{"id":5704,"date":"2017-05-24T12:08:33","date_gmt":"2017-05-24T18:08:33","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=5704"},"modified":"2017-05-24T12:08:33","modified_gmt":"2017-05-24T18:08:33","slug":"los-subtitulos-podrian-hackear-tu-computador","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/","title":{"rendered":"Los subt\u00edtulos podr\u00edan hackear tu computador"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Una investigaci\u00f3n realizada por\u00a0<a href=\"http:\/\/blog.checkpoint.com\/2017\/05\/23\/hacked-in-translation\/\">Checkpoint<\/a>\u00a0determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares<!--more-->, como Kodi y Popcorn Time, las cuales permiten\u00a0controlar de manera absoluta el dispositivo a distancia utilizando un archivo de subt\u00edtulo malicioso.<\/p>\n<p>&nbsp;<\/p>\n<p><center><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/vYT_EGty_6A\" width=\"500\" height=\"300\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/center><center><\/center>Seg\u00fan el sitio, la causa de esta falla radica en la multiplicidad de formatos disponibles para este tipo de textos, adem\u00e1s de las casi nulas medidas de seguridad que tienen los programas de este tipo, ya que pocos esperar\u00edamos ser afectados por medio de esta clase de software en nuestros computadores.<\/p>\n<p>Si bien todo lo anterior ya es bastante grave, es necesario resaltar que\u00a0los reproductores tambi\u00e9n podr\u00edan poner en peligro todos los aparatos en donde est\u00e9n instalados, incluyendo televisores inteligentes, tablets y tel\u00e9fonos.<\/p>\n<p>No obstante lo anterior, los desarrolladores ya est\u00e1n en conocimiento de esta falla, por lo que son varias las empresas que se encuentran arreglando este error. Entre ellas podemos mencionar a\u00a0<a href=\"http:\/\/get.videolan.org\/vlc\/2.2.5.1\/win32\/vlc-2.2.5.1-win32.exe\">VLC<\/a>\u00a0y\u00a0<a href=\"https:\/\/www.strem.io\/\">Strem.io<\/a>, quienes ya arreglaron dicha brecha, sin embargo\u00a0Kodi y Popcorn Time a\u00fan son vulnerables, a pesar de que est\u00e9n desarrollando una soluci\u00f3n.<\/p>\n<p>En el video destacado podemos observar de manera bastante did\u00e1ctica c\u00f3mo es que funciona este exploit, sin embargo, se hace necesario llamar a\u00a0actualizar estos programas para no ser afectados por esta enorme falla de seguridad.<\/p>\n<p><strong>Fuente:<\/strong> FayerWayer<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Una investigaci\u00f3n realizada por\u00a0Checkpoint\u00a0determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares<\/p>\n","protected":false},"author":1,"featured_media":5705,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Los subt\u00edtulos podr\u00edan hackear tu computador - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"description\" content=\"Una investigaci\u00f3n realizada por Checkpoint determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los subt\u00edtulos podr\u00edan hackear tu computador - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Una investigaci\u00f3n realizada por Checkpoint determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-24T18:08:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Los subt\u00edtulos podr\u00edan hackear tu computador\",\"datePublished\":\"2017-05-24T18:08:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\"},\"wordCount\":243,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\",\"name\":\"Los subt\u00edtulos podr\u00edan hackear tu computador - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png\",\"datePublished\":\"2017-05-24T18:08:33+00:00\",\"description\":\"Una investigaci\u00f3n realizada por Checkpoint determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png\",\"width\":600,\"height\":375},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los subt\u00edtulos podr\u00edan hackear tu computador\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los subt\u00edtulos podr\u00edan hackear tu computador - Observatorio Tecnol\u00f3gico de Hidalgo","description":"Una investigaci\u00f3n realizada por Checkpoint determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/","og_locale":"en_US","og_type":"article","og_title":"Los subt\u00edtulos podr\u00edan hackear tu computador - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Una investigaci\u00f3n realizada por Checkpoint determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2017-05-24T18:08:33+00:00","og_image":[{"width":600,"height":375,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Los subt\u00edtulos podr\u00edan hackear tu computador","datePublished":"2017-05-24T18:08:33+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/"},"wordCount":243,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png","articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/","name":"Los subt\u00edtulos podr\u00edan hackear tu computador - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png","datePublished":"2017-05-24T18:08:33+00:00","description":"Una investigaci\u00f3n realizada por Checkpoint determin\u00f3 que existen vulnerabilidades graves en distintos reproductores de video bastante populares","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2017\/05\/hacking.png","width":600,"height":375},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/los-subtitulos-podrian-hackear-tu-computador\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Los subt\u00edtulos podr\u00edan hackear tu computador"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/5704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=5704"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/5704\/revisions"}],"predecessor-version":[{"id":5706,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/5704\/revisions\/5706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/5705"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=5704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=5704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=5704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}