{"id":2571,"date":"2026-03-10T19:15:33","date_gmt":"2026-03-10T19:15:33","guid":{"rendered":"https:\/\/remote-support.space\/wordpress\/?p=2571"},"modified":"2026-03-10T19:33:16","modified_gmt":"2026-03-10T19:33:16","slug":"touch-my-noob-and-i-kick-your-ass-why-phishing-the-linux-ecosystem-is-a-bad-bet","status":"publish","type":"post","link":"https:\/\/remote-support.space\/wordpress\/2026\/03\/10\/touch-my-noob-and-i-kick-your-ass-why-phishing-the-linux-ecosystem-is-a-bad-bet\/","title":{"rendered":"Touch My Noob, and I Kick Your Ass: Why Phishing the Linux Ecosystem Is a Bad Bet"},"content":{"rendered":"<h1 dir=\"ltr\" data-pm-slice=\"0 0 []\">Touch My Noob, and I Kick Your Ass: Why Phishing the Linux Ecosystem Is a Bad Bet<\/h1>\n<p>By : Khawar Nehal<\/p>\n<p>Date : 11 March 2026<\/p>\n<blockquote dir=\"ltr\">\n<p dir=\"ltr\"><em>&#8220;You think you&#8217;re phishing a lone newbie? Cute. You just poked a hornet&#8217;s nest wearing a <\/em><code>sudo<\/code><em> badge.&#8221;<\/em><\/p>\n<\/blockquote>\n<p dir=\"ltr\">Let&#8217;s be clear: <strong>Phishing is illegal, full stop.<\/strong> No ethical security researcher, sysadmin, or community member advocates for vigilante justice that breaks the law. But if you&#8217;re a threat actor doing cold, hard risk\/reward math, here&#8217;s the uncomfortable truth: <strong>Targeting the Linux ecosystem\u2014even its &#8220;newbies&#8221;\u2014carries uniquely high operational risk.<\/strong><\/p>\n<p dir=\"ltr\">This isn&#8217;t fanboyism. It&#8217;s ecosystem dynamics. Let&#8217;s break down why.<\/p>\n<hr \/>\n<h2 dir=\"ltr\">\ud83d\udd0d The Newbie Paradox: They&#8217;re Never Actually Alone<\/h2>\n<p dir=\"ltr\">First, let&#8217;s dismantle the myth of the &#8220;lone Linux newbie.&#8221;<\/p>\n<div class=\"table-wrapper\">\n<table>\n<tbody>\n<tr>\n<th dir=\"ltr\">How They Got Linux<\/th>\n<th dir=\"ltr\">What It Really Means<\/th>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83c\udf93 <strong>University CS program<\/strong><\/td>\n<td dir=\"ltr\">Their &#8220;newbie&#8221; workstation is monitored by campus SOC. Email logs go to a security team. A phishing attempt isn&#8217;t just a user problem\u2014it&#8217;s an <em>incident ticket<\/em>.<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83d\udcbc <strong>Corporate IT deployment<\/strong><\/td>\n<td dir=\"ltr\">That &#8220;newbie&#8221; is an employee. Their machine has EDR agents, centralized logging, and a security team that <em>gets paid to hunt threats<\/em>. Your phishing email just triggered an alert.<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83d\udd2c <strong>Research\/HPC access<\/strong><\/td>\n<td dir=\"ltr\">They&#8217;re using infrastructure managed by sysadmins who monitor for anomalies 24\/7. A weird process? A suspicious outbound connection? That&#8217;s a page at 3 AM.<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\u2601\ufe0f <strong>Cloud\/dev onboarding<\/strong><\/td>\n<td dir=\"ltr\">They followed a tutorial. That tutorial&#8217;s comments, the cloud provider&#8217;s security team, and the distro&#8217;s forum are all one search away from analyzing your payload.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p dir=\"ltr\"><strong>The reality<\/strong>: A &#8220;newbie&#8221; Linux user is statistically far more likely to be embedded in an environment with technical oversight than a random consumer downloading freeware on Windows. You&#8217;re not phishing a person\u2014you&#8217;re phishing a <em>node in a monitored network<\/em>.<\/p>\n<hr \/>\n<h2 dir=\"ltr\">\ud83e\udd1d The Community Force Multiplier: One Report, Thousand Eyes<\/h2>\n<p dir=\"ltr\">Even if the newbie doesn&#8217;t recognize the phishing attempt, the Linux community&#8217;s culture turns a single report into a coordinated defense.