{"id":997234,"date":"2025-07-18T12:17:00","date_gmt":"2025-07-18T04:17:00","guid":{"rendered":"https:\/\/geetests.com\/article\/ecommerce-fraud-protection"},"modified":"2025-12-04T15:17:09","modified_gmt":"2025-12-04T07:17:09","slug":"ecommerce-fraud-protection","status":"publish","type":"post","link":"\/en\/article\/ecommerce-fraud-protection","title":{"rendered":"Smart E-commerce Fraud Prevention Tactics for 2025"},"content":{"rendered":"<div class=\"vgblk-rw-wrapper limit-wrapper\"><span class=\"ql-size-16px\">E-commerce fraud, encompassing illicit activities that exploit online retail systems, poses a growing threat to businesses and consumers in 2025. As e-commerce continues to dominate global retail, driven by seamless digital platforms and innovative payment solutions, fraudsters have adapted, employing advanced technologies to perpetrate scams. Addressing this issue is critical to preserving consumer trust, protecting financial stability, and ensuring compliance with evolving regulations. In 2025, the e-commerce ecosystem thrives on AI-driven personalization, global supply chains, and emerging payment methods, but these advancements also create new vulnerabilities for fraud.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">The State of E-commerce Fraud in 2025<\/strong><\/h2>\n<h3><strong class=\"ql-size-22px\">Market Context<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">With consumers embracing omnichannel shopping and digital wallets becoming mainstream, the digital attack surface has expanded. Every touchpoint, login, checkout, loyalty programs, and even customer service is now a potential vector for fraud.<\/span><\/p>\n<p><span class=\"ql-size-16px\">Additionally, the return of Trump-era tariffs in 2025 has introduced new volatility into global supply chains. Increased import duties on consumer electronics, fashion, and other high-demand goods have led to price surges. Fraudsters exploit this economic tension by targeting marketplaces with counterfeit goods, fake promotions, and phishing scams promising tariff-free deals.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Fraud Statistics and Trends<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">According to recent forecasts, global e-commerce fraud losses are expected to exceed $80 billion in 2025. This marks a sharp increase from previous years, with industries like fashion, electronics, and digital goods being prime targets. Fraudsters are not only attacking more frequently but are also refining their methods using automation and artificial intelligence.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">Common Types of E-commerce Fraud in 2025<\/strong><\/h2>\n<h3><\/h3>\n<h3><strong class=\"ql-size-22px\">Account Takeover (ATO)<\/strong><\/h3>\n<p><a class=\"ql-size-16px\" href=\"https:\/\/blog.geetest.com\/en\/article\/prevent-account-takeover-from-damagin-your-business\" target=\"_blank\" rel=\"noopener noreferrer\">Account takeover attacks<\/a><span class=\"ql-size-16px\"> have surged, increasing by 131% in recent years. Attackers use stolen credentials to access customer accounts, often through brute-force attacks, credential stuffing, or phishing. Once inside, they change personal information, reset passwords, and make unauthorized purchases. Attackers mimic legitimate user behavior, making detection difficult. Businesses face loss of customer trust and brand reputation damage. Attackers may also use compromised accounts for internal phishing or to impersonate employees, leading to further financial and operational harm.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Synthetic Identity<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Synthetic identity fraud involves criminals combining real and fake information to create new identities. These identities open accounts, build credit, and make fraudulent purchases. This type of fraud often goes undetected for months, causing significant financial losses. E-commerce businesses struggle to identify synthetic identities because they appear legitimate in many systems. The impact includes increased chargebacks, regulatory scrutiny, and higher costs for e-commerce fraud prevention.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Payment &amp; Chargebacks<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Payment fraud and chargebacks directly affect the financial health of e-commerce businesses. Fraudsters use stolen payment information to make unauthorized purchases, resulting in chargebacks when customers dispute the transactions. LexisNexis&#8217; <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/risk.lexisnexis.com\/insights-resources\/research\/us-ca-true-cost-of-fraud-study\" target=\"_blank\" rel=\"noopener noreferrer\">True Cost of Fraud study<\/a><span class=\"ql-size-16px\"> shows that for every dollar lost to fraud, businesses may incur up to $4.41 in total costs, including fees and labor. High chargeback ratios can lead to higher processing fees or even loss of payment processing capabilities. These issues also damage customer retention and reputation, forcing businesses to invest more in fraud prevention technologies.