{"id":1424,"date":"2026-05-08T11:10:39","date_gmt":"2026-05-08T11:10:39","guid":{"rendered":"https:\/\/dexeq.com\/?p=1424"},"modified":"2026-02-06T15:07:24","modified_gmt":"2026-02-06T15:07:24","slug":"how-to-check-a-source-document","status":"publish","type":"post","link":"https:\/\/dexeq.com\/nl\/how-to-check-a-source-document\/","title":{"rendered":"How to check a source document"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>A source document is often the foundation of identity verification processes. Birth certificates, civil registry extracts, residence permits and other foundational documents are frequently used to obtain or support identity documents. If a source document is fraudulent or altered, all documents derived from it may also be compromised. For this reason, proper inspection of source documents is a critical part of professional <strong><a href=\"https:\/\/dexeq.com\/importance-of-identity-document-authentication\/\">document authentication<\/a><\/strong>. This article explains how source documents are checked and which inspection methods are essential.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is considered a source document<\/strong><\/h2>\n\n\n\n<p>A source document is an official document that provides original evidence of identity or civil status. These documents are often issued once and used repeatedly over time.<\/p>\n\n\n\n<p>Common examples include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Birth certificates<br><\/li>\n\n\n\n<li>Marriage certificates<br><\/li>\n\n\n\n<li>Civil registry extracts<br><\/li>\n\n\n\n<li>Certificates of nationality<br><\/li>\n\n\n\n<li>Immigration or residence documents<br><\/li>\n<\/ul>\n\n\n\n<p>Because these documents are often paper-based and older, they are attractive targets for fraud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why source documents are frequently targeted<\/strong><\/h2>\n\n\n\n<p>Source documents are used to establish identity at an early stage. If fraud is successful at this point, it may go undetected through later stages.<\/p>\n\n\n\n<p>Source documents are targeted because they:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Are less frequently inspected with advanced tools<br><\/li>\n\n\n\n<li>May lack modern security features<br><\/li>\n\n\n\n<li>Are used to obtain higher-value identity documents<br><\/li>\n<\/ul>\n\n\n\n<p>Fraud involving source documents often results in <strong><a href=\"https:\/\/dexeq.com\/category\/document-authentication-identity-fraud\/\">forged identity documents<\/a><\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Visual inspection of source documents<\/strong><\/h2>\n\n\n\n<p>Visual inspection is the first step when checking a source document. Inspectors assess whether the document\u2019s appearance matches known standards.<\/p>\n\n\n\n<p>Visual inspection focuses on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paper quality and ageing<br><\/li>\n\n\n\n<li>Layout and typography<br><\/li>\n\n\n\n<li>Stamps, seals and signatures<br><\/li>\n\n\n\n<li>Signs of erasure or overwriting<br><\/li>\n<\/ul>\n\n\n\n<p>However, visual inspection alone is rarely sufficient for reliable verification.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Detecting alterations in source documents<\/strong><\/h2>\n\n\n\n<p>Source documents are frequently altered after issuance. Common alteration techniques include erasing text, replacing names or modifying dates.<\/p>\n\n\n\n<p>Professional inspection aims to detect:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Chemical alterations<\/strong> [LINK \u2192 Detection of chemical alterations in documents]<br><\/li>\n\n\n\n<li>Mechanical erasures<br><\/li>\n\n\n\n<li>Added or substituted text<br><\/li>\n\n\n\n<li>Inconsistent handwriting or ink<br><\/li>\n<\/ul>\n\n\n\n<p>These alterations often damage the document\u2019s underlying structure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>UV inspection of source documents<\/strong><\/h2>\n\n\n\n<p>UV inspection is an effective method for detecting alterations in source documents. Chemical treatments and added inks often react differently under UV light.<\/p>\n\n\n\n<p>Using <strong><a href=\"https:\/\/dexeq.com\/uv-flashlights-document-authentication\/\">UV flashlights<\/a><\/strong>, inspectors can identify:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Irregular fluorescence<br><\/li>\n\n\n\n<li>Residual chemical traces<br><\/li>\n\n\n\n<li>Differences between original and added text<br><\/li>\n<\/ul>\n\n\n\n<p>UV inspection frequently reveals manipulation that is invisible under normal light.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IR inspection and source document verification<\/strong><\/h2>\n\n\n\n<p>Infrared inspection provides additional insight, particularly when inks or stamps are suspected to have been added later.<\/p>\n\n\n\n<p>With <strong><a href=\"https:\/\/dexeq.com\/ir-cameras-id-document-authentication\/\">IR cameras<\/a><\/strong>, inspectors can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Differentiate between ink types<br><\/li>\n\n\n\n<li>Detect overwritten or substituted text<br><\/li>\n\n\n\n<li>Analyse layered entries<br><\/li>\n<\/ul>\n\n\n\n<p>IR inspection is especially useful when documents appear visually consistent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Background printing and paper structure<\/strong><\/h2>\n\n\n\n<p>Many source documents include background printing, seals or embedded elements that are disrupted by alteration.