<\/p>\n<h3 dir=\"ltr\">The Escalation Chain (Real-World Example)<\/h3>\n<pre><code class=\"language-plaintext\">1. Newbie receives suspicious email \u2192 posts to r\/linuxquestions\r\n2. Experienced user analyzes headers, spots malicious domain\r\n3. Domain reported to registrar abuse contact + hosting provider\r\n4. IOC shared on MISP instance used by university SOC\r\n5. Threat intel firm picks up the pattern, publishes advisory\r\n6. Distros push firewall rules \/ email filter updates within hours\r\n7. Your infrastructure is now burned across the ecosystem<\/code><\/pre>\n<p dir=\"ltr\">This isn&#8217;t hypothetical. Platforms like:<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>MISP<\/strong> (Malware Information Sharing Platform)<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>OSSEC<\/strong> (open-source HIDS)<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>TheHive<\/strong> (incident response)<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>VirusTotal<\/strong> (public malware analysis)<\/p>\n<\/li>\n<\/ul>\n<p dir=\"ltr\">&#8230;are <em>heavily<\/em> used by the Linux\/security community. A single analyzed sample can propagate defensive rules globally before your next coffee break.<\/p>\n<hr \/>\n<h2 dir=\"ltr\">\ud83d\udd13 The Open-Source Advantage: Transparency Is a Weapon<\/h2>\n<p dir=\"ltr\">If your sophisticated phishing payload relies on a software vulnerability, you&#8217;ve just entered a arena where the rules favor defenders.<\/p>\n<h3 dir=\"ltr\">Why Open Source Changes the Game<\/h3>\n<div class=\"table-wrapper\">\n<table>\n<tbody>\n<tr>\n<th dir=\"ltr\">Closed-Source Ecosystem<\/th>\n<th dir=\"ltr\">Linux\/Open-Source Ecosystem<\/th>\n<\/tr>\n<tr>\n<td dir=\"ltr\">Vulnerability discovery relies on vendor internal teams<\/td>\n<td dir=\"ltr\">Thousands of developers can audit the code <em>simultaneously<\/em><\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">Patch cycles: weeks to months<\/td>\n<td dir=\"ltr\">Critical patches: often hours to days<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">Exploit details stay secret longer<\/td>\n<td dir=\"ltr\">Once a sample is public, the race to patch begins immediately<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">Reverse engineering is legally murky<\/td>\n<td dir=\"ltr\">Dissection, sharing, and collaborative analysis are <em>cultural norms<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p dir=\"ltr\"><strong>Real impact<\/strong>: The 2021 <code>sudo<\/code> vulnerability (CVE-2021-3156) was patched rapidly <em>because<\/em> the community could audit the fix, test across distros, and deploy updates at scale. A phishing campaign exploiting a similar flaw would see its window of opportunity slam shut faster than in proprietary environments.<\/p>\n<hr \/>\n<h2 dir=\"ltr\">\ud83d\udcb0 The Economic Engine: Bounty Hunters, Academia, and Threat Intel<\/h2>\n<p dir=\"ltr\">Sophistication attracts attention. And attention attracts <em>incentivized hunters<\/em>.<\/p>\n<h3 dir=\"ltr\">Who&#8217;s Watching, and Why They Care<\/h3>\n<div class=\"table-wrapper\">\n<table>\n<tbody>\n<tr>\n<th dir=\"ltr\">Actor<\/th>\n<th dir=\"ltr\">Motivation<\/th>\n<th dir=\"ltr\">What They Do With Your Attack<\/th>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83c\udf81 <strong>Bug Bounty Hunters<\/strong><\/td>\n<td dir=\"ltr\">Financial reward ($500\u2013$100k+)<\/td>\n<td dir=\"ltr\">Reverse-engineer your exploit, submit a patch, claim the bounty. Your zero-day is now public.