{"id":11879,"date":"2012-11-20T21:45:48","date_gmt":"2012-11-20T21:45:48","guid":{"rendered":"http:\/\/bme2.flywheelsites.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/"},"modified":"2020-02-09T01:55:09","modified_gmt":"2020-02-09T01:55:09","slug":"password-strategies-to-protect-your-silicon-life","status":"publish","type":"post","link":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/","title":{"rendered":"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565"},"content":{"rendered":"<p>One day <a href=\"http:\/\/www.wired.com\/gadgetlab\/2012\/11\/ff-mat-honan-password-hacker\/all\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">Mat Honan<\/a> was a writer for <i>Wired<\/i> and the next day he became a highly publicized example of everything that makes online security an oxymoron. It turned out that Mat became the target for a teen hacker out to get some lolz at his expense and proceeded to access his entire digital life and wipe it out. Literally within minutes, Mat lost everything he had stored right down to all of the photos of his baby daughter. Since the \u201cadvantages\u201d of the cloud include the reality that what was once the obligatory practice of separate offsite backup is now as quaintly nostalgic as pillbox hats, once Mat\u2019s data was gone, it was gone forever. There are some actions that you can take today to keep from suffering Mat\u2019s fate, as long as you realize that if a fully dedicated hacker is going after you, there may not be any hope to fend off their attacks.<\/p>\n<h4>The 4 Primary Password Strategies<\/h4>\n<p>Passwords are the first items up for discussion as lists of stolen ones show that the majority of people use profoundly silly ones that can be guessed by a toddler, such as password or 123456. To make things worse, many use the same password to access all their accounts, so as soon as a hacker has figured out one, they have cracked your panoply. There are four primary schools of thought to password creation and all have their fundamental fallacies:<\/p>\n<ol>\n<li><b>Uniqueness<\/b> \u2013 Instead of password, use something that is special to you, such as your first pet\u2019s name: Snowball. The problem with this approach is that if you are a typical social media blabbermouth who revels in revealing every intimate detail of your existence on this mortal spiral to the 7.1 billion people on earth including the bored teen hackers and professional Russian Mafia criminals who mine your profiles for critical information, then you\u2019ve likely left that little bit of info out in cyberspace already.<\/li>\n<li><b>Character substitution<\/b> \u2013 Changing some of the characters for alphanumeric \u201clookalikes\u201d is a very common security precaution, so Snowball becomes $n0w6a11. The worst problem with this strategy is that you\u2019re not the only one to think of this and the hackers already have compiled popular character substitution tables to crack this rather ineffective code.<\/li>\n<li><b>Non sequitur phrase<\/b> \u2013 The famous comic on <a href=\"http:\/\/xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"external\">xkcd<\/a> sums up this approach rather well. Instead of substituting characters, come up with a completely nonsensical sequence of words that you memorize, such as correcthorsebatterystaple. As in every other case where strings need to be memorized, there is always the problem that your fallible memory will fail you when you need it most, so it might be a good idea to use a complex string of words with \u201cweird\u201d separators that mean something to you but no one else (and which you haven\u2019t blabbed already on social media) such as the names of your four favorite teddy bears: aragorn%fluffy^roscoe|chantelle.<\/li>\n<li><b>Site-specific modification<\/b> \u2013 All the teddy bear names on the planet aren\u2019t going to help you if you use the same password on several accounts and it winds up being exposed. A small modification you can make to help keep each password unique is to add a prefix or suffix specific to the site. So if your Chase bank app is the second icon on the fourth row of your iPad in portrait mode, use standard Excel cell nomenclature plus the first two letters of the site: d2~ch#aragorn%fluffy^roscoe|chantelle.<\/li>\n<\/ol>\n<h4>Make Your Accounts Impervious to Social-Engineering Attack: Shut Up!<\/h4>\n<p>Unfortunately no matter how airtight your password is, it\u2019s completely worthless if you are subjected to a social engineering attack such as the one Mat suffered. By gathering publicly available info, a hacker can convince many online companies\u2019 customer service personnel to reset passwords and then\u2026 you\u2019re fried. It all goes back to the blabaramathons which have become de rigeur in the social media world. Loose lips sink chips and if that silicon is holding your precious personal information you may find that the transcendent joy of being a total-revelation social media autobiographer may have a very unpleasant byproduct.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One day Mat Honan was a writer for Wired and the next day he became a highly publicized example of everything that makes online security an oxymoron. It turned out that Mat became the target for a teen hacker out to get some lolz at his expense and proceeded to access his entire digital life&hellip;<\/p>\n","protected":false},"author":139,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[2186],"tags":[],"class_list":["post-11879","post","type-post","status-publish","format-standard","hentry","category-2186"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565 - Benchmark Email<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565 - Benchmark Email\" \/>\n<meta property=\"og:description\" content=\"One day Mat Honan was a writer for Wired and the next day he became a highly publicized example of everything that makes online security an oxymoron. It turned out that Mat became the target for a teen hacker out to get some lolz at his expense and proceeded to access his entire digital life&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/\" \/>\n<meta property=\"og:site_name\" content=\"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BenchmarkEmail1\/?locale=zh_TW\" \/>\n<meta property=\"article:published_time\" content=\"2012-11-20T21:45:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-09T01:55:09+00:00\" \/>\n<meta name=\"author\" content=\"Hal Licino\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hal Licino\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/\"},\"author\":{\"name\":\"Hal