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Friendly Fraud<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Friendly fraud occurs when customers dispute legitimate purchases, claiming they never received the product or did not authorize the transaction. This type of fraud accounts for 30% of purchase transaction fraud. Clothing, subscription goods, and electronics are the most disputed categories.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Automated Attacks<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Automated attacks target e-commerce platforms using bots and scripts. The most common forms include unauthorized access sales (46.82%), data-related content leaks (41.22%), and website attacks (10.53%). Attackers use <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/evrything-you-need-to-know-about-credential-stuffing\" target=\"_blank\" rel=\"noopener noreferrer\">credential stuffing<\/a><span class=\"ql-size-16px\">, phishing kits, payment skimming, and ransomware to exploit vulnerabilities. These attacks scale quickly due to dark web marketplaces trading stolen credentials and attack tools. Real-world incidents, such as breaches at major online retailers, highlight the growing threat. Automated attacks disrupt operations, compromise customer data, and increase the need for advanced e-commerce fraud prevention.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">The Expanding Threat Landscape of E-commerce Fraud in 2025<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">E-commerce fraud continues to evolve rapidly in 2025, driven by advanced technologies and shifting market dynamics. To fully grasp this expanding threat, it&#8217;s essential to understand the tools fraudsters use, the challenges businesses face, and which sectors are most at risk.<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Key Fraud Tactics and Tools in Use<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Fraudsters in 2025 are leveraging advanced tools to outpace traditional detection systems.<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Sophisticated Tools Used by Fraudsters:<\/strong><span class=\"ql-size-16px\"> AI and machine learning enable fraudsters to craft realistic synthetic identities and automate attacks. Bots are increasingly used for scalping, inventory hoarding, and credential stuffing, overwhelming e-commerce systems. These tools allow fraudsters to operate at scale, targeting multiple platforms simultaneously with minimal effort.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Dark Web Marketplaces: <\/strong><span class=\"ql-size-16px\">The dark web remains a hub for fraud, with marketplaces selling stolen data, counterfeit goods, and fraud tools. In 2025, these platforms have become more accessible, offering fraudsters everything from hacked account credentials to AI-generated phishing kits, amplifying the scale and sophistication of attacks.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Exploitation of New Payment Methods:<\/strong><span class=\"ql-size-16px\"> Emerging payment methods, such as Buy Now, Pay Later (BNPL) systems, have introduced new vulnerabilities. Fraudsters exploit gaps in BNPL verification processes to make purchases they never intend to pay for. Similarly, cryptocurrency transactions, while secure in theory, are exploited due to their irreversibility, making it difficult for merchants to recover funds from fraudulent purchases.<\/span><\/li>\n<\/ul>\n<h3><strong class=\"ql-size-22px\">Challenges for Businesses in 2025<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Businesses face multiple challenges in mitigating fraud:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Detection Complexity:<\/strong><span class=\"ql-size-16px\"> Modern attacks are multi-vector and low-and-slow, making them difficult to detect in real time.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">User Experience Trade-offs:<\/strong><span class=\"ql-size-16px\"> Stricter verification measures can harm conversion rates if not implemented thoughtfully.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Regulatory Burdens:<\/strong><span class=\"ql-size-16px\"> Companies must comply with varying regional regulations like GDPR, CCPA, and newer AI-specific laws.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Economic Disruptions: <\/strong><span class=\"ql-size-16px\">The reintroduction of Trump tariffs has caused shifts in product pricing, sourcing, and consumer behavior. As companies seek new suppliers or markets to reduce costs, fraudsters exploit transitional vulnerabilities, such as unknown vendors, weak inventory validation, or fake customs declarations.