{"id":131,"date":"2025-06-22T13:25:48","date_gmt":"2025-06-22T11:25:48","guid":{"rendered":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/"},"modified":"2025-06-22T13:25:48","modified_gmt":"2025-06-22T11:25:48","slug":"le-lexique-essentiel-pour-comprendre-la-piratage","status":"publish","type":"post","link":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/","title":{"rendered":"Le lexique essentiel pour comprendre la piratage"},"content":{"rendered":"\n<p><strong>Le lexique essentiel pour comprendre la piraterie informatique<\/strong><\/p>\n<p><\/p>\n<p>La piraterie informatique, \u00e9galement connue sous le nom de hacking, est un domaine en constante \u00e9volution qui peut sembler complexe et myst\u00e9rieux pour ceux qui ne sont pas familiers avec les t\u00e9rminos et les concepts sp\u00e9cifiques. Cependant, comprendre les bases de la piraterie informatique est essentiel pour prot\u00e9ger nos syst\u00e8mes, nos donn\u00e9es et notre identit\u00e9 num\u00e9rique. Dans cet article, nous allons explorer le lexique essentiel pour comprendre la piraterie informatique.<\/p>\n<p><\/p>\n<p><strong>Qu&rsquo;est-ce que la piraterie informatique ?<\/strong><\/p>\n<p><\/p>\n<p>La piraterie informatique est l&rsquo;acte de p\u00e9n\u00e9trer ou de tenter de p\u00e9n\u00e9trer dans un syst\u00e8me informatique, un r\u00e9seau ou un dispositif sans autorisation, afin d&rsquo;acc\u00e9der, de modifier ou de d\u00e9truire des donn\u00e9es. Les pirates informatiques, \u00e9galement appel\u00e9s hackers, utilisent des techniques et des outils pour exploiter les vuln\u00e9rabilit\u00e9s des syst\u00e8mes et des r\u00e9seaux.<\/p>\n<p><\/p>\n<p><strong>Les diff\u00e9rents types de pirates<\/strong><\/p>\n<p><\/p>\n<p>Il existe diff\u00e9rents types de pirates informatiques, chacun avec ses propres motivations et m\u00e9thodes :<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Les hackers \u00e9thiques<\/strong> (ou white-hat hackers) : ce sont des professionnels qui utilisent leurs comp\u00e9tences pour tester la s\u00e9curit\u00e9 des syst\u00e8mes et des r\u00e9seaux, afin de les prot\u00e9ger contre les attaques.<\/li>\n<p><\/p>\n<li><strong>Les hackers malveillants<\/strong> (ou black-hat hackers) : ce sont des individus qui utilisent leurs comp\u00e9tences pour causer des dommages, voler des donn\u00e9es ou compromettre la s\u00e9curit\u00e9 des syst\u00e8mes et des r\u00e9seaux.<\/li>\n<p><\/p>\n<li><strong>Les script-kiddies<\/strong> : ce sont des individus qui utilisent des outils et des scripts pr\u00e9-faits pour lancer des attaques, sans avoir une v\u00e9ritable compr\u00e9hension des m\u00e9canismes sous-jacents.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>Les termes cl\u00e9s<\/strong><\/p>\n<p><\/p>\n<p>Voici quelques termes cl\u00e9s pour comprendre la piraterie informatique :<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Vuln\u00e9rabilit\u00e9<\/strong> : une faiblesse dans un syst\u00e8me ou un logiciel qui peut \u00eatre exploit\u00e9e par un pirate.<\/li>\n<p><\/p>\n<li><strong>Exploit<\/strong> : un code ou une technique utilis\u00e9e pour exploiter une vuln\u00e9rabilit\u00e9.<\/li>\n<p><\/p>\n<li><strong>Malware<\/strong> : un logiciel malveillant qui peut causer des dommages ou compromettre la s\u00e9curit\u00e9 d&rsquo;un syst\u00e8me.<\/li>\n<p><\/p>\n<li><strong>Phishing<\/strong> : une technique d&rsquo;ing\u00e9nierie sociale qui consiste \u00e0 inciter une personne \u00e0 r\u00e9v\u00e9ler des informations sensibles, telles que des mots de passe ou des donn\u00e9es de carte de cr\u00e9dit.<\/li>\n<p><\/p>\n<li><strong>DDoS<\/strong> (Distributed Denial of Service) : une attaque qui consiste \u00e0 inonder un syst\u00e8me ou un r\u00e9seau avec un trafic de donn\u00e9es anormalement \u00e9lev\u00e9, afin de le rendre indisponible.