<\/p>\n\n\n\n<p>Inspection focuses on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Continuity of background patterns<br><\/li>\n\n\n\n<li>Paper fibre structure<br><\/li>\n\n\n\n<li>Alignment of stamps and text<br><\/li>\n<\/ul>\n\n\n\n<p>These aspects are discussed further in <strong><a href=\"https:\/\/dexeq.com\/inspection-of-background-printing\/\">inspection of background printing<\/a><\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Common mistakes when checking source documents<\/strong><\/h2>\n\n\n\n<p>Source document checks often fail due to incorrect assumptions or time pressure.<\/p>\n\n\n\n<p>Common mistakes include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assuming older documents are inherently genuine<br><\/li>\n\n\n\n<li>Relying only on visual inspection<br><\/li>\n\n\n\n<li>Skipping UV or IR analysis<br><\/li>\n<\/ul>\n\n\n\n<p>These risks are addressed in <a href=\"https:\/\/dexeq.com\/common-mistakes-document-checks\/\"><strong>common mistakes in document checks<\/strong><\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The role of training in source document inspection<\/strong><\/h2>\n\n\n\n<p>Because source documents vary widely by country and time period, training is essential.<\/p>\n\n\n\n<p>Effective training includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exposure to genuine historical documents<br><\/li>\n\n\n\n<li>Understanding of document ageing<br><\/li>\n\n\n\n<li>Use of UV and IR inspection tools<br><\/li>\n<\/ul>\n\n\n\n<p>Guidance on building these skills is provided in <a href=\"https:\/\/dexeq.com\/training-document-authentication-where-to-start\/\"><strong>training in document authentication: where to start<\/strong><\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Source documents in sector-specific contexts<\/strong><\/h2>\n\n\n\n<p>Source documents are used across multiple sectors, each with different risk profiles.<\/p>\n\n\n\n<p>For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Civil registries focus on authenticity and archival integrity<br><\/li>\n\n\n\n<li>Immigration authorities assess eligibility and identity<br><\/li>\n\n\n\n<li>Financial institutions rely on source documents for onboarding<br><\/li>\n<\/ul>\n\n\n\n<p>These applications are closely related to <strong><a href=\"https:\/\/dexeq.com\/document-fraud-financial-sector\/\">document fraud in the financial sector<\/a><\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Checking a source document is a critical step in preventing identity fraud at its earliest stage. By combining visual inspection with UV and IR analysis, background printing evaluation and proper training, organisations can reliably detect altered or fraudulent source documents. Professional source document authentication protects downstream identity systems and decision-making processes.<\/p>\n\n\n\n<p>Dexeq advises government, financial and security organisations on professional UV flashlights, IR cameras and optical inspection tools for reliable document authentication. Contact Dexeq for expert guidance or a solution tailored to your operational requirements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction A source document is often the foundation of identity verification processes. Birth certificates, civil registry extracts, residence permits and other foundational documents are frequently used to obtain or support identity documents. If a source document is fraudulent or altered, all documents derived from it may also be compromised. For this reason, proper inspection of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"How to check a source document","_yoast_wpseo_title":"How to check a source document | Dexeq","_yoast_wpseo_metadesc":"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.","_yoast_wpseo_is_cornerstone":0,"_yoast_wpseo_meta-robots-noindex":1,"_yoast_wpseo_meta-robots-nofollow":1,"_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_bctitle":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":0,"_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":0,"_yoast_wpseo_schema_page_type":"","_yoast_wpseo_schema_article_type":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-1424","post","type-post","status-publish","format-standard","hentry","category-document-authentication-identity-fraud"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to check a source document | Dexeq<\/title>\n<meta name=\"description\" content=\"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to check a source document | Dexeq\" \/>\n<meta property=\"og:description\" content=\"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dexeq.com\/nl\/how-to-check-a-source-document\/\" \/>\n<meta property=\"og:site_name\" content=\"Dexeq\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-08T11:10:39+00:00\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#\\\/schema\\\/person\\\/0a695576f7a768141b44d3cf086feb49\"},\"headline\":\"How to check a source document\",\"datePublished\":\"2026-05-08T11:10:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/\"},\"wordCount\":719,\"publisher\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#organization\"},\"articleSection\":[\"Document Authentication &amp; Identity Fraud\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/\",\"url\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/\",\"name\":\"How to check a source document | Dexeq\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#website\"},\"datePublished\":\"2026-05-08T11:10:39+00:00\",\"description\":\"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/how-to-check-a-source-document\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dexeq.