{"id":103688,"date":"2025-04-11T02:05:25","date_gmt":"2025-04-11T09:05:25","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103688"},"modified":"2025-04-12T18:06:37","modified_gmt":"2025-04-13T01:06:37","slug":"are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/","title":{"rendered":"Are file converter sites safe? How to convert files safely on your Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-103682 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-600x300-1.jpg\" alt=\"Illustration of uploading a document to a conversion site, depicting Dorothy cautiously handing a file to the Wizard of Oz\" width=\"600\" height=\"300\" \/><\/p>\n<p>At some point, you&#8217;ve likely encountered a file that just wouldn&#8217;t open. Perhaps someone made it with an app you don&#8217;t have. Or maybe you found a video that QuickTime won&#8217;t play.<\/p>\n<p>You might have also experienced situations where someone needs a file from you in a specific format; they don&#8217;t accept Microsoft Word docs or HEIC images, but only accept PDFs or JPEGs.<\/p>\n<p>When faced with such situations, you might turn to Google (or your preferred search engine) for help. Chances are that you&#8217;ll get a long list of sites that claim to be able to convert your file for you\u2014or that offer you an app that will supposedly convert it. But how do you know whether these sites are safe?<\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">There are many potential security and privacy concerns surrounding file converter sites. Let&#8217;s explore several reasons why you should exercise caution\u2014and why you may not even need to use such sites after all.<\/span><\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#fbi\">The FBI warns of online file converter scams<\/a><\/li>\n<li><a href=\"#sensitive-files\">Your files may contain sensitive, hidden data<\/a><\/li>\n<li><a href=\"#privacy-policy\">Does the site have a privacy policy?<\/a><\/li>\n<li><a href=\"#located\">Where are the site and its owner based?<\/a><\/li>\n<li><a href=\"#free-tools\">Can I easily convert files using free tools on my Mac?<\/a>\n<ul>\n<li><a href=\"#doc\">Document conversion<\/a><\/li>\n<li><a href=\"#img\">Image conversion<\/a><\/li>\n<li><a href=\"#vid\">Video conversion<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#safe-sites\">Are there any file conversion sites that are safe?<\/a><\/li>\n<li><a href=\"#think\">Always think carefully before uploading a file to any site<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"fbi\"><\/a><\/li>\n<\/ul>\n<h3>The FBI warns of online file converter scams<\/h3>\n<p>Last month, the FBI&#8217;s Denver Field Office issued a <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/denver\/news\/fbi-denver-warns-of-online-file-converter-scam\" target=\"_blank\" rel=\"noopener\">press release<\/a>, warning &#8220;that agents are increasingly seeing a scam involving free online document converter tools.&#8221; In some cases, these sites offer Trojan horse downloads\u2014malware, and even ransomware.<\/p>\n<p>The FBI says that such sites may also &#8220;scrape the submitted files&#8221; to extract sensitive data; this may include social security numbers, dates of birth, telephone numbers, banking information, cryptocurrency seed phrases, e-mail addresses, and passwords.<\/p>\n<p>If for some reason you&#8217;re skeptical of the FBI&#8217;s report, it has been corroborated by a noted threat intelligence researcher. In a <a href=\"https:\/\/x.com\/BushidoToken\/status\/1900507917276598317\" target=\"_blank\" rel=\"noopener\">thread<\/a> on X, Will Thomas shared specific <a href=\"https:\/\/x.com\/BushidoToken\/status\/1900608179760693664\" target=\"_blank\" rel=\"noopener\">examples<\/a> and <a href=\"https:\/\/x.com\/BushidoToken\/status\/1900608958253199611\" target=\"_blank\" rel=\"noopener\">screenshots<\/a> of alleged file converter sites that had been used to distribute malware.<\/p>\n<p>An FBI official <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-warnings-are-true-fake-file-converters-do-push-malware\/\" target=\"_blank\" rel=\"noopener\">told BleepingComputer<\/a> that &#8220;paid results&#8221; appearing in search engines often lead to such scams. This comes as no surprise to our research team at Intego; we&#8217;ve been reporting for years that poisoned Google Ads, in particular, are a common source of malware.<a name=\"sensitive-files\"><\/a><\/p>\n<h3>Your files may contain sensitive, hidden data<\/h3>\n<p>But what if you think you&#8217;ve found a site that looks safe? Should you trust that site with your file?