<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83c\udf93 <strong>Academic Researchers<\/strong><\/td>\n<td dir=\"ltr\">Publications, grants, reputation<\/td>\n<td dir=\"ltr\">Publish a paper analyzing your TTPs. Your methods become a case study for defenders worldwide.<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83c\udfe2 <strong>Threat Intel Firms<\/strong><\/td>\n<td dir=\"ltr\">Client subscriptions, threat tracking<\/td>\n<td dir=\"ltr\">Tag your group, catalog your infrastructure, sell intelligence to enterprises hunting you.<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\">\ud83d\udc27 <strong>Distro Security Teams<\/strong><\/td>\n<td dir=\"ltr\">Protect their users, maintain trust<\/td>\n<td dir=\"ltr\">Push emergency updates, blacklist your domains, coordinate with upstream projects.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p dir=\"ltr\"><strong>The kicker<\/strong>: These actors <em>want<\/em> sophisticated attacks to analyze. Your &#8220;elite&#8221; phishing campaign isn&#8217;t a threat to them\u2014it&#8217;s <em>career fuel<\/em>.<\/p>\n<hr \/>\n<h2 dir=\"ltr\">\ud83e\ude9c The Escalation Ladder: What Happens When You Attack<\/h2>\n<p dir=\"ltr\">Let&#8217;s walk through the likely lifecycle of a sophisticated phishing attempt against a Linux-using newbie:<\/p>\n<p dir=\"ltr\"><code class=\"language-mermaid\"><\/code>\ud83d\udce7 <strong>Phishing Email Sent: Who&#8217;s Actually Behind That &#8220;Newbie&#8221; Linux User?<\/strong><br \/>\n\u2502<br \/>\n\u251c\u2500 \ud83c\udfae <strong>User is self-selected hobbyist<\/strong> (<span class=\"keep-md\">~<\/span>1-5% chance)<br \/>\n\u2502 \u2514\u2500 \ud83e\udd37 May lack expertise to escalate, but might post to forums \ud83d\udde8\ufe0f<br \/>\n\u2502<br \/>\n\u251c\u2500 <strong>User is student in academic program<\/strong> (<span class=\"keep-md\">~<\/span>30-40% estimated)<br \/>\n\u2502 \u2514\u2500 \ud83d\udce2 Likely to report to campus IT\/security team \ud83d\udee1\ufe0f<br \/>\n\u2502 \u2514\u2500 \ud83d\udc68\u200d\ud83c\udfeb Instructor or TA may investigate as teaching moment \ud83d\udd0d<br \/>\n\u2502 \u2514\u2500 \ud83c\udfeb University SOC may trace and report to authorities \u2696\ufe0f<br \/>\n\u2502<br \/>\n\u251c\u2500 \ud83d\udcbc <strong>User is employee with assigned workstation<\/strong> (<span class=\"keep-md\">~<\/span>25-35% estimated)<br \/>\n\u2502 \u2514\u2500 \ud83e\udd16 Corporate security tools may auto-flag the phishing attempt \ud83d\udea8<br \/>\n\u2502 \u2514\u2500 \ud83d\udd10 SOC\/IR team investigates; may engage threat intel sharing \ud83c\udf10<br \/>\n\u2502 \u2514\u2500 \u2696\ufe0f Legal\/compliance teams may pursue action if breach risk exists \ud83d\udccb<br \/>\n\u2502<br \/>\n\u2514\u2500 \ud83d\udd2c <strong>User is researcher on institutional infrastructure<\/strong> (<span class=\"keep-md\">~<\/span>15-25% estimated)<br \/>\n\u2514\u2500 \ud83d\udc68\u200d\ud83d\udcbb Research computing support staff monitor for anomalies \ud83d\udcca<br \/>\n\u2514\u2500 \ud83d\ude80 HPC\/sysadmin communities share threat indicators rapidly \u26a1<\/p>\n<p dir=\"ltr\">\n<hr \/>\n<p dir=\"ltr\">\ud83d\udd04 <strong>The Escalation Timeline: From Phish to Fallout<\/strong><\/p>\n<pre dir=\"ltr\">\ud83d\udce7 <strong>A: Phishing email sent<\/strong> \r\n\u2502 \r\n\u25bc \r\n\u2753 <strong>B: User reports OR system auto-detects<\/strong> \r\n\u2502\r\n\u25bc\r\n\ud83d\udce4 <strong>C: Sample uploaded to VirusTotal \/ GitHub<\/strong> \r\n\u2502 \r\n\u25bc\r\n \ud83d\udd0d <strong>D: Community reverse-engineers payload<\/strong> \r\n\u2502 \r\n\u25bc \r\n\ud83c\udf10 <strong>E: IOC shared via MISP \/ forums<\/strong> \r\n\u2502 \r\n\u25bc \r\n\ud83d\udee0\ufe0f <strong>F: Distros push filters \/ patches<\/strong> \r\n\u2502\r\n\u25bc\r\n\ud83d\udcc8 <strong>G: Threat intel firms catalog TTPs<\/strong> \r\n\u2502 \r\n\u25bc\r\n\ud83d\udd25 <strong>H: Attacker infrastructure burned<\/strong> \r\n\u2502\r\n\u25bc \r\n\ud83c\udfaf <strong>I: Attribution efforts begin<\/strong>\r\n\r\n<\/pre>\n<hr \/>\n<p dir=\"ltr\">\u23f1\ufe0f <strong>Rough Time Estimates<\/strong><\/p>\n<p dir=\"ltr\">\ud83d\udd50 <strong>Hour 0\u20132<\/strong>: Payload analyzed, initial IOCs extracted \ud83e\uddea<\/p>\n<p dir=\"ltr\">\ud83d\udd51 <strong>Hour 2\u201312<\/strong>: Community forums light up; distro security teams notified \ud83d\udce3<\/p>\n<p dir=\"ltr\"><strong>Hour 12\u201348<\/strong>: Patches or filter rules deployed; threat intel advisories published \ud83d\ude80<\/p>\n<p dir=\"ltr\"><strong>Day 3\u20137<\/strong>: Academic pre-prints or blog posts dissecting the attack appear \ud83d\udcda \ud83d\uddd3\ufe0f<\/p>\n<p dir=\"ltr\"><strong>Week 2+<\/strong>: Law enforcement or CERT teams may engage if scale\/impact warrants \u2696\ufe0f<\/p>\n<p dir=\"ltr\">Compare this to a phishing campaign against a less-monitored ecosystem, where samples might stay siloed in private AV databases for weeks.<\/p>\n<p dir=\"ltr\">\n<hr \/>\n<p dir=\"ltr\">\ud83c\udfaf <strong>Bottom Line<\/strong><\/p>\n<blockquote dir=\"ltr\">\n<p dir=\"ltr\">Touch the noob \ud83d\udc27 \u27a1\ufe0f Wake the hive \ud83d\udc1d \u27a1\ufe0f Get kicked \ud83e\uddb6<\/p>\n<\/blockquote>\n<p dir=\"ltr\"><em>Stay ethical. Stay sharp. Report phishing. \ud83d\udee1\ufe0f<\/em><\/p>\n<p dir=\"ltr\">\n<hr \/>\n<h2 dir=\"ltr\">\u2696\ufe0f The Attacker&#8217;s Dilemma: Risk\/Reward Recalculated<\/h2>\n<p dir=\"ltr\">Let&#8217;s get coldly pragmatic. If you&#8217;re a threat actor optimizing for profit vs. risk:<\/p>\n<div class=\"table-wrapper\">\n<table>\n<tbody>\n<tr>\n<th dir=\"ltr\">Factor<\/th>\n<th dir=\"ltr\">Targeting Generic Consumers<\/th>\n<th dir=\"ltr\">Targeting Linux Ecosystem<\/th>\n<\/tr>\n<tr>\n<td dir=\"ltr\"><strong>Payload lifespan<\/strong><\/td>\n<td dir=\"ltr\">Weeks\u2013months<\/td>\n<td dir=\"ltr\">Hours\u2013days<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\"><strong>Infrastructure burn rate<\/strong><\/td>\n<td dir=\"ltr\">Slow (individual blocks)<\/td>\n<td dir=\"ltr\">Fast (community-wide blocklists)<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\"><strong>Analysis exposure<\/strong><\/td>\n<td dir=\"ltr\">Low (samples often private)<\/td>\n<td dir=\"ltr\">High (samples often public\/shared)<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\"><strong>Attribution risk<\/strong><\/td>\n<td dir=\"ltr\">Low (high noise, low signal)<\/td>\n<td dir=\"ltr\">Medium\/High (sophistication draws expert attention)<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\"><strong>Economic counter-pressure<\/strong><\/td>\n<td dir=\"ltr\">Minimal<\/td>\n<td dir=\"ltr\">High (bounties, research incentives)<\/td>\n<\/tr>\n<tr>\n<td dir=\"ltr\"><strong>Retaliation potential<\/strong><\/td>\n<td dir=\"ltr\">Rare<\/td>\n<td dir=\"ltr\">Possible (active defense, legal follow-up)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p dir=\"ltr\"><strong>The bottom line for attackers<\/strong>: The Linux ecosystem isn&#8217;t just harder to exploit\u2014it&#8217;s <em>actively hostile<\/em> to sustained, low-visibility operations. You&#8217;re not just fighting a user; you&#8217;re fighting a globally distributed, incentivized, transparent defense network.<\/p>\n<hr \/>\n<h2 dir=\"ltr\">\ud83c\udfaf Conclusion: Respect the Ecosystem<\/h2>\n<blockquote dir=\"ltr\">\n<p dir=\"ltr\"><em>&#8220;You touch my noob, and I kick your ass&#8221;<\/em> isn&#8217;t a threat of vigilante violence. It&#8217;s a statement of ecosystem reality.