Licino\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/person\\\/2fa613dbba6c6712d3e4fc473f5a6ebb\"},\"headline\":\"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565\",\"datePublished\":\"2012-11-20T21:45:48+00:00\",\"dateModified\":\"2020-02-09T01:55:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/\"},\"wordCount\":697,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#organization\"},\"articleSection\":[\"\u5e73\u53f0\u529f\u80fd\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/\",\"name\":\"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565 - Benchmark Email\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#website\"},\"datePublished\":\"2012-11-20T21:45:48+00:00\",\"dateModified\":\"2020-02-09T01:55:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/password-strategies-to-protect-your-silicon-life\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#website\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/\",\"name\":\"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#organization\",\"name\":\"Benchmark Email\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2019\\\/09\\\/benchmark-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2019\\\/09\\\/benchmark-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Benchmark Email\"},\"image\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BenchmarkEmail1\\\/?locale=zh_TW\",\"https:\\\/\\\/www.instagram.com\\\/benchmark.taiwan\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/person\\\/2fa613dbba6c6712d3e4fc473f5a6ebb\",\"name\":\"Hal Licino\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g\",\"caption\":\"Hal Licino\"},\"description\":\"Hal Licino is a leading blogger on HubPages, one of the Alexa Top 120 websites in the USA. Hal has written 2,500 HubPage articles on a wide range of topics, some of which have attracted upwards of 135,000 page views a day. His blogs are influential to the point where Hal single-handedly forced Apple to retract a national network iPhone TV commercial and has even mythbusted one of the Mythbusters. He has also written for major sites as Tripology, WebTVWire, and TripScoop.\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/author\\\/hallicino\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565 - Benchmark Email","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/","og_locale":"en_US","og_type":"article","og_title":"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565 - Benchmark Email","og_description":"One day Mat Honan was a writer for Wired and the next day he became a highly publicized example of everything that makes online security an oxymoron. It turned out that Mat became the target for a teen hacker out to get some lolz at his expense and proceeded to access his entire digital life&hellip;","og_url":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/","og_site_name":"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email","article_publisher":"https:\/\/www.facebook.com\/BenchmarkEmail1\/?locale=zh_TW","article_published_time":"2012-11-20T21:45:48+00:00","article_modified_time":"2020-02-09T01:55:09+00:00","author":"Hal Licino","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hal Licino","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/#article","isPartOf":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/"},"author":{"name":"Hal Licino","@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/person\/2fa613dbba6c6712d3e4fc473f5a6ebb"},"headline":"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565","datePublished":"2012-11-20T21:45:48+00:00","dateModified":"2020-02-09T01:55:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/"},"wordCount":697,"commentCount":0,"publisher":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#organization"},"articleSection":["\u5e73\u53f0\u529f\u80fd"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/","url":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/","name":"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565 - Benchmark Email","isPartOf":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#website"},"datePublished":"2012-11-20T21:45:48+00:00","dateModified":"2020-02-09T01:55:09+00:00","breadcrumb":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/password-strategies-to-protect-your-silicon-life\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.benchmarkemail.com\/tw\/"},{"@type":"ListItem","position":2,"name":"\u5728\u6578\u4f4d\u4e16\u754c\u6c42\u4fdd\u5168\u7684\u5bc6\u78bc\u7b56\u7565"}]},{"@type":"WebSite","@id":"https:\/\/www.benchmarkemail.com\/tw\/#website","url":"https:\/\/www.benchmarkemail.com\/tw\/","name":"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email","description":"","publisher":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.benchmarkemail.com\/tw\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.benchmarkemail.com\/tw\/#organization","name":"Benchmark Email","url":"https:\/\/www.benchmarkemail.com\/tw\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/logo\/image\/","url":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2019\/09\/benchmark-logo.svg","contentUrl":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2019\/09\/benchmark-logo.svg","width":1,"height":1,"caption":"Benchmark Email"},"image":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BenchmarkEmail1\/?locale=zh_TW","https:\/\/www.instagram.com\/benchmark.taiwan\/"]},{"@type":"Person","@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/person\/2fa613dbba6c6712d3e4fc473f5a6ebb","name":"Hal Licino","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g","caption":"Hal Licino"},"description":"Hal Licino is a leading blogger on HubPages, one of the Alexa Top 120 websites in the USA. Hal has written 2,500 HubPage articles on a wide range of topics, some of which have attracted upwards of 135,000 page views a day. His blogs are influential to the point where Hal single-handedly forced Apple to retract a national network iPhone TV commercial and has even mythbusted one of the Mythbusters. He has also written for major sites as Tripology, WebTVWire, and TripScoop.","url":"https:\/\/www.benchmarkemail.com\/tw\/blog\/author\/hallicino\/"}]}},"_links":{"self":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/posts\/11879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/comments?post=11879"}],"version-history":[{"count":0,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/posts\/11879\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/media?parent=11879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/categories?post=11879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/tags?post=11879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}