<\/p>\n<p>Before uploading a file to any site, consider what data your file may contain. Are there any real people&#8217;s names or contact info? Are there any financial account details, or any other possibly sensitive or personally identifiable information within the file? If so, you probably shouldn&#8217;t send a copy of it to any unauthorized parties.<\/p>\n<p>In some cases, you might not care whether others can view your file, for example if it&#8217;s a school assignment or a mundane report for work. However, it&#8217;s important to know that documents may also contain hidden metadata that you may want to keep private.<\/p>\n<div id=\"attachment_94375\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-94375\" loading=\"lazy\" class=\"size-full wp-image-94375\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata.png\" alt=\"Microsoft Office Word author name and company metadata\" width=\"600\" height=\"621\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata.png 1238w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata-290x300.png 290w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata-989x1024.png 989w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata-145x150.png 145w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata-768x795.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/09\/Microsoft-Office-Word-author-name-company-metadata-657x680.png 657w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-94375\" class=\"wp-caption-text\">Microsoft Office documents contain hidden authorship metadata. Screenshot: Intego.<\/p><\/div>\n<p>Consider, for example, that Microsoft Word, Excel, and PowerPoint documents typically contain the full, real name of the original author of a document, along with the name of their employer. That may not necessarily be information you want to share with an untrusted site\u2014especially in combination with your work or home IP address, which is visible to every site you visit (unless you&#8217;re using a <a href=\"https:\/\/www.intego.com\/privacy-protection-vpn\">VPN<\/a>; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-should-connect-to-a-vpn-on-mac-and-ios-and-how-to\/\">learn more about how VPNs can protect your privacy<\/a>).<\/p>\n<p>Also consider that photos taken on an iPhone or Android smartphone may contain <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/geotagging\/\">hidden geolocation data<\/a>\u2014the GPS coordinates of where the picture was taken. This could inadvertently expose your home address to a file converter site.<\/p>\n<p>Even if you&#8217;re pretty certain that there&#8217;s nothing sensitive in your file, there&#8217;s more to consider before uploading it to a file conversion service.<a name=\"privacy-policy\"><\/a><\/p>\n<h3>Does the site have a privacy policy?<\/h3>\n<p>Some sites\u2014especially shady ones\u2014may not have a privacy policy. They may not even make any claims whatsoever about what they do with files submitted to their service. A privacy policy should answer questions such as the following.<\/p>\n<ul>\n<li><strong>Other than giving you a converted version, what does the site do with files you submit?<\/strong> Are submitted files stored in a way that enables the site&#8217;s owner to see their contents? If so, what does the site owner do, if anything, with any potentially sensitive or personally identifiable information? (Data such as e-mail addresses, telephone numbers, social security numbers, and credit card information can easily be identified and extracted from files; afterwards, it may be used for illegal purposes or sold on the black market.)<\/li>\n<li><strong>What is their deletion policy for uploaded files? Do they keep them permanently?<\/strong> The site shouldn&#8217;t keep a copy of your original document after providing you with the converted version. (The longer the file is retained, the more likely that some unauthorized party will be able to obtain access to your document.)<\/li>\n<li><strong>Are uploaded files deleted securely?<\/strong> &#8220;Deleting&#8221; a file typically leaves fragments of that file hidden on the drive. For optimal privacy, user-submitted files should ideally be overwritten (i.e. securely erased), not merely deleted.<\/li>\n<\/ul>\n<p>Of course, even if a site does have a privacy policy, you should still exercise caution. Don&#8217;t assume that the site operator will actually comply with every claim in their privacy policy.<a name=\"located\"><\/a><\/p>\n<h3>Where are the site and its owner based?<\/h3>\n<p>The geographical location of a server, or of the operator of a service, may also be worth considering. Some countries have laws or policies permitting the government to monitor all communications, or to compel a site owner to turn over all data that users submit to the site.