{"id":15742,"date":"2025-09-24T06:19:36","date_gmt":"2025-09-24T06:19:36","guid":{"rendered":"https:\/\/www.openedr.com\/blog\/?p=15742"},"modified":"2025-09-24T06:19:36","modified_gmt":"2025-09-24T06:19:36","slug":"what-are-deepfakes","status":"publish","type":"post","link":"https:\/\/www.openedr.com\/blog\/what-are-deepfakes\/","title":{"rendered":"What Are Deepfakes? A Complete Guide to Synthetic Media"},"content":{"rendered":"<p data-start=\"428\" data-end=\"753\">Have you ever seen a video of a celebrity saying something outrageous\u2014only to discover later it wasn\u2019t real? That\u2019s the power (and danger) of <strong data-start=\"570\" data-end=\"583\">deepfakes<\/strong>. With artificial intelligence (AI) and machine learning advancing rapidly, many are asking: <em data-start=\"676\" data-end=\"751\">what are deepfakes and why do they matter for cybersecurity and business?<\/em><\/p>\n<p data-start=\"755\" data-end=\"1027\">Deepfakes are AI-generated videos, images, or audio recordings that manipulate reality by making people appear to say or do things they never did. While the technology can be used creatively, it also poses <strong data-start=\"961\" data-end=\"1024\">serious risks for businesses, politics, and online security<\/strong>.<\/p>\n<p data-start=\"1029\" data-end=\"1186\">In fact, according to research, <strong data-start=\"1061\" data-end=\"1123\">deepfake incidents increased by over 550% in the last year<\/strong>, making them one of the fastest-growing cyber threats today.<\/p>\n<h2 data-start=\"1193\" data-end=\"1217\"><strong>What Are Deepfakes?<\/strong><\/h2>\n<p data-start=\"1219\" data-end=\"1439\">At its core, a <strong data-start=\"1234\" data-end=\"1246\">deepfake<\/strong> is a piece of synthetic media created using <strong data-start=\"1291\" data-end=\"1319\">deep learning algorithms<\/strong>. These AI models analyze and replicate human voices, faces, and movements to generate realistic-looking fake content.<\/p>\n<p data-start=\"1441\" data-end=\"1465\"><strong>Deepfakes can include:<\/strong><\/p>\n<ul data-start=\"1466\" data-end=\"1700\">\n<li data-start=\"1466\" data-end=\"1541\">\n<p data-start=\"1468\" data-end=\"1541\"><strong data-start=\"1468\" data-end=\"1490\">Video Manipulation<\/strong>: Swapping one person\u2019s face onto another\u2019s body.<\/p>\n<\/li>\n<li data-start=\"1542\" data-end=\"1620\">\n<p data-start=\"1544\" data-end=\"1620\"><strong data-start=\"1544\" data-end=\"1563\">Audio Deepfakes<\/strong>: Mimicking someone\u2019s voice to create false recordings.<\/p>\n<\/li>\n<li data-start=\"1621\" data-end=\"1700\">\n<p data-start=\"1623\" data-end=\"1700\"><strong data-start=\"1623\" data-end=\"1642\">Image Deepfakes<\/strong>: Generating fake photographs or altering existing ones.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1702\" data-end=\"1849\">\ud83d\udc49 <strong data-start=\"1705\" data-end=\"1718\">In short:<\/strong> Deepfakes blur the line between truth and fiction, creating challenges for trust, security, and authenticity in the digital age.<\/p>\n<h3 data-start=\"1856\" data-end=\"1883\"><strong>How Do Deepfakes Work?<\/strong><\/h3>\n<p data-start=\"1885\" data-end=\"1966\">Understanding <em data-start=\"1899\" data-end=\"1919\">what are deepfakes<\/em> means looking at the technology behind them.<\/p>\n<ol data-start=\"1968\" data-end=\"2399\">\n<li data-start=\"1968\" data-end=\"2070\">\n<p data-start=\"1971\" data-end=\"2070\"><strong data-start=\"1971\" data-end=\"1990\">Data Collection<\/strong> \u2013 Large sets of images, videos, or audio recordings of a target are gathered.<\/p>\n<\/li>\n<li data-start=\"2071\" data-end=\"2193\">\n<p data-start=\"2074\" data-end=\"2193\"><strong data-start=\"2074\" data-end=\"2096\">Training the Model<\/strong> \u2013 AI algorithms, often <strong data-start=\"2120\" data-end=\"2162\">GANs (Generative Adversarial Networks)<\/strong>, learn patterns in the data.