<\/p>\n<\/blockquote>\n<p dir=\"ltr\">When you target <em>any<\/em> user with phishing, you break the law. But when you target the Linux ecosystem\u2014even its newest members\u2014you trigger a cascade of technical, economic, and community-driven responses that dramatically increase your operational risk.<\/p>\n<h3 dir=\"ltr\">For Defenders: Turn Newbies Into Sensors<\/h3>\n<p dir=\"ltr\">If you support Linux-using students, junior staff, or community newcomers:<\/p>\n<ol>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Teach reporting pathways<\/strong>: Make it easy to flag suspicious emails internally or to trusted forums.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Share basic analysis skills<\/strong>: Show them how to check email headers, verify URLs, and use <code>whois<\/code>.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Connect them to community resources<\/strong>: Point them to distro security pages, r\/netsec, or local LUGs.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\"><strong>Normalize curiosity<\/strong>: A &#8220;dumb question&#8221; in a forum might be the first alert that stops a campaign.<\/p>\n<\/li>\n<\/ol>\n<h3 dir=\"ltr\">For Everyone: Stay Ethical, Stay Sharp<\/h3>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\">\ud83d\udee1\ufe0f <strong>Users<\/strong>: Enable MFA, verify senders, keep systems updated.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">\ud83d\udd0d <strong>Researchers<\/strong>: Pursue ethical pathways\u2014bug bounties, authorized pentesting, academic collaboration.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">\u2696\ufe0f <strong>All<\/strong>: Report phishing to appropriate authorities (APWG, CERT, local law enforcement).<\/p>\n<\/li>\n<\/ul>\n<hr \/>\n<blockquote dir=\"ltr\">\n<p dir=\"ltr\"><strong>TL;DR<\/strong>: Phishing a Linux &#8220;newbie&#8221; isn&#8217;t like phishing a random consumer. Statistically, that newbie is embedded in an institution, supported by a community, and backed by an open-source ecosystem that turns attacks into collaborative defense opportunities. For a threat actor, that&#8217;s not a soft target\u2014that&#8217;s a high-risk, low-reward proposition.<\/p>\n<p dir=\"ltr\"><em>So yes: touch the noob, and the ecosystem kicks back. Not with rage\u2014with code, collaboration, and consequence.<\/em><\/p>\n<\/blockquote>\n<p dir=\"ltr\"><em>Disclaimer: This article discusses defensive dynamics for educational purposes. Phishing is illegal in virtually all jurisdictions. Always pursue security research through authorized, ethical channels.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Touch My Noob, and I Kick Your Ass: Why Phishing the Linux Ecosystem Is a Bad Bet By : Khawar Nehal Date : 11 March 2026 &#8220;You think you&#8217;re phishing a lone newbie? Cute. You just poked a hornet&#8217;s nest wearing a sudo badge.&#8221; Let&#8217;s be clear: Phishing is illegal, full stop. No ethical security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-2571","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/posts\/2571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/comments?post=2571"}],"version-history":[{"count":4,"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/posts\/2571\/revisions"}],"predecessor-version":[{"id":2576,"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/posts\/2571\/revisions\/2576"}],"wp:attachment":[{"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/media?parent=2571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/categories?post=2571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/remote-support.space\/wordpress\/wp-json\/wp\/v2\/tags?post=2571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}