<\/p>\n<p>Perhaps\u2014although it might seem conspiratorial\u2014the site may even be operated by a foreign intelligence agency or someone acting on their behalf. What easier way is there to collect a broad swath of documents than to invite people to upload anything in exchange for some perceived benefit?<\/p>\n<p>Alternatively, the site operator could be someone collecting data to sell on the black market. The location of the server and its operator are important here, too. Some countries turn a blind eye to cybercriminals who try to take advantage of foreigners. Even if you could prove that a site did something unethical with your data, that country&#8217;s law enforcement agencies may not be interested in punishing the site owner.<\/p>\n<p>You can use a site like <a href=\"https:\/\/www.ipvoid.com\/website-location-finder\/\" target=\"_blank\" rel=\"noopener\">IPVoid&#8217;s Website Location Finder<\/a> to help identify or confirm where a site&#8217;s server is hosted.<a name=\"free-tools\"><\/a><\/p>\n<h3>Can I easily convert files using free tools on my Mac?<\/h3>\n<p><a name=\"docs\"><\/a>Macs actually come with several built-in ways to convert files from one format to another. Additionally, several popular third-party Mac apps can do still more conversions for free.<\/p>\n<h4><strong>Document conversion<\/strong><\/h4>\n<p>Apple&#8217;s iWork apps (<strong>Pages<\/strong>, <strong>Numbers<\/strong>, and <strong>Keynote<\/strong>) come free with Macs; you can re-download them from the App Store if you don&#8217;t have them in your Applications folder.<\/p>\n<p>Since these apps are Apple&#8217;s equivalent to Microsoft Word, Excel, and PowerPoint, respectively, it&#8217;s no surprise that Apple lets you open and export to those formats. Each app also has its own unique export options:<\/p>\n<ul>\n<li>Pages can also export to EPUB, plain text (TXT), and Rich Text Format (RTF).<\/li>\n<li>Numbers can also export to Comma-Separated Values (CSV) and Tab-Separated Values (TSV).<\/li>\n<li>Keynote can also export to a movie file, an animated GIF, and even to an HTML page.<\/li>\n<\/ul>\n<p><a name=\"img\"><\/a>Any Apple app that handles files will allow you to export to PDF. If you don&#8217;t see a menu option to Export as PDF, you can alternatively go to File &gt; Print\u2026 and look for the &#8220;PDF&#8221; drop-down menu near the bottom-left corner of the print dialog.<\/p>\n<h4><strong>Image conversion<\/strong><\/h4>\n<p>Most common image file formats will open in <strong>Apple&#8217;s Preview app<\/strong>, which comes with every Mac. After opening a file, click on File &gt; Export\u2026 and you&#8217;ll see a Format menu. From there, you can select HEIC, JPEG, JPEG-2000, OpenEXR, PDF, PNG, and TIFF.<\/p>\n<p>If you find an image file that Preview won&#8217;t open, or if you need to export to another format besides those listed above, try <a href=\"https:\/\/www.gimp.org\/downloads\/\" target=\"_blank\" rel=\"noopener\">GIMP<\/a> instead.<a name=\"vid\"><\/a> <strong>GIMP<\/strong> (short for GNU Image Manipulation Program) is a free, open-source app that&#8217;s similar to Adobe Photoshop. It offers a plethora of image import and export formats; it will most likely be able to handle any format you desire.<\/p>\n<h4><strong>Video conversion<\/strong><\/h4>\n<p>If you&#8217;re looking for a video file converter specifically because QuickTime Player won&#8217;t open a file, consider trying a different player app, like <a href=\"https:\/\/www.videolan.org\/\" target=\"_blank\" rel=\"noopener\">VLC<\/a>, rather than a converter. <strong>VLC Media Player<\/strong> is a free, open-source multimedia player app that opens a wide variety of video and audio file formats. Via the File &gt; Convert\/Stream\u2026 menu option, it can even convert files into WEBM, TS, OGG, ASF, FLAC, and WAV (&#8220;CD&#8221;) formats.<\/p>\n<p>But if you really need a video file format converter, <a href=\"https:\/\/handbrake.fr\/\" target=\"_blank\" rel=\"noopener\">Handbrake<\/a> is likely your best option. <strong>Handbrake<\/strong> is a free, open-source video transcoder that can convert videos from &#8220;nearly any format.&#8221; It takes time (and a lot of CPU power) to convert large video files, but Handbrake works like a charm. It has a ton of advanced features and customization options for pros, too.<a name=\"safe-sites\"><\/a><\/p>\n<h3>Are there any file conversion sites that are safe?