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>Les outils et les techniques<\/strong><\/p>\n<p><\/p>\n<p>Les pirates informatiques utilisent une vari\u00e9t\u00e9 d&rsquo;outils et de techniques pour lancer des attaques, notamment :<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Les scanners de vuln\u00e9rabilit\u00e9s<\/strong> : des outils qui permettent de d\u00e9tecter les vuln\u00e9rabilit\u00e9s dans un syst\u00e8me ou un logiciel.<\/li>\n<p><\/p>\n<li><strong>Les exploit-kits<\/strong> : des outils qui permettent de cr\u00e9er des exploits pour des vuln\u00e9rabilit\u00e9s sp\u00e9cifiques.<\/li>\n<p><\/p>\n<li><strong>Les logiciels deanielles<\/strong> : des logiciels qui permettent de masquer les activit\u00e9s d&rsquo;un pirate.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>La protection contre la piraterie<\/strong><\/p>\n<p><\/p>\n<p>Pour se prot\u00e9ger contre la piraterie informatique, il est essentiel de prendre des mesures de s\u00e9curit\u00e9, telles que :<\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Mettre \u00e0 jour r\u00e9guli\u00e8rement les logiciels et les syst\u00e8mes<\/strong> : pour corriger les vuln\u00e9rabilit\u00e9s et pr\u00e9venir les attaques.<\/li>\n<p><\/p>\n<li><strong>Utiliser des mots de passe forts et uniques<\/strong> : pour prot\u00e9ger les comptes et les syst\u00e8mes.<\/li>\n<p><\/p>\n<li><strong>Utiliser un logiciel anti-virus et un pare-feu<\/strong> : pour d\u00e9tecter et bloquer les menaces.<\/li>\n<p><\/p>\n<li><strong>Faire des sauvegardes r\u00e9guli\u00e8res<\/strong> : pour prot\u00e9ger les donn\u00e9es en cas d&rsquo;attaque.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>En conclusion, la piraterie informatique est un domaine complexe qui n\u00e9cessite une compr\u00e9hension des termes et des concepts sp\u00e9cifiques. En connaissant les diff\u00e9rents types de pirates, les termes cl\u00e9s, les outils et les techniques, nous pouvons mieux nous prot\u00e9ger contre les attaques et pr\u00e9venir les dommages. Il est essentiel de prendre des mesures de s\u00e9curit\u00e9 pour prot\u00e9ger nos syst\u00e8mes, nos donn\u00e9es et notre identit\u00e9 num\u00e9rique.<\/p>\n<a href=\"https:\/\/fourcalculator.com\">Calculatrice multifonction<\/a><br\/>\r\n<a href=\"https:\/\/compresserimage.com\">Compressez vos images gratuitement<\/a><br\/>\r\n<a href=\"https:\/\/qrcodeready.com\">G\u00e9n\u00e9rez un code QR gratuitement<\/a><br\/>\r\n<a href=\"https:\/\/appointworks.com\">Cr\u00e9ez votre lien de r\u00e9servation public, g\u00e9rez les disponibilit\u00e9s, le personnel et les rendez-vous.<\/a><br\/>\r\n<a href=\"https:\/\/cheapesimcard.com\/\">Reste connect\u00e9 partout avec la bonne eSIM, au bon prix.<\/a>\r\n\n","protected":false},"excerpt":{"rendered":"<p>Le lexique essentiel pour comprendre la piraterie informatique La piraterie informatique, \u00e9galement connue sous le nom de hacking, est un domaine en constante \u00e9volution qui peut sembler complexe et myst\u00e9rieux pour ceux qui ne sont&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[1],"tags":[100],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-articles","tag-le-lexique-essentiel-pour-comprendre-la-piratage"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le lexique essentiel pour comprendre la piratage - LockPassGen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le lexique essentiel pour comprendre la piratage - LockPassGen\" \/>\n<meta property=\"og:description\" content=\"Le lexique essentiel pour comprendre la piraterie informatique La piraterie informatique, \u00e9galement connue sous le nom de hacking, est un domaine en constante \u00e9volution qui peut sembler complexe et myst\u00e9rieux pour ceux qui ne sont...