{"id":38191,"date":"2014-07-17T09:32:24","date_gmt":"2014-07-17T08:32:24","guid":{"rendered":"https:\/\/loopup.com\/resource-center\/\/conference-call-security-visibility\/"},"modified":"2019-03-20T16:13:10","modified_gmt":"2019-03-20T16:13:10","slug":"conference-call-security-visibility","status":"publish","type":"post","link":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-visibility\/","title":{"rendered":"Conference Call Security: Why Visibility is Crucial"},"content":{"rendered":"<p>Conference calls are an everyday activity, with sensitive information frequently shared on them.&nbsp; Despite this, conference call security is typically not given much thought.&nbsp; And yet, in a survey of business professionals who regularly host conference calls, over 40% of respondents admitted that they don\u2019t always know who is on the line (Source: Zogby, 2012). It\u2019s worth noting that these figures only reflect the number of people who admit to this fact; the number is likely much higher.<\/p>\n<p>If you\u2019re one of the many who have conference calls without always knowing who\u2019s on, then you\u2019re unwittingly exposing yourself to unnecessary business risk.&nbsp; Read on to discover why visibility is crucial to conference call security.<\/p>\n<h2>A typical conference call without visibility<\/h2>\n<p>Today, the default conference call experience is the \u2018reservationless\u2019 model, where users have access to a conferencing bridge that is available to them 24\/7.&nbsp; Generally call leaders send out conference invitations to participants, which usually include dial-in numbers and a participant code.&nbsp; Anyone with access to these details is able to join the call in question.&nbsp; Without some form of visibility, the conference call will be a rather black box experience as people join conference calls without knowing exactly who else is on the call.&nbsp; This is the source of the familiar conference call refrain: a \u2018badoop\u2019 followed by \u201cwho just joined?\u201d&nbsp; It\u2019s not always clear what these sounds relate to &#8211; it could be someone joining or someone leaving &#8211; or, more importantly, <i>who<\/i> they relate to.&nbsp; Not knowing who\u2019s on and who\u2019s speaking makes conference calls frustrating, but it also means they\u2019re not secure as you don\u2019t know for sure whether someone is listening in who shouldn\u2019t be there.<\/p>\n<p>This is the equivalent of walking into a meeting room blindfolded and presenting confidential information &#8211; you simply wouldn\u2019t do that in normal circumstances, so why do it over the phone?<\/p>\n<h2>A high-profile example<\/h2>\n<p><a title=\"Anonymous eavesdrops on call between FBI and Scotland Yard\" href=\"http:\/\/www.guardian.co.uk\/technology\/2012\/feb\/03\/anonymous-hacks-call-fbi-scotland-yard\" target=\"_blank\" rel=\"noopener noreferrer\">One notable case of conference call snooping<\/a> took place in February 2012: members of the hacking group \u2018Anonymous\u2019 intercepted emails containing the dial-in details for a recurring conference call between the FBI and Scotland Yard, to discuss an international cybercrime investigation. The hackers dialed in to the FBI and Scotland Yard call undetected, recorded it and then uploaded the recordings online. In doing so, they exposed the security breach that had taken place. Because of the lack of visibility on these calls, the conference call crashers could have continued to join these recurring meetings without the other participants knowing, had they not chosen to reveal themselves.<\/p>\n<p>This shows that even extremely security-conscious organizations are vulnerable to this risk, but the same rule applies to anyone without conference call visibility.&nbsp; A common example is the case of back-to-back meetings.&nbsp; If you schedule one meeting immediately after another on the same line, there\u2019s a strong chance that at some point you\u2019ll have participants on the line who shouldn\u2019t be there &#8211; and without visibility, you won\u2019t know about it.<\/p>\n<h2>What does visibility mean?<\/h2>\n<p>It\u2019s clear that visibility is essential for secure conference calls, but what does it actually entail?&nbsp; For a start, it should allow everyone &#8211; or, at least, the call leader &#8211; to see who joins and leaves a call in <i>real-time<\/i>, without needing to interrupt the meeting to ask \u2018Who just joined?\u2019<\/p>\n<p>Visibility on its own isn\u2019t enough, though; a premium should be placed on services that are <i>easy to use<\/i>, because if it isn\u2019t easy to use, it won\u2019t get used, and therefore you won\u2019t actually realize the value of this visibility.<\/p>\n<p>So, the answer is to find a solution that employs technology but presents this in a naturally discoverable way so that users are led towards this information.