<\/h3>\n<p>There are a handful of file converter sites run by well-known companies, such as the following:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.adobe.com\/acrobat\/online\/convert-pdf.html\" target=\"_blank\" rel=\"noopener\"><strong>Adobe Acrobat PDF converter<\/strong><\/a> lets you upload a Microsoft Excel, Word, PowerPoint, or image file, and save it as a PDF. (Although the page doesn&#8217;t explicitly say so, it will also let you upload Adobe Illustrator .ai, Adobe InDesign .indd, Adobe Photoshop .psd, and Formlabs .form files.)<\/li>\n<li><a href=\"https:\/\/www.canva.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Canva<\/strong><\/a> offers a number of online converter tools, including: <a href=\"https:\/\/www.canva.com\/features\/pdf-converter\/\" target=\"_blank\" rel=\"noopener\">PDF to JPG\/PNG\/PowerPoint<\/a>; <a href=\"https:\/\/www.canva.com\/features\/image-converter\/\" target=\"_blank\" rel=\"noopener\">HEIC\/HEIF\/WEBP\/SVG Image to JPG\/PNG<\/a>; and\u00a0<a href=\"https:\/\/www.canva.com\/features\/mp4-converter\/\" target=\"_blank\" rel=\"noopener\">Video to MP4\/GIF<\/a>.<\/li>\n<\/ul>\n<p>Note that you may need to create an account to use these sites or some of their features. And remember: even though these are established businesses, it&#8217;s still a good idea to browse their privacy policy before you upload anything.<a name=\"think\"><\/a><\/p>\n<h3>Always think carefully before uploading a file to any site<\/h3>\n<p>Even when you upload a file to a site with a good reputation, it&#8217;s wise to think carefully first.<\/p>\n<p>For example, consider that even VirusTotal, a legitimate site for scanning individual files for malware, encourages caution when deciding whether to upload a file to its service. When you upload files to VirusTotal, antivirus companies and members of the security community may be able to download copies of those files. Users of the site sometimes inadvertently submit files that contain confidential or sensitive data. Thankfully, VirusTotal has a <a href=\"https:\/\/docs.virustotal.com\/docs\/accidental-upload\" target=\"_blank\" rel=\"noopener\">process<\/a> to request removal of sensitive data, but many online services are not so aware or accommodating.<\/p>\n<p>If you&#8217;re looking for file converters online, remember: just because a page is listed near the top of a search results page <strong><em>doesn&#8217;t<\/em><\/strong> mean that the site is legitimate or safe. Threat actors often buy Google Ads disguised as legitimate sites just to leap to the top of Google Search results. And malicious sites can even make it to the front page of search results through search-engine manipulation.<\/p>\n<p>Ultimately, it&#8217;s up to you whether to trust a site with your files. Before uploading, think about the potential sensitivity of any info or metadata in the file, consider whether the site is reputable, and peruse their privacy policy.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We discussed the FBI&#8217;s report about file conversion scams on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/rcs-fbi-and-alexa-intego-mac-podcast-episode-388\/\">episode 388<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a>.<\/p>\n<p><iframe style=\"width: 100%; max-width: 660px; overflow: hidden; border-radius: 10px;\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/episode-388-rcs-fbi-and-alexa\/id1293834627?i=1000700083786\" height=\"175\" frameborder=\"0\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\"><\/iframe><\/p>\n<p>For more information about a similar scam\u2014file corruption sites\u2014see our related article: &#8220;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/are-corrupt-my-file-sites-safe-heres-why-to-avoid-corrupt-a-file-services\/\">Are &#8220;corrupt my file&#8221; sites safe? Here&#8217;s why to avoid corrupt-a-file services<\/a>&#8221;<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"s52FEojG5W\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/are-corrupt-my-file-sites-safe-heres-why-to-avoid-corrupt-a-file-services\/\">Are &#8220;corrupt my file&#8221; sites safe? Here&#8217;s why to avoid corrupt-a-file services<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Are &#8220;corrupt my file&#8221; sites safe? Here&#8217;s why to avoid corrupt-a-file services&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/are-corrupt-my-file-sites-safe-heres-why-to-avoid-corrupt-a-file-services\/embed\/#?secret=s52FEojG5W\" data-secret=\"s52FEojG5W\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>File converter sites claim to solve a common problem\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\u2019t need to worry about such scam sites.