<\/p>\n<\/li>\n<li data-start=\"2194\" data-end=\"2296\">\n<p data-start=\"2197\" data-end=\"2296\"><strong data-start=\"2197\" data-end=\"2219\">Content Generation<\/strong> \u2013 The system creates synthetic media that looks or sounds like the target.<\/p>\n<\/li>\n<li data-start=\"2297\" data-end=\"2399\">\n<p data-start=\"2300\" data-end=\"2399\"><strong data-start=\"2300\" data-end=\"2314\">Refinement<\/strong> \u2013 The output is fine-tuned until it becomes nearly indistinguishable from reality.<\/p>\n<\/li>\n<\/ol>\n<p data-start=\"2401\" data-end=\"2557\"><strong>Example:<\/strong> A deepfake of a CEO could be generated to issue a fake announcement about a company merger\u2014potentially impacting stock prices and investor trust.<\/p>\n<h3 data-start=\"2564\" data-end=\"2610\"><strong>The Dangers of Deepfakes in Cybersecurity<\/strong><\/h3>\n<p data-start=\"2612\" data-end=\"2701\">Deepfakes are more than just internet pranks\u2014they pose <strong data-start=\"2667\" data-end=\"2698\">serious cybersecurity risks<\/strong>.<\/p>\n<ul data-start=\"2703\" data-end=\"3205\">\n<li data-start=\"2703\" data-end=\"2805\">\n<p data-start=\"2705\" data-end=\"2805\"><strong data-start=\"2705\" data-end=\"2725\">Phishing &amp; Fraud<\/strong>: Attackers use deepfake audio to impersonate executives in \u201cCEO fraud\u201d scams.<\/p>\n<\/li>\n<li data-start=\"2806\" data-end=\"2890\">\n<p data-start=\"2808\" data-end=\"2890\"><strong data-start=\"2808\" data-end=\"2826\">Disinformation<\/strong>: Fake political videos can sway public opinion and elections.<\/p>\n<\/li>\n<li data-start=\"2891\" data-end=\"2991\">\n<p data-start=\"2893\" data-end=\"2991\"><strong data-start=\"2893\" data-end=\"2914\">Reputation Damage<\/strong>: Businesses can suffer from manipulated videos spreading false narratives.<\/p>\n<\/li>\n<li data-start=\"2992\" data-end=\"3091\">\n<p data-start=\"2994\" data-end=\"3091\"><strong data-start=\"2994\" data-end=\"3016\">Social Engineering<\/strong>: Hackers use deepfakes to trick employees into revealing sensitive data.<\/p>\n<\/li>\n<li data-start=\"3092\" data-end=\"3205\">\n<p data-start=\"3094\" data-end=\"3205\"><strong data-start=\"3094\" data-end=\"3123\">Legal &amp; Compliance Issues<\/strong>: Deepfakes may lead to lawsuits, privacy violations, and regulatory challenges.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3207\" data-end=\"3360\">\ud83d\udc49 According to security experts, <strong data-start=\"3241\" data-end=\"3285\">96% of deepfakes are malicious in intent<\/strong>, with financial fraud being one of the biggest concerns for enterprises.<\/p>\n<h3 data-start=\"3367\" data-end=\"3404\"><strong>Real-World Examples of Deepfakes<\/strong><\/h3>\n<p data-start=\"3406\" data-end=\"3471\">To better grasp <em data-start=\"3422\" data-end=\"3442\">what are deepfakes<\/em>, let\u2019s look at real cases:<\/p>\n<ul data-start=\"3473\" data-end=\"3860\">\n<li data-start=\"3473\" data-end=\"3612\">\n<p data-start=\"3475\" data-end=\"3612\"><strong data-start=\"3475\" data-end=\"3492\">2019 CEO Scam<\/strong>: Cybercriminals used a deepfake voice to impersonate a German CEO, tricking a UK employee into transferring \u20ac220,000.<\/p>\n<\/li>\n<li data-start=\"3613\" data-end=\"3736\">\n<p data-start=\"3615\" data-end=\"3736\"><strong data-start=\"3615\" data-end=\"3638\">Political Deepfakes<\/strong>: Manipulated videos of world leaders have circulated online, sparking disinformation campaigns.<\/p>\n<\/li>\n<li data-start=\"3737\" data-end=\"3860\">\n<p data-start=\"3739\" data-end=\"3860\"><strong data-start=\"3739\" data-end=\"3758\">Corporate Fraud<\/strong>: Fake conference calls with deepfaked executives have been reported, aiming to steal company funds.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3867\" data-end=\"3923\"><strong>Benefits of Deepfake Technology (The Positive Side)<\/strong><\/h3>\n<p data-start=\"3925\" data-end=\"4010\">Not all deepfakes are harmful. In fact, the technology has legitimate applications:<\/p>\n<ul data-start=\"4012\" data-end=\"4345\">\n<li data-start=\"4012\" data-end=\"4099\">\n<p data-start=\"4014\" data-end=\"4099\"><strong data-start=\"4014\" data-end=\"4031\">Entertainment<\/strong>: Used in movies for dubbing, aging effects, or recreating actors.