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Data Fragmentation:<\/strong><span class=\"ql-size-16px\"> Data spread across platforms, partners, and channels hinders cohesive fraud detection strategies.<\/span><\/li>\n<\/ul>\n<h3><strong class=\"ql-size-22px\">Businesses Most Vulnerable to E-commerce Fraud<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">While any business with an online presence can fall victim to e-commerce fraud, certain sectors face heightened risks due to their operational models, customer interactions, or transaction volumes.<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">High-Value Goods Retail: <\/strong><span class=\"ql-size-16px\">Businesses selling luxury items, electronics, or collectibles are prime targets due to the high resale value of their products. Fraudsters often use stolen payment details or fake identities to purchase these goods, reselling them for profit on secondary markets or the dark web.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Cross-Border E-commerce Platforms:<\/strong><span class=\"ql-size-16px\"> Companies operating internationally face unique challenges, as fraudsters exploit inconsistencies in payment verification across jurisdictions. The complexity of cross-border transactions, coupled with varying regulatory standards, makes these platforms vulnerable to fraudulent chargebacks and identity theft.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Digital Marketplace Aggregators:<\/strong><span class=\"ql-size-16px\"> Platforms that connect third-party sellers with buyers, such as those hosting artisanal goods or freelance services, are susceptible to fraud involving fake seller accounts, counterfeit products, or manipulated reviews. These marketplaces must monitor both buyers and sellers to prevent scams.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Crowdfunding and Pre-Order Platforms:<\/strong><span class=\"ql-size-16px\"> Businesses that collect funds for products or services before delivery, such as crowdfunding sites or pre-order-based retailers, are at risk of fraudulent contributions or fake campaigns. Fraudsters may create sham projects to siphon funds or use stolen credentials to back projects without intent to pay.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">On-Demand Service Providers:<\/strong><span class=\"ql-size-16px\"> Businesses offering instant services, such as food delivery, ride-sharing, or gig economy platforms, face risks from fraudulent accounts created to exploit promotional offers or discounts. These platforms often process high volumes of low-value transactions, making it harder to detect fraud in real time.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Virtual Event and Ticketing Platforms:<\/strong><span class=\"ql-size-16px\"> Online platforms selling tickets for virtual events, webinars, or live streams are vulnerable to fraudsters using stolen payment methods or creating fake accounts to resell access codes. The time-sensitive nature of these transactions complicates fraud detection efforts.<\/span><\/li>\n<\/ul>\n<p><span class=\"ql-size-16px\">This list is not exhaustive, as the expansion of digital commerce into new industries continues to broaden the scope of potential fraud targets.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">E-commerce Fraud Protection Strategies in 2025<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">Effectively combating e-commerce fraud demands a comprehensive strategy that safeguards business assets while preserving a smooth customer journey. The following core approaches are essential for building strong defenses against evolving fraud threats:<\/span><\/p>\n<h3><strong class=\"ql-size-22px\">Strengthen Identity Verification Protocols<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">To prevent unauthorized account access and fraudulent transactions, implement multiple layers of identity checks tailored to transaction risk levels:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Enhanced Authentication Methods:<\/strong><span class=\"ql-size-16px\"> Utilize layered verification techniques beyond simple passwords, such as hardware tokens or biometric scans, especially for sensitive actions like account modifications or high-value purchases.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Contextual Risk Assessment:<\/strong><span class=\"ql-size-16px\"> Dynamically adjust authentication demands based on transaction context, device reputation, and user behavior, ensuring minimal friction for trusted customers while flagging suspicious activity.