{"id":8042,"date":"2026-04-05T20:35:43","date_gmt":"2026-04-05T20:35:43","guid":{"rendered":"https:\/\/professnow.com\/profession\/top-10-best-deepfake-detection-specialist-in-boston\/"},"modified":"2026-04-05T20:35:43","modified_gmt":"2026-04-05T20:35:43","slug":"top-10-best-deepfake-detection-specialist-in-boston","status":"publish","type":"post","link":"https:\/\/professnow.com\/profession\/top-10-best-deepfake-detection-specialist-in-boston\/","title":{"rendered":"Top 10 Best Deepfake Detection Specialist in Boston (Verified &#038; Reviewed Guide)"},"content":{"rendered":"\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Boston organizations and residents are increasingly dealing with manipulated audio, video, and images\u2014whether it\u2019s a fraudulent executive voice message, a doctored video tied to workplace disputes, or impersonation used in harassment and extortion. When the stakes include reputational harm, legal exposure, or financial loss, a Deepfake Detection Specialist can help verify authenticity and document findings in a defensible way.<\/p>\n\n\n\n<p>This guide explains what deepfake detection work typically includes, what it costs in Boston, and how to choose a qualified provider. You\u2019ll also find a curated list of Boston-area firms that are most likely to handle deepfake-related verification through digital forensics and investigations.<\/p>\n\n\n\n<p>This list was evaluated using publicly available signals where known: stated investigative\/digital forensics capabilities, clarity of service offerings, professional credibility, and whether the firm appears equipped to handle evidentiary workflows (intake, preservation, analysis, reporting). Where specific deepfake services or reviews are not publicly stated, that is noted.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">About Deepfake Detection Specialist<\/h2>\n\n\n\n<p>A Deepfake Detection Specialist helps determine whether media (audio, video, images, or documents) has been manipulated, synthetically generated, or altered in a way that misrepresents reality. In practice, this work often overlaps with <strong>digital forensics<\/strong>, <strong>multimedia forensics<\/strong>, <strong>cyber investigations<\/strong>, and <strong>litigation support<\/strong>.<\/p>\n\n\n\n<p>They may:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Examine files and metadata (when available)<\/li>\n<li>Assess compression artifacts and editing traces<\/li>\n<li>Evaluate source consistency (device, platform, upload history)<\/li>\n<li>Compare known reference samples (e.g., verified voice\/video of a person) when provided<\/li>\n<li>Provide written findings and, in some cases, expert support for legal matters<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">When someone needs them<\/h3>\n\n\n\n<p>Common Boston use cases include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Corporate fraud attempts (executive impersonation, fake \u201curgent\u201d instructions)<\/li>\n<li>HR\/workplace investigations involving alleged recordings<\/li>\n<li>Political or reputational attacks targeting public-facing professionals<\/li>\n<li>Family law or personal disputes involving disputed recordings<\/li>\n<li>Journalistic, PR, and brand integrity verification before publication<\/li>\n<li>Legal disputes where authenticity impacts damages or liability<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Average cost in Boston<\/h3>\n\n\n\n<p>There isn\u2019t a single \u201cstandard\u201d deepfake detection price, because it depends heavily on file quality, turnaround time, and whether the work needs to be court-ready. In Boston, buyers should generally expect <strong>mid-to-high professional services pricing<\/strong> for credible forensic work.<\/p>\n\n\n\n<p>Typical pricing patterns (varies by provider and case complexity):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hourly consulting and analysis: <strong>Varies \/ depends<\/strong><\/li>\n<li>Minimum case fees\/retainers: <strong>Varies \/ depends<\/strong><\/li>\n<li>Rush or time-sensitive work: <strong>Varies \/ depends<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Licensing or certifications required (if applicable)<\/h3>\n\n\n\n<p>There is <strong>no widely recognized Boston-specific license<\/strong> required solely for \u201cdeepfake detection.\u201d However, if the engagement is part of a legal dispute, credibility often depends on relevant forensic training, documented methodology, and evidence handling practices.<\/p>\n\n\n\n<p>Credentials that may be relevant in adjacent fields (not required, and not always publicly listed):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Digital forensics certifications (varies by provider)<\/li>\n<li>Incident response \/ cyber investigation qualifications (varies)<\/li>\n<li>Prior expert witness experience (if needed; not publicly stated unless advertised)<\/li>\n<\/ul>\n\n\n\n<p><strong>Key takeaways<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deepfake detection often sits within broader digital forensics and investigations.