<\/p>\n<\/li>\n<li data-start=\"4100\" data-end=\"4176\">\n<p data-start=\"4102\" data-end=\"4176\"><strong data-start=\"4102\" data-end=\"4115\">Education<\/strong>: Virtual instructors and interactive learning experiences.<\/p>\n<\/li>\n<li data-start=\"4177\" data-end=\"4269\">\n<p data-start=\"4179\" data-end=\"4269\"><strong data-start=\"4179\" data-end=\"4193\">Healthcare<\/strong>: Assisting patients with speech impairments by generating natural voices.<\/p>\n<\/li>\n<li data-start=\"4270\" data-end=\"4345\">\n<p data-start=\"4272\" data-end=\"4345\"><strong data-start=\"4272\" data-end=\"4285\">Marketing<\/strong>: Personalized video ads tailored to individual customers.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4347\" data-end=\"4420\">\ud83d\udc49 The challenge lies in <strong data-start=\"4372\" data-end=\"4417\">balancing innovation with responsible use<\/strong>.<\/p>\n<h3><strong>Detecting Deepfakes<\/strong><\/h3>\n<p data-start=\"4453\" data-end=\"4568\">As deepfakes grow more sophisticated, detecting them becomes harder. However, IT and security teams can look for:<\/p>\n<ul data-start=\"4570\" data-end=\"4870\">\n<li data-start=\"4570\" data-end=\"4636\">\n<p data-start=\"4572\" data-end=\"4636\"><strong data-start=\"4572\" data-end=\"4605\">Inconsistent facial movements<\/strong> (blinking, lip-sync issues).<\/p>\n<\/li>\n<li data-start=\"4637\" data-end=\"4685\">\n<p data-start=\"4639\" data-end=\"4685\"><strong data-start=\"4639\" data-end=\"4672\">Unnatural lighting or shadows<\/strong> in videos.<\/p>\n<\/li>\n<li data-start=\"4686\" data-end=\"4730\">\n<p data-start=\"4688\" data-end=\"4730\"><strong data-start=\"4688\" data-end=\"4708\">Audio mismatches<\/strong> with lip movements.<\/p>\n<\/li>\n<li data-start=\"4731\" data-end=\"4787\">\n<p data-start=\"4733\" data-end=\"4787\"><strong data-start=\"4733\" data-end=\"4761\">Artifacts or distortions<\/strong> around faces and edges.<\/p>\n<\/li>\n<li data-start=\"4788\" data-end=\"4870\">\n<p data-start=\"4790\" data-end=\"4870\"><strong data-start=\"4790\" data-end=\"4812\">AI detection tools<\/strong> that analyze digital fingerprints of manipulated media.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4877\" data-end=\"4933\">How Businesses Can Protect Against Deepfake Threats<\/h3>\n<p data-start=\"4935\" data-end=\"5049\">When it comes to cybersecurity, preventing deepfake-based attacks requires a <strong data-start=\"5012\" data-end=\"5046\">multi-layered defense strategy<\/strong>:<\/p>\n<ul data-start=\"5051\" data-end=\"5531\">\n<li data-start=\"5051\" data-end=\"5141\">\n<p data-start=\"5053\" data-end=\"5141\">\u2705 <strong data-start=\"5055\" data-end=\"5086\">Employee Awareness Training<\/strong> \u2013 Teach staff how to spot suspicious audio or video.<\/p>\n<\/li>\n<li data-start=\"5142\" data-end=\"5240\">\n<p data-start=\"5144\" data-end=\"5240\">\u2705 <strong data-start=\"5146\" data-end=\"5183\">Multi-Factor Authentication (MFA)<\/strong> \u2013 Don\u2019t rely on voice-only or video-only verification.<\/p>\n<\/li>\n<li data-start=\"5241\" data-end=\"5346\">\n<p data-start=\"5243\" data-end=\"5346\">\u2705 <strong data-start=\"5245\" data-end=\"5284\">Endpoint Detection &amp; Response (<a href=\"https:\/\/www.openedr.com\/blog\/what-is-edr\/\">EDR<\/a>)<\/strong> \u2013 Monitor for unusual activity triggered by deepfake scams.<\/p>\n<\/li>\n<li data-start=\"5347\" data-end=\"5444\">\n<p data-start=\"5349\" data-end=\"5444\">\u2705 <strong data-start=\"5351\" data-end=\"5374\">Zero Trust Security<\/strong> \u2013 Never trust, always verify\u2014especially with identity-based access.<\/p>\n<\/li>\n<li data-start=\"5445\" data-end=\"5531\">\n<p data-start=\"5447\" data-end=\"5531\">\u2705 <strong data-start=\"5449\" data-end=\"5469\">Legal Safeguards<\/strong> \u2013 Update policies and contracts to address deepfake misuse.