{"id":479,"date":"2020-08-01T08:13:43","date_gmt":"2020-08-01T08:13:43","guid":{"rendered":"https:\/\/sms-txt.net\/?p=479"},"modified":"2021-03-19T19:28:10","modified_gmt":"2021-03-19T16:28:10","slug":"amelioration-du-positionnement-lors-de-la-localisation-de-lattaque-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/fr\/interception-de-sms\/amelioration-du-positionnement-lors-de-la-localisation-de-lattaque-ss7\/","title":{"rendered":"Am\u00e9lioration du positionnement lors de la localisation - Attaque SS7"},"content":{"rendered":"<h1>Am\u00e9lioration du positionnement SS7 pendant le suivi de la localisation<\/h1>\n<p>L'une des attaques contre les r\u00e9seaux SS7 est probablement l'observation de la localisation. La localisation d'un abonn\u00e9 p\u00e9titionnaire est achemin\u00e9e au moyen de <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/hack\/ss7-services-1-day\/\"><strong>SS7<\/strong> <\/a>et la r\u00e9ponse comprend l'individualit\u00e9 de la station de base. Chaque station de base a des coordonn\u00e9es particuli\u00e8res et s'adresse \u00e0 une zone. En raison de la densit\u00e9, la zone d'action d'une m\u00e9tropole s'\u00e9tend sur des milliers de milliers d'habitants.<\/p>\n<p>&nbsp;<\/p>\n<p>Un attaquant est capable de tirer parti des particularit\u00e9s du r\u00e9seau mobile pour cr\u00e9er des ordres de localisation, en plus de traquer la station de base avec sa propre individualit\u00e9 en utilisant des attaques SS7 furtives 4-5 une gamme d'outils Web. La v\u00e9racit\u00e9 de cette d\u00e9couverte de l'emplacement est bas\u00e9e sur la zone de politique de la station de base. Le malfaiteur \u00e9tablit l'emplacement de la station de base qui fait fonctionner l'abonn\u00e9 \u00e0 l'heure actuelle.<\/p>\n<p>Nos analyses r\u00e9v\u00e8lent que les puces ont d\u00e9couvert qu'elles pouvaient fixer avec pr\u00e9cision l'emplacement de l'abonn\u00e9. Un appareil mobile est signal\u00e9 par des stations de base. Si le malfaiteur d\u00e9cide des coordonn\u00e9es de 3 ou m\u00eame 2 stations de base les plus proches de cet abonn\u00e9, la localisation de l'abonn\u00e9 peut \u00eatre r\u00e9duite.<\/p>\n<p>&nbsp;<\/p>\n<p>En r\u00e8gle g\u00e9n\u00e9rale, un appareil mobile s\u00e9lectionne une station de base avec tous les \u00e9tats radio au cours d'une transaction. Par cons\u00e9quent, l'appareil mobile doit entrer des signes avec ce r\u00e9seau. M\u00eame le malfaiteur peut utiliser un SMS pour lancer une transaction cach\u00e9e avec tous les abonn\u00e9s vis\u00e9s. Les informations relatives \u00e0 ces messages peuvent \u00eatre offertes par l'abonn\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<p>Un moyen encore plus efficace de dissimuler une transaction consiste \u00e0 utiliser des notifications USSD discr\u00e8tes. Bien que ce type de transaction ne soit pas enregistr\u00e9 dans la proc\u00e9dure de chargement, il commence par un \u00e9change de signes entre votre appareil mobile et le r\u00e9seau. M\u00eame le malfaiteur peut am\u00e9liorer la pr\u00e9cision de la localisation en manipulant les identifications des stations de base et les notifications USSD.<\/p>\n<p>&nbsp;<\/p>\n<p>L'intrus demande l'identifiant de leur station de base. Votre intrus transmet un message \u00e0 voix basse afin d'inciter les appareils de l'abonn\u00e9 \u00e0 effectuer une transaction par l'interm\u00e9diaire d'un port sans fil. Le cas \u00e9ch\u00e9ant, le malfaiteur obtiendra une augmentation du positionnement.<\/p>\n<p>&nbsp;<\/p>\n<p>Le r\u00e9seau peut s\u00e9lectionner une nouvelle station de base pour effectuer la transaction, et la base de donn\u00e9es VLR (Visitor Location Register) met \u00e0 jour l'emplacement de l'abonn\u00e9. L'intrus demande \u00e0 nouveau l'emplacement exact de l'abonn\u00e9 et obtient l'identifiant de cette station de base. Ainsi, l'intrus peut d\u00e9terminer la zone o\u00f9 se trouve l'abonn\u00e9 \u00e0 l'heure actuelle.<\/p>\n<p>&nbsp;<\/p>\n<h2>Conclusion :<\/h2>\n<p>M\u00eame le concept de \"jardin clos\" est obsol\u00e8te. M\u00eame le processus de signalisation SS7 est connu comme le processus du r\u00e9seau t\u00e9l\u00e9phonique. Avant la cr\u00e9ation du SS7, les ordres de service pour les relations avec les abonn\u00e9s et l'exp\u00e9dition de colis d'informations \u00e9taient transmis par une station. Cette m\u00e9thode a \u00e9t\u00e9 mise \u00e0 jour et remplac\u00e9e par tous les programmes de signalisation mondiaux (SS7) il y a plus de 30 ans. La norme SS7 \u00e9tablit les protocoles d'\u00e9change de donn\u00e9es et de proc\u00e9dures entre les dispositifs de r\u00e9seau des entreprises de t\u00e9l\u00e9communication. Le SS7 sert de base \u00e0 une infrastructure de signalisation pour les r\u00e9seaux locaux et nationaux.