<\/span><\/li>\n<\/ul>\n<h3><strong class=\"ql-size-22px\">Deploy Intelligent Fraud Detection Systems<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Adopt sophisticated technology solutions capable of continuous learning and adaptive threat detection:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">AI-Powered Analytics:<\/strong><span class=\"ql-size-16px\"> Leverage machine learning models that evolve with emerging fraud trends, enabling early detection and reducing incorrect flags that can harm user experience.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Behavioral Monitoring:<\/strong><span class=\"ql-size-16px\"> Track anomalies in user interactions such as unusual browsing paths, session durations, or rapid input sequences to identify potentially fraudulent behavior.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Device and Network Fingerprinting:<\/strong><span class=\"ql-size-16px\"> Build comprehensive profiles of devices and network environments used in transactions, aiding in recognizing repeated suspicious patterns across different accounts.<\/span><\/li>\n<\/ul>\n<h3><strong class=\"ql-size-22px\">Mitigate Automated and Bot-Driven Threats<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Bots pose a substantial risk by mimicking legitimate traffic and executing high-volume fraudulent actions:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Comprehensive Bot Defense: <\/strong><span class=\"ql-size-16px\">Integrate solutions that distinguish human users from automated scripts through behavior analysis, challenge-response tests, and fingerprinting techniques.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Secure All Access Points:<\/strong><span class=\"ql-size-16px\"> Extend protection beyond front-end websites to APIs and mobile applications, closing common loopholes fraudsters exploit.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Continuous Traffic Analysis:<\/strong><span class=\"ql-size-16px\"> Maintain baseline metrics of typical traffic flows and set automated alerts to detect sudden surges or unusual patterns indicative of bot attacks.<\/span><\/li>\n<\/ul>\n<h3><strong class=\"ql-size-22px\">Enhance Payment Security Infrastructure<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Securing payment channels reduces exposure to fraudulent charges and financial losses:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Address and Card Verification:<\/strong><span class=\"ql-size-16px\"> Confirm billing information accuracy through AVS and require card security codes to verify physical possession.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Next-Generation Payment Authentication:<\/strong><span class=\"ql-size-16px\"> Adopt standards like 3D Secure 2.0 that enhance security without compromising checkout speed or user convenience.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Data Tokenization:<\/strong><span class=\"ql-size-16px\"> Replace sensitive payment credentials with tokens during transaction processing to minimize risk if data interception occurs.<\/span><\/li>\n<\/ul>\n<h3><strong class=\"ql-size-22px\">Establish Robust Fraud Response Frameworks<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">Beyond technology, clear operational policies and trained personnel are vital:<\/span><\/p>\n<ul>\n<li><strong class=\"ql-size-16px\">Risk-Based Order Review: <\/strong><span class=\"ql-size-16px\">Define and automate criteria for flagging orders for manual inspection, focusing on factors such as new customer profiles, mismatched addresses, or atypical purchase sizes.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Efficient Dispute Handling:<\/strong><span class=\"ql-size-16px\"> Implement structured workflows to manage chargebacks and disputes, gathering necessary evidence promptly to contest fraudulent claims effectively.<\/span><\/li>\n<li><strong class=\"ql-size-16px\">Ongoing Staff Education:<\/strong><span class=\"ql-size-16px\"> Regularly train customer service and fraud prevention teams on the latest fraud methodologies and internal protocols to ensure rapid and accurate response.<\/span><\/li>\n<\/ul>\n<h2><strong class=\"ql-size-28px\">Real-World Case: CAPTCHA Bypass Leads to Payment System Attack in eCommerce<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">In 2024, a Magento 2 platform operator shared on Reddit their experience of a severe fraud attack that occurred shortly after integrating Braintree credit card payments. Within just a single day, over 118,000 fake transaction attempts were automatically submitted, putting the merchant&#8217;s payment system and business reputation at serious risk.