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5533\" data-end=\"5681\"><strong>\ud83d\udc49 Example:<\/strong> A financial services company uses <strong data-start=\"5579\" data-end=\"5594\">EDR systems<\/strong> alongside strict access controls to stop fraudulent requests triggered by deepfakes.<\/p>\n<h3 data-start=\"5688\" data-end=\"5731\">Deepfakes vs Traditional Cyber Threats<\/h3>\n<div class=\"_tableContainer_1rjym_1\">\n<div class=\"group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"5733\" data-end=\"6128\">\n<thead data-start=\"5733\" data-end=\"5811\">\n<tr data-start=\"5733\" data-end=\"5811\">\n<th data-start=\"5733\" data-end=\"5753\" data-col-size=\"sm\">Threat Type<\/th>\n<th data-start=\"5753\" data-end=\"5784\" data-col-size=\"sm\">Example Attack<\/th>\n<th data-start=\"5784\" data-end=\"5811\" data-col-size=\"sm\">Risk Level for Business<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"5891\" data-end=\"6128\">\n<tr data-start=\"5891\" data-end=\"5969\">\n<td data-start=\"5891\" data-end=\"5911\" data-col-size=\"sm\">Malware<\/td>\n<td data-start=\"5911\" data-end=\"5942\" data-col-size=\"sm\">Viruses, ransomware<\/td>\n<td data-start=\"5942\" data-end=\"5969\" data-col-size=\"sm\">High<\/td>\n<\/tr>\n<tr data-start=\"5970\" data-end=\"6048\">\n<td data-start=\"5970\" data-end=\"5990\" data-col-size=\"sm\">Phishing<\/td>\n<td data-start=\"5990\" data-end=\"6021\" data-col-size=\"sm\">Fake emails &amp; websites<\/td>\n<td data-start=\"6021\" data-end=\"6048\" data-col-size=\"sm\">High<\/td>\n<\/tr>\n<tr data-start=\"6049\" data-end=\"6128\">\n<td data-start=\"6049\" data-end=\"6069\" data-col-size=\"sm\">Deepfakes<\/td>\n<td data-start=\"6069\" data-end=\"6100\" data-col-size=\"sm\">Fake audio\/video scams<\/td>\n<td data-start=\"6100\" data-end=\"6128\" data-col-size=\"sm\">Emerging but growing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p data-start=\"6130\" data-end=\"6259\">\n<p data-start=\"6130\" data-end=\"6259\">\n<p data-start=\"6130\" data-end=\"6259\"><strong>\ud83d\udc49 Verdict:<\/strong> Deepfakes are becoming just as dangerous as traditional cyberattacks, especially in <strong data-start=\"6226\" data-end=\"6256\">social engineering schemes<\/strong>.<\/p>\n<h3 data-start=\"6266\" data-end=\"6300\">Best Practices for IT Leaders<\/h3>\n<p data-start=\"6302\" data-end=\"6355\"><strong>To reduce risks, IT managers and executives should:<\/strong><\/p>\n<ul data-start=\"6357\" data-end=\"6761\">\n<li data-start=\"6357\" data-end=\"6429\">\n<p data-start=\"6359\" data-end=\"6429\">Build <strong data-start=\"6365\" data-end=\"6392\">incident response plans<\/strong> that account for deepfake threats.<\/p>\n<\/li>\n<li data-start=\"6430\" data-end=\"6502\">\n<p data-start=\"6432\" data-end=\"6502\">Deploy <strong data-start=\"6439\" data-end=\"6469\">AI-powered detection tools<\/strong> to analyze media authenticity.<\/p>\n<\/li>\n<li data-start=\"6503\" data-end=\"6559\">\n<p data-start=\"6505\" data-end=\"6559\">Integrate <strong data-start=\"6515\" data-end=\"6532\">EDR solutions<\/strong> for endpoint monitoring.<\/p>\n<\/li>\n<li data-start=\"6560\" data-end=\"6662\">\n<p data-start=\"6562\" data-end=\"6662\">Regularly <strong data-start=\"6572\" data-end=\"6606\">review communication protocols<\/strong> to avoid relying solely on audio\/video confirmations.<\/p>\n<\/li>\n<li data-start=\"6663\" data-end=\"6761\">\n<p data-start=\"6665\" data-end=\"6761\">Encourage a <strong data-start=\"6677\" data-end=\"6704\">culture of verification<\/strong>\u2014employees should always double-check unusual requests.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"6768\" data-end=\"6798\"><strong>FAQs: What Are Deepfakes?<\/strong><\/h3>\n<p data-start=\"6800\" data-end=\"6973\"><strong data-start=\"6800\" data-end=\"6829\">1. Are deepfakes illegal?