	{"id":16915,"date":"2013-08-15T12:26:09","date_gmt":"2013-08-15T19:26:09","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16915"},"modified":"2017-11-22T11:36:19","modified_gmt":"2017-11-22T19:36:19","slug":"should-you-worry-about-people-hacking-toilets","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/","title":{"rendered":"Should You Worry About People Hacking Toilets?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16925\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.jpg\" alt=\"Hack-Toilet\" width=\"500\" height=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet-300x300.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>This has been an interesting month, with news about hacking a variety of unusual things. People have hacked <a href=\"http:\/\/www.techhive.com\/article\/2045895\/researchers-reveal-methods-behind-car-hack-at-defcon.html\" target=\"_blank\">cars<\/a>, <a href=\"http:\/\/www.dnaindia.com\/scitech\/1874911\/report-now-even-smartphone-controlled-light-bulbs-can-be-hacked\" target=\"_blank\">light bulbs<\/a>, <a href=\"http:\/\/www.usatoday.com\/story\/tech\/2013\/08\/06\/smart-toilet-hack\/2622723\/\" target=\"_blank\">toilets<\/a>, <a href=\"http:\/\/www.zdnet.com\/baby-monitor-hack-shows-danger-of-default-passwords-7000019393\/\" target=\"_blank\">baby monitors<\/a>\u2026 the list goes on. It can be a little daunting to think of all the computerized things we have in our homes now, and how malicious individuals could affect those things. Think of all the things in your house that can access websites, things that can use Wi-Fi or Bluetooth, or interact with other devices. Today it\u2019s nearly impossible to find things we use often that are totally computer-free; cars are a great example. But how much of the threat is hyperbole, and how much is valid?<\/p>\n<p>I don\u2019t think it takes a rocket scientist to see that the threat against a world full of cars is primarily academic. I don\u2019t expect we will soon be seeing malware that messes with your brakes or jams your gas pedal any time soon. But why is it such a far-fetched idea? Simply put, the return on investment just isn\u2019t there.<\/p>\n<p>Consider that malware, as we currently know it, can be lumped into two groups: those that are financially motivated, and those that are politically motivated. Financially motivated malware steals your data or your CPU cycles for the benefit of the attacker. Politically motivated malware spies on journalists, activists, or other people of interest in order to predict (and potentially stop) their actions.<\/p>\n<p>Until we can start using baby monitors and toilets to store credit card data and access social media accounts (I cannot stress enough how much I hope this never, ever becomes a reality), we can probably say the financial motivation will stay small. People are probably not going to hack into your Blu-ray player or light bulbs to send spam, or conduct DDoS attacks, in our lifetime.<\/p>\n<p>With political motivation, things become less clear-cut. There could obviously be political motivation to track information from an activist\u2019s car. Likewise, a network printer could be remarkably helpful for gathering important information. In this case, we need to analyze a little further. Sure, they could hack network-connected devices and gather useful information, but is it worth more than simply hacking a computer?<\/p>\n<p>Simply put, no. For anyone that\u2019s been watching the NSA scandal, there is a lot of data that can be gathered without ever hacking a computer \u2013 <a href=\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/\" target=\"_blank\">namely metadata<\/a>. If it\u2019s a government agency secretly gathering information, wiretaps and their digital equivalents can provide all the info they could possibly need. If it\u2019s something more shadowy, then phishing, malware and direct attacks can still provide ample opportunity to breach a target.<\/p>\n<p>There are plenty of available tool kits that can help hackers get into all but the most armored machines. There is simply no point in going to herculean efforts to hack into new types of devices, such as cars or toilets, when the old devices still provide ample opportunity.<\/p>\n<p>That said, the basic message is still this: Don\u2019t panic. If you\u2019re a journalist or an activist, hopefully you\u2019re taking sufficient measures to protect yourself. If you\u2019re neither of those things, the odds of hackers causing problems with these alternate, computerized devices are quite small. It\u2019s possible you could be subjected to annoying pranks, but the chance of genuine harm is significantly smaller.<\/p>\n<p>The message from hackers tinkering with these devices is not really meant to spook consumers. It\u2019s simply meant to remind makers of these new devices that security should not be an afterthought. It isn\u2019t good publicity when someone uses your product to <a href=\"http:\/\/www.zdnet.com\/baby-monitor-hack-shows-danger-of-default-passwords-7000019393\/\">harass a toddler<\/a>. If those vendors want to avoid these PR nightmares, they should take this into account before releasing new products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\u2026 the list goes on. It can be a little daunting to think of all the computerized things we have in our homes now, and how malicious individuals could affect those things. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16929,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[63,3313,86,319,587],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\u2026 the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should You Worry About People Hacking Toilets? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\u2026 the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-15T19:26:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-22T19:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/\",\"name\":\"Should You Worry About People Hacking Toilets? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#primaryimage\"},\"datePublished\":\"2013-08-15T19:26:09+00:00\",\"dateModified\":\"2017-11-22T19:36:19+00:00\",\"description\":\"This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\\u2026 the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Should You Worry About People Hacking Toilets?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Should You Worry About People Hacking Toilets?\",\"datePublished\":\"2013-08-15T19:26:09+00:00\",\"dateModified\":\"2017-11-22T19:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#webpage\"},\"wordCount\":631,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png\",\"keywords\":[\"Hacking\",\"Internet of Things (IoT)\",\"Malware\",\"Security\",\"toilets\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\u2026 the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/","og_locale":"en_US","og_type":"article","og_title":"Should You Worry About People Hacking Toilets? - The Mac Security Blog","og_description":"This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\u2026 the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-08-15T19:26:09+00:00","article_modified_time":"2017-11-22T19:36:19+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/","name":"Should You Worry About People Hacking Toilets? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#primaryimage"},"datePublished":"2013-08-15T19:26:09+00:00","dateModified":"2017-11-22T19:36:19+00:00","description":"This has been an interesting month, with news about hacking a variety of unusual things. People have hacked cars, light bulbs, toilets, baby monitors\u2026 the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Should You Worry About People Hacking Toilets?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Should You Worry About People Hacking Toilets?","datePublished":"2013-08-15T19:26:09+00:00","dateModified":"2017-11-22T19:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#webpage"},"wordCount":631,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png","keywords":["Hacking","Internet of Things (IoT)","Malware","Security","toilets"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-people-hacking-toilets\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/Hack-Toilet.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4oP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16915"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16915"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16915\/revisions"}],"predecessor-version":[{"id":72796,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16915\/revisions\/72796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16929"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}