<\/li>\n<li>The most important deliverable is usually a <strong>defensible written report<\/strong> (not just an opinion).<\/li>\n<li>Costs in Boston commonly depend on complexity, urgency, and evidence requirements.<\/li>\n<li>Not all cybersecurity firms publicly advertise deepfake-specific services\u2014ask directly.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">How We Selected the Best Deepfake Detection Specialist in Boston<\/h2>\n\n\n\n<p>We focused on providers that are most likely to support authenticity investigations based on publicly available information and the practical needs of Boston consumers and organizations.<\/p>\n\n\n\n<p>Selection criteria:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Years of experience<\/strong> (noted only when confidently known; otherwise \u201cNot publicly stated\u201d)<\/li>\n<li><strong>Verified customer review signals<\/strong> (only where publicly available and attributable; otherwise \u201cNot publicly stated\u201d)<\/li>\n<li><strong>Service range<\/strong> (ability to support investigations, preservation, reporting, and escalation)<\/li>\n<li><strong>Pricing transparency<\/strong> (whether pricing approach is explained or clearly engagement-based)<\/li>\n<li><strong>Local reputation<\/strong> (recognition, professional standing, and presence in the Boston market)<\/li>\n<\/ul>\n\n\n\n<p>Only publicly available information is used when known. Because many investigations are confidential and many firms don\u2019t publish deepfake-specific case details, some fields are marked <strong>\u201cNot publicly stated\u201d<\/strong> rather than inferred.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">About Boston<\/h2>\n\n\n\n<p>Boston is a major hub for higher education, healthcare, finance, and venture-backed technology\u2014industries where reputational risk and fraud prevention are constant priorities. That mix drives demand for authenticity verification, especially when disputed media could influence business decisions, employment actions, or legal outcomes.<\/p>\n\n\n\n<p>Service demand tends to cluster around:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Corporate headquarters and professional services<\/li>\n<li>Hospitals and research organizations<\/li>\n<li>Universities and public institutions<\/li>\n<li>High-net-worth and public-facing individuals<\/li>\n<\/ul>\n\n\n\n<p>Key neighborhoods commonly served by investigators and forensic consultants include <strong>Downtown\/Financial District, Back Bay, Seaport, South End, Beacon Hill, Fenway\u2013Kenmore, Allston\u2013Brighton, Dorchester, Roxbury, Jamaica Plain<\/strong>, and nearby areas where many Boston engagements occur (e.g., Cambridge, Somerville, Brookline). Exact coverage by provider is <strong>Not publicly stated<\/strong> and may depend on engagement scope.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Top 5 Best Deepfake Detection Specialist in Boston<\/h2>\n\n\n\n<p>Because deepfake detection is an emerging, specialized service, many qualified firms do not market it under that exact name. The providers below are included because they publicly position themselves for digital investigations and forensic work where deepfake\/media authenticity assessment may be requested. If a firm does not explicitly advertise deepfake detection, that is reflected below.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">#1 \u2014 Kroll<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Digital forensics, cyber investigations, incident response support, litigation and dispute-related advisory (deepfake\/media authenticity work: Not publicly stated; confirm availability)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.kroll.com\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link:<\/li>\n<li>Google Reviews Summary: Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Premium, complex corporate matters, legal teams needing structured reporting<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#2 \u2014 FTI Consulting<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Forensic and litigation consulting, technology-related investigations, disputes support (deepfake\/media authenticity work: Not publicly stated; confirm availability)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.fticonsulting.com\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link:<\/li>\n<li>Google Reviews Summary: Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Premium, organizations needing investigation + dispute support under one umbrella<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#3 \u2014 Stroz Friedberg (an Aon company)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Digital forensics and incident response, investigations, cyber crisis support (deepfake\/media authenticity work: Not publicly stated; confirm availability)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.strozfriedberg.com\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link:<\/li>\n<li>Google