<\/strong><br data-start=\"6829\" data-end=\"6832\" \/>Not always. Some are used legally in entertainment or education, but malicious deepfakes (fraud, defamation) are illegal in many countries.<\/p>\n<p data-start=\"6975\" data-end=\"7115\"><strong data-start=\"6975\" data-end=\"7008\">2. Can deepfakes be detected?<\/strong><br data-start=\"7008\" data-end=\"7011\" \/>Yes, though it\u2019s challenging. AI tools and human analysis together provide the best detection results.<\/p>\n<p data-start=\"7117\" data-end=\"7266\"><strong data-start=\"7117\" data-end=\"7152\">3. Why are deepfakes dangerous?<\/strong><br data-start=\"7152\" data-end=\"7155\" \/>Because they exploit trust\u2014making people believe false information, enabling fraud, and damaging reputations.<\/p>\n<p data-start=\"7268\" data-end=\"7415\"><strong data-start=\"7268\" data-end=\"7319\">4. Do businesses need to worry about deepfakes?<\/strong><br data-start=\"7319\" data-end=\"7322\" \/>Absolutely. Enterprises are prime targets for financial scams and disinformation campaigns.<\/p>\n<p data-start=\"7417\" data-end=\"7570\"><strong data-start=\"7417\" data-end=\"7453\">5. How can companies fight back?<\/strong><br data-start=\"7453\" data-end=\"7456\" \/>Through <strong data-start=\"7464\" data-end=\"7529\">employee training, MFA, EDR solutions, and AI detection tools<\/strong> to identify and stop deepfake threats.<\/p>\n<h4 data-start=\"7577\" data-end=\"7638\">Conclusion: Deepfakes as the Next Cybersecurity Frontier<\/h4>\n<p data-start=\"7640\" data-end=\"7920\">So, <strong><em data-start=\"7644\" data-end=\"7664\">what are deepfakes<\/em><\/strong>? They are AI-generated synthetic media that can be used for good\u2014or exploited for fraud, disinformation, and cybercrime. For IT managers, CEOs, and cybersecurity professionals, deepfakes represent an <strong data-start=\"7865\" data-end=\"7917\">emerging threat that demands immediate attention<\/strong>.<\/p>\n<p data-start=\"7922\" data-end=\"8103\">While detection tools are improving, the best defense lies in <strong data-start=\"7984\" data-end=\"8015\">layered security strategies<\/strong>: combining education, strict verification, and advanced tools like <strong data-start=\"8083\" data-end=\"8100\">EDR solutions<\/strong>.<\/p>\n<p data-start=\"8105\" data-end=\"8268\">\ud83d\udc49 Don\u2019t wait until your organization becomes a target. Protect your endpoints today: <a class=\"decorated-link\" href=\"https:\/\/openedr.platform.xcitium.com\/register\/\" target=\"_new\" rel=\"noopener\" data-start=\"8191\" data-end=\"8266\">Register for OpenEDR Free<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever seen a video of a celebrity saying something outrageous\u2014only to discover later it wasn\u2019t real? That\u2019s the power (and danger) of deepfakes. With artificial intelligence (AI) and machine learning advancing rapidly, many are asking: what are deepfakes and why do they matter for cybersecurity and business? Deepfakes are AI-generated videos, images, or&hellip; <a class=\"more-link\" href=\"https:\/\/www.openedr.com\/blog\/what-are-deepfakes\/\">Continue reading <span class=\"screen-reader-text\">What Are Deepfakes? A Complete Guide to Synthetic Media<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":15752,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"_links":{"self":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/15742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/comments?post=15742"}],"version-history":[{"count":1,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/15742\/revisions"}],"predecessor-version":[{"id":15762,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/15742\/revisions\/15762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/media\/15752"}],"wp:attachment":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/media?parent=15742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/categories?post=15742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/tags?post=15742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}