<\/span><\/p>\n<p><span class=\"ql-size-16px\">Despite having deployed a <\/span><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/blog.geetest.com\/en\/article\/why-traditional-captcha-cannot-satisfy-the-needs-of-enterprises\" target=\"_blank\" rel=\"noopener noreferrer\">traditional CAPTCHA solution<\/a><span class=\"ql-size-16px\">, attackers easily bypassed it using automated scripts. The CAPTCHA failed to block the flood of fraudulent activity. Ultimately, the merchant had to temporarily shut down their payment gateway to avoid further financial losses and potential service outages.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/e8c9eb89-423b-44bd-9c51-e188f822544d.png\" alt=\"\"><\/p>\n<p class=\"ql-align-center\">\n<p class=\"ql-align-center\">\n<h2><strong class=\"ql-size-28px\">GeeTest&#8217;s Protective Advantage in Similar Scenarios<\/strong><\/h2>\n<p><a class=\"ql-size-16px\" style=\"color: #0066cc;\" href=\"https:\/\/www.geetest.com\/en\/adaptive-captcha\" target=\"_blank\" rel=\"noopener noreferrer\">GeeTest CAPTCHA<\/a><span class=\"ql-size-16px\"> offers a more resilient and intelligent alternative to traditional CAPTCHA systems, especially in high-risk use cases such as credit card testing, fake order attacks, and API abuse.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/geetest-products-mix-1.png\" alt=\"\"><\/p>\n<h3><strong class=\"ql-size-22px\">1. Behavior-Based Verification<\/strong><\/h3>\n<p><span class=\"ql-size-16px\">GeeTest uses behavioral analysis to examine subtle user actions such as mouse movement patterns, click strength, and slide speed. This makes it difficult for automation tools and bots to simulate human interactions accurately.<\/span><\/p>\n<p><strong class=\"ql-size-22px\">2. Adaptive Risk-Based Challenges<\/strong><\/p>\n<p><span class=\"ql-size-16px\">The system continuously assesses user risk in real time. Higher-risk behaviors result in stricter verification, while low-risk users can complete actions with minimal friction, maintaining a balance between security and usability.<\/span><\/p>\n<p><strong class=\"ql-size-22px\">3. Strong Resistance to Attack Tools<\/strong><\/p>\n<p><span class=\"ql-size-16px\">GeeTest effectively counters OCR, automated solvers, and click farms through dynamic obfuscation, behavioral analysis, and adaptive challenges. By randomizing visual elements, validating human-like interactions, and escalating checks for suspicious traffic, it increases attack complexity and cost, making large-scale bypasses impractical.<\/span><\/p>\n<p><strong class=\"ql-size-22px\">4. Full Coverage Across Critical Business Touchpoints<\/strong><\/p>\n<p><span class=\"ql-size-16px\">GeeTest can be integrated at all key stages where fraud commonly occurs. These include login, account registration, checkout, address updates, and coupon redemption. This comprehensive deployment helps block fraudulent behavior across the entire user flow.<\/span><\/p>\n<h2><strong class=\"ql-size-28px\">Conclusion<\/strong><\/h2>\n<p><span class=\"ql-size-16px\">As e-commerce accelerates into 2025, so too does the sophistication and scale of fraud. From AI-generated synthetic identities to automated bot attacks exploiting emerging payment methods, the threat landscape has grown more complex and costly. Businesses must recognize that no single solution can fully shield them, true protection demands a layered, adaptive defense strategy that spans identity verification, payment security, bot mitigation, and real-time fraud intelligence.<\/span><\/p>\n<p><span class=\"ql-size-16px\">E-commerce businesses that prioritize proactive fraud prevention, not reactive damage control, will be best positioned to protect their customers, preserve trust, and maintain long-term growth in the face of rising cyber threats.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/geetests.com\/wp-content\/uploads\/2025\/09\/ad_03_728_90-1-1.png\" alt=\"\"><\/div>\n<p><!-- .vgblk-rw-wrapper --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2025 e-commerce fraud trends, threats, and advanced prevention strategies to safeguard businesses from evolving cyber scams.<\/p>\n","protected":false},"author":7,"featured_media":993942,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89],"tags":[107],"class_list":["post-997234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-prevention","tag-featured"],"_links":{"self":[{"href":"\/en\/wp-json\/wp\/v2\/posts\/997234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/comments?post=997234"}],"version-history":[{"count":2,"href":"\/en\/wp-json\/wp\/v2\/posts\/997234\/revisions"}],"predecessor-version":[{"id":997373,"href":"\/en\/wp-json\/wp\/v2\/posts\/997234\/revisions\/997373"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/media\/993942"}],"wp:attachment":[{"href":"\/en\/wp-json\/wp\/v2\/media?parent=997234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/categories?post=997234"},{"taxonomy":"post_tag","embeddable":true,"href":"\/en\/wp-json\/wp\/v2\/tags?post=997234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}