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/\" \/>\n<meta property=\"og:site_name\" content=\"LockPassGen\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-22T11:25:48+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ce1dda17eed3b91ca904806c7fafe26\"},\"headline\":\"Le lexique essentiel pour comprendre la piratage\",\"datePublished\":\"2025-06-22T11:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/\"},\"wordCount\":668,\"publisher\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#organization\"},\"keywords\":[\"Le lexique essentiel pour comprendre la piratage\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/\",\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/\",\"name\":\"Le lexique essentiel pour comprendre la piratage - LockPassGen\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-06-22T11:25:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-piratage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le lexique essentiel pour comprendre la piratage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/\",\"name\":\"QR Code Generator\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#organization\",\"name\":\"QR Code Ready\",\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shorturl.ma\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo-qrcode.png\",\"contentUrl\":\"https:\\\/\\\/shorturl.ma\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo-qrcode.png\",\"width\":622,\"height\":173,\"caption\":\"QR Code Ready\"},\"image\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ce1dda17eed3b91ca904806c7fafe26\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/shorturl.ma\\\/blog\"],\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le lexique essentiel pour comprendre la piratage - LockPassGen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/","og_locale":"fr_FR","og_type":"article","og_title":"Le lexique essentiel pour comprendre la piratage - LockPassGen","og_description":"Le lexique essentiel pour comprendre la piraterie informatique La piraterie informatique, \u00e9galement connue sous le nom de hacking, est un domaine en constante \u00e9volution qui peut sembler complexe et myst\u00e9rieux pour ceux qui ne sont...","og_url":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/","og_site_name":"LockPassGen","article_published_time":"2025-06-22T11:25:48+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/#article","isPartOf":{"@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/"},"author":{"name":"admin","@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/person\/8ce1dda17eed3b91ca904806c7fafe26"},"headline":"Le lexique essentiel pour comprendre la piratage","datePublished":"2025-06-22T11:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/"},"wordCount":668,"publisher":{"@id":"https:\/\/lockpassgen.com\/blog\/#organization"},"keywords":["Le lexique essentiel pour comprendre la piratage"],"articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/","url":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/","name":"Le lexique essentiel pour comprendre la piratage - LockPassGen","isPartOf":{"@id":"https:\/\/lockpassgen.com\/blog\/#website"},"datePublished":"2025-06-22T11:25:48+00:00","breadcrumb":{"@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-piratage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/lockpassgen.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Le lexique essentiel pour comprendre la piratage"}]},{"@type":"WebSite","@id":"https:\/\/lockpassgen.com\/blog\/#website","url":"https:\/\/lockpassgen.com\/blog\/","name":"QR Code Generator","description":"","publisher":{"@id":"https:\/\/lockpassgen.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lockpassgen.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/lockpassgen.com\/blog\/#organization","name":"QR Code Ready","url":"https:\/\/lockpassgen.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shorturl.ma\/blog\/wp-content\/uploads\/2025\/05\/logo-qrcode.png","contentUrl":"https:\/\/shorturl.ma\/blog\/wp-content\/uploads\/2025\/05\/logo-qrcode.png","width":622,"height":173,"caption":"QR Code Ready"},"image":{"@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/person\/8ce1dda17eed3b91ca904806c7fafe26","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/shorturl.ma\/blog"],"url":"https:\/\/lockpassgen.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":0,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"wp:attachment":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}