Reviews Summary: Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Premium, incident-driven cases where media authenticity may be part of a broader investigation<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#4 \u2014 Rapid7<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Cybersecurity services and incident response (deepfake\/media authenticity work: Not publicly stated; may require referral or partner support)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.rapid7.com\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link:<\/li>\n<li>Google Reviews Summary: Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Security-led organizations prioritizing fraud prevention and response workflows<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#5 \u2014 Palo Alto Networks Unit 42<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Incident response and threat-led investigations (deepfake\/media authenticity work: Not publicly stated; confirm availability and Boston-area coverage)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/unit42.paloaltonetworks.com\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link:<\/li>\n<li>Google Reviews Summary: Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Emergency, high-severity security incidents where manipulated media may be part of the attack<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Comparison Table<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table>\n<thead>\n<tr>\n<th>Professional<\/th>\n<th style=\"text-align: right;\">Rating<\/th>\n<th style=\"text-align: right;\">Experience<\/th>\n<th style=\"text-align: right;\">Price Range<\/th>\n<th>Best For<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Kroll<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Premium, complex corporate matters<\/td>\n<\/tr>\n<tr>\n<td>FTI Consulting<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Premium, disputes + investigations<\/td>\n<\/tr>\n<tr>\n<td>Stroz Friedberg (an Aon company)<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Premium, incident-driven investigations<\/td>\n<\/tr>\n<tr>\n<td>Rapid7<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Security-led response workflows<\/td>\n<\/tr>\n<tr>\n<td>Palo Alto Networks Unit 42<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Emergency, high-severity incidents<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Cost of Hiring a Deepfake Detection Specialist in Boston<\/h2>\n\n\n\n<p>In Boston, deepfake\/media authenticity work is typically priced as professional forensic consulting rather than a simple per-file fee. Many engagements involve secure handling, documentation, iterative analysis, and written reporting\u2014especially if the outcome may be used in HR action, insurance discussions, or legal proceedings.<\/p>\n\n\n\n<p><strong>Average price range (Boston):<\/strong> Varies \/ depends<br\/>\nIn practice, buyers often encounter:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hourly billing for analysis and advisory work<\/li>\n<li>Minimum engagement fees or retainers for investigative work<\/li>\n<li>Additional costs for expert support, declarations, or testimony (if needed)<\/li>\n<\/ul>\n\n\n\n<p><strong>Emergency pricing (if applicable):<\/strong> Varies \/ depends<br\/>\nRush turnaround may cost more, particularly if the provider must re-prioritize staff, preserve volatile data, or coordinate with counsel.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What affects cost<\/h3>\n\n\n\n<p>Key cost factors include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Media type and quality:<\/strong> low-resolution, re-recorded, or heavily compressed files typically take more work<\/li>\n<li><strong>Source availability:<\/strong> original files vs. screen recordings, forwarded clips, or platform downloads<\/li>\n<li><strong>Scope of comparison:<\/strong> whether you can provide verified reference samples (voice\/video) for analysis<\/li>\n<li><strong>Documentation requirements:<\/strong> internal memo vs. formal report suitable for dispute or legal use<\/li>\n<li><strong>Turnaround time:<\/strong> same-day\/next-day work often increases cost<\/li>\n<li><strong>Chain of custody needs:<\/strong> whether evidence handling and preservation must be formally documented<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions (FAQ)<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">How much does a Deepfake Detection Specialist cost in Boston?<\/h3>\n\n\n\n<p>Pricing varies widely based on complexity, urgency, and reporting needs. Many providers price this as professional forensic consulting, so expect \u201cVaries \/ depends\u201d unless a provider offers fixed packages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to choose the best Deepfake Detection Specialist in Boston?<\/h3>\n\n\n\n<p>Prioritize providers who can explain their process, preserve evidence properly, and deliver a clear written report. Ask what inputs they need (original file, source context, reference samples) and whether they\u2019ve handled authenticity disputes before.