy web categories, and how this can improve the efficiency of your team","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/","og_locale":"en_US","og_type":"article","og_title":"Web Proxy: Essentials on content categorization - OSTEC Blog","og_description":"In this post you will have access to information on content categorization, using proxy web categories, and how this can improve the efficiency of your team","og_url":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2015-11-03T17:44:41+00:00","article_modified_time":"2020-08-27T17:42:27+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"Web Proxy: Essentials on content categorization","datePublished":"2015-11-03T17:44:41+00:00","dateModified":"2020-08-27T17:42:27+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/"},"wordCount":938,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg","keywords":["categorizacao de conteudo","proxy web"],"articleSection":["Information loss or leakage","Internet productivity","Learning and discovery","Perimeter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/","url":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/","name":"Web Proxy: Essentials on content categorization - OSTEC Blog","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg","datePublished":"2015-11-03T17:44:41+00:00","dateModified":"2020-08-27T17:42:27+00:00","description":"In this post you will have access to information on content categorization, using proxy web categories, and how this can improve the efficiency of your team","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/11\/Cabos-conectados.jpg","width":928,"height":534,"caption":"Cabos conectados em um modem"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/web-proxy-categorization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Web Proxy: Essentials on content categorization"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/4834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=4834"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/4834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12746"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=4834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=4834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=4834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}