<\/p>\n","protected":false},"author":14,"featured_media":103686,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4039,106,116],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"File converter sites claim to solve a common problem\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\u2019t need to worry about such scam sites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are file converter sites safe? How to convert files safely on your Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"File converter sites claim to solve a common problem\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\u2019t need to worry about such scam sites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-11T09:05:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-13T01:06:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Dorothy handing a file to an evil Wizard of Oz man behind the curtain document converter conversion site safety dangers\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/\",\"name\":\"Are file converter sites safe? How to convert files safely on your Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#primaryimage\"},\"datePublished\":\"2025-04-11T09:05:25+00:00\",\"dateModified\":\"2025-04-13T01:06:37+00:00\",\"description\":\"File converter sites claim to solve a common problem\\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\\u2019t need to worry about such scam sites.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are file converter sites safe? How to convert files safely on your Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Are file converter sites safe? How to convert files safely on your Mac\",\"datePublished\":\"2025-04-11T09:05:25+00:00\",\"dateModified\":\"2025-04-13T01:06:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#webpage\"},\"wordCount\":2083,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg\",\"keywords\":[\"Online Scams\",\"Privacy\",\"Scam\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"File converter sites claim to solve a common problem\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\u2019t need to worry about such scam sites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/","og_locale":"en_US","og_type":"article","og_title":"Are file converter sites safe? How to convert files safely on your Mac - The Mac Security Blog","og_description":"File converter sites claim to solve a common problem\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\u2019t need to worry about such scam sites.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-04-11T09:05:25+00:00","article_modified_time":"2025-04-13T01:06:37+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg","width":400,"height":260,"caption":"Dorothy handing a file to an evil Wizard of Oz man behind the curtain document converter conversion site safety dangers"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/","name":"Are file converter sites safe? How to convert files safely on your Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#primaryimage"},"datePublished":"2025-04-11T09:05:25+00:00","dateModified":"2025-04-13T01:06:37+00:00","description":"File converter sites claim to solve a common problem\u2014but some may steal sensitive information, or may even infect your computer with malware. Here is everything you need to know about how to convert files safely on a Mac so you don\u2019t need to worry about such scam sites.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Are file converter sites safe? How to convert files safely on your Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Are file converter sites safe? How to convert files safely on your Mac","datePublished":"2025-04-11T09:05:25+00:00","dateModified":"2025-04-13T01:06:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#webpage"},"wordCount":2083,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg","keywords":["Online Scams","Privacy","Scam"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/are-file-converter-sites-safe-how-to-convert-files-safely-on-your-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/Dorothy-handing-file-to-evil-Wizard-of-Oz-document-converter-site-safety-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qYo","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103688"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103688"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103688\/revisions"}],"predecessor-version":[{"id":103750,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103688\/revisions\/103750"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/103686"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}