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Are licenses required in Boston?<\/h3>\n\n\n\n<p>There is no widely recognized Boston-specific license solely for deepfake detection. However, credible providers often have digital forensics or investigation backgrounds and can document methodology and evidence handling.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Who offers 24\/7 service in Boston?<\/h3>\n\n\n\n<p>Some incident response and investigations teams operate around the clock, but 24\/7 availability is not always publicly stated. If the matter is time-sensitive, ask about after-hours intake and rush turnaround options.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Can a specialist prove a video is a deepfake with 100% certainty?<\/h3>\n\n\n\n<p>Not always. Results depend on file quality, access to originals, and context. A defensible conclusion may be framed as likelihood, consistency\/inconsistency findings, or limits of analysis.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What should I provide for a deepfake investigation?<\/h3>\n\n\n\n<p>If possible, provide the original file (not a screen recording), how you received it, timestamps, platform details, and any related messages or emails. If voice\/person identity is in question, ask what reference samples are acceptable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Will the results hold up in court?<\/h3>\n\n\n\n<p>That depends on documentation, chain of custody, and the provider\u2019s ability to explain methods and findings. If litigation is likely, select a firm experienced in dispute support and formal reporting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How long does deepfake detection take?<\/h3>\n\n\n\n<p>Simple triage may be faster, while thorough analysis can take longer\u2014especially if multiple files, platforms, or comparison samples are involved. Turnaround is usually \u201cVaries \/ depends.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Can these services help with impersonation scams (fake CEO voice, fake Zoom recording)?<\/h3>\n\n\n\n<p>Often, yes\u2014deepfake-related fraud typically overlaps with cybersecurity and investigation workflows. Ask whether the provider can support both authenticity analysis and incident documentation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What\u2019s the difference between deepfake detection and standard video editing analysis?<\/h3>\n\n\n\n<p>Deepfake detection focuses on synthetic or identity-manipulating content, while editing analysis may focus on splices, overlays, timelines, and provenance. Many real-world cases involve both, so a broader forensic capability is useful.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Final Recommendation<\/h2>\n\n\n\n<p>If you\u2019re a <strong>business or legal team<\/strong> facing high-stakes risk (fraud, employment action, public allegations), start with a premium investigations and forensics provider such as <strong>Kroll<\/strong>, <strong>FTI Consulting<\/strong>, or <strong>Stroz Friedberg<\/strong>, and ask specifically about <strong>media authenticity<\/strong> and <strong>reporting format<\/strong> before you engage.<\/p>\n\n\n\n<p>If your issue is tied to a broader <strong>cyber incident<\/strong> (credential compromise, extortion, targeted social engineering), consider incident-focused teams such as <strong>Rapid7<\/strong> or <strong>Unit 42<\/strong>, and confirm whether authenticity analysis is included or whether they will coordinate with a specialized forensic partner.<\/p>\n\n\n\n<p>For budget-sensitive situations, your best cost control is to <strong>reduce scope<\/strong>: provide the original file, consolidate questions into a single written objective, and clarify whether you need a formal report or internal-only findings.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Get Your Business Listed<\/h2>\n\n\n\n<p>If you\u2019re a Deepfake Detection Specialist serving Boston and want your details added or updated, email <strong>contact@professnow.com<\/strong>. You can also registe &amp; Update yourself at https:\/\/professnow.com\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64,475],"tags":[],"class_list":["post-8042","post","type-post","status-publish","format-standard","hentry","category-boston","category-deepfake-detection-specialist"],"_links":{"self":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/posts\/8042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/comments?post=8042"}],"version-history":[{"count":0,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/posts\/8042\/revisions"}],"wp:attachment":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/media?parent=8042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/categories?post=8042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/tags?post=8042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}