&nbsp; Look for solutions that are designed to be effortless with no training required upon setup and no IT support needed to get the benefits. Solutions that utilize an intuitive approach can thus ensure that you know who\u2019s on the call (and who\u2019s not supposed to be).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conference calls are an everyday activity, with sensitive information frequently shared on them.&nbsp; Despite this, conference call security is typically not given much thought.&nbsp; And yet, in a survey of&#8230;<\/p>\n","protected":false},"author":4,"featured_media":38192,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[424],"tags":[36,37],"class_list":["post-38191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","tag-visibility"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.2 (Yoast SEO v25.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Conference Call Security: Why Visibility is Crucial | LoopUp<\/title>\n<meta name=\"description\" content=\"If you don&#039;t always know who\u2019s on your calls, you\u2019re exposing yourself to unnecessary risk. Discover why visibility is crucial to conference call security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conference Call Security: Why Visibility is Crucial\" \/>\n<meta property=\"og:description\" content=\"If you don&#039;t always know who\u2019s on your calls, you\u2019re exposing yourself to unnecessary risk. Discover why visibility is crucial to conference call security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\" \/>\n<meta property=\"og:site_name\" content=\"LoopUp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LoopUp\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-17T08:32:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-20T16:13:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Catriona Balfour\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@catrionabalfour\" \/>\n<meta name=\"twitter:site\" content=\"@LoopUp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Catriona Balfour\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\"},\"author\":{\"name\":\"Catriona Balfour\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a\"},\"headline\":\"Conference Call Security: Why Visibility is Crucial\",\"datePublished\":\"2014-07-17T08:32:24+00:00\",\"dateModified\":\"2019-03-20T16:13:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\"},\"wordCount\":701,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/loopup.com\/us\/#organization\"},\"image\":{\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png\",\"keywords\":[\"security\",\"visibility\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\",\"url\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\",\"name\":\"Conference Call Security: Why Visibility is Crucial | LoopUp\",\"isPartOf\":{\"@id\":\"https:\/\/loopup.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png\",\"datePublished\":\"2014-07-17T08:32:24+00:00\",\"dateModified\":\"2019-03-20T16:13:10+00:00\",\"description\":\"If you don't always know who\u2019s on your calls, you\u2019re exposing yourself to unnecessary risk. Discover why visibility is crucial to conference call security.\",\"breadcrumb\":{\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage\",\"url\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png\",\"contentUrl\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png\",\"width\":625,\"height\":320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/loopup.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/loopup.com\/zh-hant\/resource-type\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Conference Call Security: Why Visibility is Crucial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/loopup.com\/us\/#website\",\"url\":\"https:\/\/loopup.com\/us\/\",\"name\":\"LoopUp\",\"description\":\"Simplify your world, Consolidate your multinational Teams telephony globally.\",\"publisher\":{\"@id\":\"https:\/\/loopup.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/loopup.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/loopup.com\/us\/#organization\",\"name\":\"LoopUp\",\"url\":\"https:\/\/loopup.com\/us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png\",\"contentUrl\":\"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png\",\"width\":200,\"height\":200,\"caption\":\"LoopUp\"},\"image\":{\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LoopUp\",\"https:\/\/x.com\/LoopUp\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a\",\"name\":\"Catriona Balfour\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g\",\"caption\":\"Catriona Balfour\"},\"description\":\"Catriona Balfour is a Senior Product Manager at LoopUp, based in San Francisco.