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to check a source document\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/\",\"name\":\"Dexeq\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#organization\",\"name\":\"Dexeq\",\"url\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dexeq.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Dexeq_new_orange-white.png\",\"contentUrl\":\"https:\\\/\\\/dexeq.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Dexeq_new_orange-white.png\",\"width\":221,\"height\":88,\"caption\":\"Dexeq\"},\"image\":{\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/#\\\/schema\\\/person\\\/0a695576f7a768141b44d3cf086feb49\",\"name\":\"Alex\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1165bec03cd239c6cb612c3b396e1b3c9aea05e0f991b2761a3d682bb96184e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1165bec03cd239c6cb612c3b396e1b3c9aea05e0f991b2761a3d682bb96184e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1165bec03cd239c6cb612c3b396e1b3c9aea05e0f991b2761a3d682bb96184e1?s=96&d=mm&r=g\",\"caption\":\"Alex\"},\"url\":\"https:\\\/\\\/dexeq.com\\\/nl\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to check a source document | Dexeq","description":"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"nl_NL","og_type":"article","og_title":"How to check a source document | Dexeq","og_description":"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.","og_url":"https:\/\/dexeq.com\/nl\/how-to-check-a-source-document\/","og_site_name":"Dexeq","article_published_time":"2026-05-08T11:10:39+00:00","author":"Alex","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Alex","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dexeq.com\/how-to-check-a-source-document\/#article","isPartOf":{"@id":"https:\/\/dexeq.com\/how-to-check-a-source-document\/"},"author":{"name":"Alex","@id":"https:\/\/dexeq.com\/nl\/#\/schema\/person\/0a695576f7a768141b44d3cf086feb49"},"headline":"How to check a source document","datePublished":"2026-05-08T11:10:39+00:00","mainEntityOfPage":{"@id":"https:\/\/dexeq.com\/how-to-check-a-source-document\/"},"wordCount":719,"publisher":{"@id":"https:\/\/dexeq.com\/nl\/#organization"},"articleSection":["Document Authentication &amp; Identity Fraud"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dexeq.com\/how-to-check-a-source-document\/","url":"https:\/\/dexeq.com\/how-to-check-a-source-document\/","name":"How to check a source document | Dexeq","isPartOf":{"@id":"https:\/\/dexeq.com\/nl\/#website"},"datePublished":"2026-05-08T11:10:39+00:00","description":"Learn how source documents are checked using visual, UV and IR inspection. Professional guidance for reliable document authentication.","breadcrumb":{"@id":"https:\/\/dexeq.com\/how-to-check-a-source-document\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dexeq.com\/how-to-check-a-source-document\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dexeq.com\/how-to-check-a-source-document\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dexeq.com\/"},{"@type":"ListItem","position":2,"name":"How to check a source document"}]},{"@type":"WebSite","@id":"https:\/\/dexeq.com\/nl\/#website","url":"https:\/\/dexeq.com\/nl\/","name":"Dexeq","description":"","publisher":{"@id":"https:\/\/dexeq.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dexeq.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dexeq.com\/nl\/#organization","name":"Dexeq","url":"https:\/\/dexeq.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dexeq.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/dexeq.com\/wp-content\/uploads\/2026\/04\/Dexeq_new_orange-white.png","contentUrl":"https:\/\/dexeq.com\/wp-content\/uploads\/2026\/04\/Dexeq_new_orange-white.png","width":221,"height":88,"caption":"Dexeq"},"image":{"@id":"https:\/\/dexeq.com\/nl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dexeq.com\/nl\/#\/schema\/person\/0a695576f7a768141b44d3cf086feb49","name":"Alex","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/1165bec03cd239c6cb612c3b396e1b3c9aea05e0f991b2761a3d682bb96184e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1165bec03cd239c6cb612c3b396e1b3c9aea05e0f991b2761a3d682bb96184e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1165bec03cd239c6cb612c3b396e1b3c9aea05e0f991b2761a3d682bb96184e1?s=96&d=mm&r=g","caption":"Alex"},"url":"https:\/\/dexeq.com\/nl\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/posts\/1424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/comments?post=1424"}],"version-history":[{"count":2,"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/posts\/1424\/revisions"}],"predecessor-version":[{"id":1467,"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/posts\/1424\/revisions\/1467"}],"wp:attachment":[{"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/media?parent=1424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/categories?post=1424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dexeq.com\/nl\/wp-json\/wp\/v2\/tags?post=1424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}