{"id":4657,"date":"2010-12-20T09:00:22","date_gmt":"2010-12-20T17:00:22","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4657"},"modified":"2020-05-06T10:31:45","modified_gmt":"2020-05-06T17:31:45","slug":"grabbing-the-third-rail","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/","title":{"rendered":"Grabbing the Third Rail"},"content":{"rendered":"<p style=\"font-weight: 300;\">Much of the time I have a blog entry due, I find myself casting about for good topics. Sometimes I turn to (my literally dozens of)\u00a0<a href=\"http:\/\/twitter.com\/cricketondns\">Twitter<\/a>\u00a0followers for inspiration.\u00a0Sometimes I go whine to Jen, our PR manager and my de facto editor, about how hard it is to think up new subjects regularly, and she reminds me of a topic I came up with weeks ago and promptly forgot.<\/p>\n<p style=\"font-weight: 300;\">This week, though, I find myself with an obvious topic but afraid to touch it.\u00a0But as my wife will attest, discretion has never been my strong suit, so here goes.<\/p>\n<p style=\"font-weight: 300;\"><a href=\"http:\/\/www.ice.gov\/news\/releases\/1011\/101129washington.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Last month, the U.S. government seized of dozens of domain names allegedly associated with the illeg&#8230;<\/a>\u00a0Based on the description of the operation on ICEs web site, the case against the owners of these web sites appears strong.\u00a0And I&#8217;m very sympathetic to the plight of copyright holders as a copyright holder myself, who often finds\u00a0<a href=\"http:\/\/docstore.mik.ua\/orelly\/networking_2ndEd\/dns\/\" target=\"_blank\" rel=\"noopener noreferrer\">his works posted on web sites outside U.S. law enforcement jurisdiction<\/a>.<\/p>\n<p style=\"font-weight: 300;\">But these seizures accomplish more than just shutting down a web site.<\/p>\n<p style=\"font-weight: 300;\">First, they increase the perception that the U.S. government has a special and privileged role in Internet governance.\u00a0Could the government of Bhutan have forced VeriSign to change the delegation of 82 domains as easily as Washington did?\u00a0I doubt it.<\/p>\n<p style=\"font-weight: 300;\">The seizures also raise the question of jurisdiction.\u00a0Is the Internet subject to the laws of every country on Earth?\u00a0If a company&#8217;s web site runs afoul of the regulations of some random reactionary regime, can that regime demand the companys domain name?\u00a0Or does each registry answer only to the laws of the country in which it&#8217;s incorporated?\u00a0In which case, couldn&#8217;t registry operators flee to some permissive nation, some Switzerland of smut or Panama of porn?<\/p>\n<p style=\"font-weight: 300;\">Theres also the issue of due process (in my opinion, anyway, and I&#8217;m certainly no lawyer). From\u00a0<a href=\"http:\/\/www.ice.gov\/doclib\/news\/releases\/2010\/domain_names.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">the list of domain names involved<\/a>, these companies were small players, and ICEs release says many were based outside the U.S.\u00a0ICE went to U.S. magistrate judges to issue the orders to seize the domain names, so there&#8217;s evidently some process at work.\u00a0But I have no doubt that there are bigger U.S. companies who inadvertently, I&#8217;m sure, are involved in trafficking counterfeit goods.\u00a0Had they been implicated, I can&#8217;t imagine the government would have simply seized their domain names without warning.<\/p>\n<p style=\"font-weight: 300;\">Finally, I&#8217;m not convinced of the long-term efficacy of commandeering a domain name.\u00a0How much effort is it for the affected merchant to buy a new domain name from a registry beyond the reach of ICE?\u00a0Isn&#8217;t this just the beginning of a game of global\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Whac-A-Mole\" target=\"_blank\" rel=\"noopener noreferrer\">Whac-A-Mole<\/a>?\u00a0(&lt;- Please note my careful use of the trademark symbol.)<\/p>\n<p style=\"font-weight: 300;\">As I said before, though, I&#8217;m not a lawyer, and I leave it to those of you who are to set me right and explain why my fears are unjustified.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Much of the time I have a blog entry due, I find myself casting about for good topics. Sometimes I turn to (my literally dozens of)\u00a0Twitter\u00a0followers for inspiration.\u00a0Sometimes I go whine to Jen, our PR manager and my de facto editor, about how hard it is to think up new subjects regularly, and she reminds [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,230,16,15],"class_list":{"0":"post-4657","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-domains","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Grabbing the Third Rail<\/title>\n<meta name=\"description\" content=\"Much of the time I have a blog entry due, I find myself casting about for good topics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Grabbing the Third Rail\" \/>\n<meta property=\"og:description\" content=\"Much of the time I have a blog entry due, I find myself casting about for good topics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-12-20T17:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Grabbing the Third Rail\",\"datePublished\":\"2010-12-20T17:00:22+00:00\",\"dateModified\":\"2020-05-06T17:31:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/\"},\"wordCount\":507,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"keywords\":[\"DNS\",\"Domains\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/\",\"name\":\"Grabbing the Third Rail\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"datePublished\":\"2010-12-20T17:00:22+00:00\",\"dateModified\":\"2020-05-06T17:31:45+00:00\",\"description\":\"Much of the time I have a blog entry due, I find myself casting about for good topics.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/spotlightonsecuritycommunity.jpg\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/grabbing-the-third-rail\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Grabbing the Third Rail\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Grabbing the Third Rail","description":"Much of the time I have a blog entry due, I find myself casting about for good topics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/","og_locale":"en_US","og_type":"article","og_title":"Grabbing the Third Rail","og_description":"Much of the time I have a blog entry due, I find myself casting about for good topics.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/","og_site_name":"Infoblox Blog","article_published_time":"2010-12-20T17:00:22+00:00","article_modified_time":"2020-05-06T17:31:45+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Grabbing the Third Rail","datePublished":"2010-12-20T17:00:22+00:00","dateModified":"2020-05-06T17:31:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/"},"wordCount":507,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","keywords":["DNS","Domains","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/","url":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/","name":"Grabbing the Third Rail","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","datePublished":"2010-12-20T17:00:22+00:00","dateModified":"2020-05-06T17:31:45+00:00","description":"Much of the time I have a blog entry due, I find myself casting about for good topics.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/spotlightonsecuritycommunity.jpg","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/grabbing-the-third-rail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Grabbing the Third Rail"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4657"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4657\/revisions"}],"predecessor-version":[{"id":4658,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4657\/revisions\/4658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2420"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}