\",\"sameAs\":[\"http:\/\/uk.linkedin.com\/in\/catrionabalfour\/\",\"https:\/\/x.com\/catrionabalfour\"],\"url\":\"https:\/\/loopup.com\/us\/resource-center\/author\/luteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conference Call Security: Why Visibility is Crucial | LoopUp","description":"If you don't always know who\u2019s on your calls, you\u2019re exposing yourself to unnecessary risk. Discover why visibility is crucial to conference call security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/","og_locale":"en_US","og_type":"article","og_title":"Conference Call Security: Why Visibility is Crucial","og_description":"If you don't always know who\u2019s on your calls, you\u2019re exposing yourself to unnecessary risk. Discover why visibility is crucial to conference call security.","og_url":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/","og_site_name":"LoopUp","article_publisher":"https:\/\/www.facebook.com\/LoopUp","article_published_time":"2014-07-17T08:32:24+00:00","article_modified_time":"2019-03-20T16:13:10+00:00","og_image":[{"width":625,"height":320,"url":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png","type":"image\/png"}],"author":"Catriona Balfour","twitter_card":"summary_large_image","twitter_creator":"@catrionabalfour","twitter_site":"@LoopUp","twitter_misc":{"Written by":"Catriona Balfour","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#article","isPartOf":{"@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/"},"author":{"name":"Catriona Balfour","@id":"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a"},"headline":"Conference Call Security: Why Visibility is Crucial","datePublished":"2014-07-17T08:32:24+00:00","dateModified":"2019-03-20T16:13:10+00:00","mainEntityOfPage":{"@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/"},"wordCount":701,"commentCount":0,"publisher":{"@id":"https:\/\/loopup.com\/us\/#organization"},"image":{"@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png","keywords":["security","visibility"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/","url":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/","name":"Conference Call Security: Why Visibility is Crucial | LoopUp","isPartOf":{"@id":"https:\/\/loopup.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage"},"image":{"@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png","datePublished":"2014-07-17T08:32:24+00:00","dateModified":"2019-03-20T16:13:10+00:00","description":"If you don't always know who\u2019s on your calls, you\u2019re exposing yourself to unnecessary risk. Discover why visibility is crucial to conference call security.","breadcrumb":{"@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#primaryimage","url":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png","contentUrl":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/security.png","width":625,"height":320},{"@type":"BreadcrumbList","@id":"https:\/\/loopup.com\/zh-hant\/resource-center\/blog\/conference-call-security-visibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/loopup.com\/us\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/loopup.com\/zh-hant\/resource-type\/blog\/"},{"@type":"ListItem","position":3,"name":"Conference Call Security: Why Visibility is Crucial"}]},{"@type":"WebSite","@id":"https:\/\/loopup.com\/us\/#website","url":"https:\/\/loopup.com\/us\/","name":"LoopUp","description":"Simplify your world, Consolidate your multinational Teams telephony globally.","publisher":{"@id":"https:\/\/loopup.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/loopup.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/loopup.com\/us\/#organization","name":"LoopUp","url":"https:\/\/loopup.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png","contentUrl":"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png","width":200,"height":200,"caption":"LoopUp"},"image":{"@id":"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LoopUp","https:\/\/x.com\/LoopUp"]},{"@type":"Person","@id":"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a","name":"Catriona Balfour","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/loopup.com\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g","caption":"Catriona Balfour"},"description":"Catriona Balfour is a Senior Product Manager at LoopUp, based in San Francisco.","sameAs":["http:\/\/uk.linkedin.com\/in\/catrionabalfour\/","https:\/\/x.com\/catrionabalfour"],"url":"https:\/\/loopup.com\/us\/resource-center\/author\/luteam\/"}]}},"_links":{"self":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/posts\/38191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/comments?post=38191"}],"version-history":[{"count":0,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/posts\/38191\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/media\/38192"}],"wp:attachment":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/media?parent=38191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/categories?post=38191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/tags?post=38191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}