{"id":58,"date":"2018-09-26T12:52:14","date_gmt":"2018-09-26T12:52:14","guid":{"rendered":"https:\/\/website.prod.unilu.spikeseed.cloud\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/"},"modified":"2018-09-26T12:52:14","modified_gmt":"2018-09-26T12:52:14","slug":"securing-cars-against-the-hackers-of-tomorrow","status":"publish","type":"news","link":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/","title":{"rendered":"Securing Cars Against the Hackers of Tomorrow"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p>Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0<\/p><p>This is true as much for the cars we\u2019re driving today as for the autonomous vehicles that could be driving us tomorrow. Accordingly, SnT researchers are already hard at work developing defence systems to tackle this challenge.<\/p><figure class=\"wp-block-dev4-reusable-blocks-image  object-fit--contain\">\n    \n<img decoding=\"async\" class=\"wp-block-image unilux-custom-image-block\"\n                alt=\"\"\n            src=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/07\/car_hackers_450.jpg\"\n                srcset=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/07\/car_hackers_450-300x200.jpg 300w, https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/07\/car_hackers_450.jpg 405w\"\n                style=\"object-position: 50.00% 50.00%; font-family: &quot;object-fit: contain; object-position: 50.00% 50.00%;&quot;; aspect-ratio: 3\/2; object-fit: contain; width: 100%;\"\n        loading=\"lazy\"\n\/>    <\/figure><p><i>Dr. David Kozhaya, Dr. Marcus V\u00f6lp and Prof. Paulo Esteves-Ver\u00edssimo<\/i><\/p><p>\u201cOne key to security is diversity of components,\u201d explains Dr. Marcus V\u00f6lp, a researcher at SnT. If a hacker manages to crack the brake system of one manufacturer, for example, that doesn\u2019t necessarily mean he can get into the brake system of another.<\/p><p>Unfortunately, not all components are so diverse. Project lead Prof. Dr. Paulo Esteves-Ver\u00edssimo confirms this. \u201cThe Controller Area Network (CAN) bus used to connect electronics in most cars nowadays isn\u2019t safe. In experiments, experts were able to take control of an SUV using radio waves alone, and make it involuntarily drive in reverse.\u201d<\/p><p>The risk of these attacks is even greater in autonomous vehicles that need to communicate with one another. Scientists at SnT are therefore cooperating with the Intel Collaborative Research Institute for Collaborative Autonomous &#038; Resilient Systems (<a href=\"http:\/\/www.icri-cars.org\/\" target=\"_blank\" title=\"\" rel=\"noopener\">ICRICARS<\/a>) to tackle new challenges in the IT security of autonomous driving. \u201cThe future of vehicles isn\u2019t so much fully autonomous cars but cooperative vehicles,\u201d explains Dr. David Kozhaya. He continues: \u201cthe cars of tomorrow will wirelessly communicate to their environment where they are and where they want to go.\u201d<\/p><p>This networking between vehicles, however, opens up new channels that malicious attackers can exploit. What would happen, for example, if a hacker were to force a vehicle to report a false location or the wrong speed limit?<\/p><p>V\u00f6lp outlines the challenge: \u201cThe vehicle\u2019s systems must be able to identify when there is something wrong with the data. Then, they must immediately decide which data can be trusted and which cannot.\u201d<\/p><p>One part of the solution is to include multiple components serving the same purpose but based on different systems. If one of these is compromised, the vehicle can still reconcile in real time which data is correct and which should be discarded. SnT and Intel are working together to ensure this all happens in a quick and reliable manner so that vehicles will be able to share the optimised traffic information securely among themselves.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0<\/p>\n","protected":false},"author":0,"featured_media":59,"template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false},"news-category":[3],"news-topic":[],"organisation":[183],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Cars Against the Hackers of Tomorrow - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg<\/title>\n<meta name=\"description\" content=\"Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Cars Against the Hackers of Tomorrow\" \/>\n<meta property=\"og:description\" content=\"Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\" \/>\n<meta property=\"og:site_name\" content=\"SnT FR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Securing Cars Against the Hackers of Tomorrow\",\"datePublished\":\"2018-09-26T12:52:14+00:00\",\"dateModified\":\"2018-09-26T12:52:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\"},\"wordCount\":445,\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg\",\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\",\"name\":\"Securing Cars Against the Hackers of Tomorrow - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg\",\"datePublished\":\"2018-09-26T12:52:14+00:00\",\"dateModified\":\"2018-09-26T12:52:14+00:00\",\"description\":\"Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interdisciplinary Centre for Security, Reliability and Trust (SnT)\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Securing Cars Against the Hackers of Tomorrow\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"name\":\"SnT\",\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\",\"name\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/school\/snt-lu\/\"],\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Cars Against the Hackers of Tomorrow - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg","description":"Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/","og_locale":"fr_FR","og_type":"article","og_title":"Securing Cars Against the Hackers of Tomorrow","og_description":"Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0","og_url":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/","og_site_name":"SnT FR","og_image":[{"width":800,"height":600,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#article","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/"},"author":{"name":"","@id":""},"headline":"Securing Cars Against the Hackers of Tomorrow","datePublished":"2018-09-26T12:52:14+00:00","dateModified":"2018-09-26T12:52:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/"},"wordCount":445,"publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg","inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/","url":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/","name":"Securing Cars Against the Hackers of Tomorrow - SnT actualit\u00e9s I Universit\u00e9 du Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg","datePublished":"2018-09-26T12:52:14+00:00","dateModified":"2018-09-26T12:52:14+00:00","description":"Hackers are infamous for going after bank accounts, emails of presidential candidates or the control centres of power plants. IT experts are familiar with these attacks and have a high success rate in thwarting them. But there is a whole new set of vulnerabilities open to attack in complex control systems \u2013 like those used in cars.\u00a0","breadcrumb":{"@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2018\/09\/securing_cars_against_the_hackers_of_tomorrow.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/snt-fr\/news\/securing-cars-against-the-hackers-of-tomorrow\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr"},{"@type":"ListItem","position":2,"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT)","item":"https:\/\/www.uni.lu\/snt-fr\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/www.uni.lu\/snt-fr\/news\/"},{"@type":"ListItem","position":4,"name":"Securing Cars Against the Hackers of Tomorrow"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/snt-fr\/#website","url":"https:\/\/www.uni.lu\/snt-fr\/","name":"SnT","description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"alternateName":"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/snt-fr\/#organization","name":"SnT - Universit\u00e9 du Luxembourg I Uni.lu","alternateName":"Interdisciplinary Centre for Security, Reliability and Trust","url":"https:\/\/www.uni.lu\/snt-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"SnT - Universit\u00e9 du Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/school\/snt-lu\/"],"description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu"}]}},"blog_id":13,"_links":{"self":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news\/58"}],"collection":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news\/58\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media\/59"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news-category?post=58"},{"taxonomy":"news-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/news-topic?post=58"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/organisation?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}