<\/p>\n<p>&nbsp;<\/p>\n<p>Il n'a pas constitu\u00e9 une menace pour les abonn\u00e9s ou les op\u00e9rateurs, m\u00eame si le r\u00e9seau SS7 s'est av\u00e9r\u00e9 \u00eatre une plate-forme. Le r\u00e9seau a progress\u00e9 pour s'adapter aux normes de liaison et de service mobiles, et au 21e si\u00e8cle, une paire de protocoles de transport de signaux connus sous le nom de SIGTRAN a \u00e9t\u00e9 \u00e9tablie pour la premi\u00e8re fois. SIGTRAN peut \u00eatre une extension de SS7 qui permet l'utilisation de r\u00e9seaux IP pour d\u00e9placer les messages, et cette invention a \u00e9galement permis au r\u00e9seau de signalisation de cesser d'\u00eatre dispers\u00e9.<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7 Positioning Enhancement During Location Tracking L'une des attaques contre les r\u00e9seaux SS7 est probablement l'observation de la localisation. La localisation d'un abonn\u00e9 est achemin\u00e9e au moyen des r\u00e9seaux SS7 et la r\u00e9ponse comprend l'individualit\u00e9 de la station de base. Chaque station de base poss\u00e8de des coordonn\u00e9es particuli\u00e8res et s'adresse \u00e0 une zone. En raison de la densit\u00e9, la...<\/p>","protected":false},"author":1,"featured_media":1728,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Location Tracking - How to track location using SS7<\/title>\n<meta name=\"description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/fr\/interception-de-sms\/amelioration-du-positionnement-lors-de-la-localisation-de-lattaque-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Positioning Enhancement During Location Tracking -SS7 attack\" \/>\n<meta property=\"og:description\" content=\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/fr\/interception-de-sms\/amelioration-du-positionnement-lors-de-la-localisation-de-lattaque-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-01T08:13:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-19T16:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Positioning Enhancement During Location Tracking -SS7 attack\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"},\"wordCount\":569,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\",\"name\":\"SS7 Location Tracking - How to track location using SS7\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"datePublished\":\"2020-08-01T08:13:43+00:00\",\"dateModified\":\"2021-03-19T16:28:10+00:00\",\"description\":\"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg\",\"width\":900,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Positioning Enhancement During Location Tracking -SS7 attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 Location Tracking - Comment suivre la localisation \u00e0 l'aide du SS7","description":"L'une des attaques contre les r\u00e9seaux SS7 est probablement l'observation de la localisation. Vous pouvez suivre la localisation \u00e0 l'aide de notre logiciel SS7.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/fr\/interception-de-sms\/amelioration-du-positionnement-lors-de-la-localisation-de-lattaque-ss7\/","og_locale":"fr_FR","og_type":"article","og_title":"Positioning Enhancement During Location Tracking -SS7 attack","og_description":"Probably one among the attacks on SS7 networks would be location observation. You can track location using our SS7 software.","og_url":"https:\/\/sms-txt.net\/fr\/interception-de-sms\/amelioration-du-positionnement-lors-de-la-localisation-de-lattaque-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2020-08-01T08:13:43+00:00","article_modified_time":"2021-03-19T16:28:10+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Positioning Enhancement During Location Tracking -SS7 attack","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"},"wordCount":569,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","url":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/","name":"SS7 Location Tracking - Comment suivre la localisation \u00e0 l'aide du SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","datePublished":"2020-08-01T08:13:43+00:00","dateModified":"2021-03-19T16:28:10+00:00","description":"L'une des attaques contre les r\u00e9seaux SS7 est probablement l'observation de la localisation. Vous pouvez suivre la localisation \u00e0 l'aide de notre logiciel SS7.","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/08\/Positioning-Enhancement-During-Location-Tracking-SS7-attack.jpg","width":900,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/positioning-enhancement-during-location-tracking-ss7-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Positioning Enhancement During Location Tracking -SS7 attack"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Piratage du SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media\/1728"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media?parent=479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/categories?post=479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/tags?post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}