{"id":10674,"date":"2020-10-06T06:40:04","date_gmt":"2020-10-06T04:40:04","guid":{"rendered":"https:\/\/news.save.ch\/?p=10674"},"modified":"2023-03-14T08:56:33","modified_gmt":"2023-03-14T07:56:33","slug":"5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/","title":{"rendered":"5G mobile communications standard: vulnerabilities discovered"},"content":{"rendered":"<figure id=\"attachment_10675\" aria-describedby=\"caption-attachment-10675\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10675\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-10675\" class=\"wp-caption-text\">\u00a9 depositphotos, Tzido<\/figcaption><\/figure>\n<p>The managing director of PSW Group points above all to the innovations that can be significant for companies in general, but also for security in particular. Says Tulinska: \"To make the 5G network standard as secure as possible, various security measures should be examined and optimized.\" In many ways, 5G eclipses its predecessors: Transmission speeds are increasing, while costs and energy consumption are decreasing. Previously unattainable response speeds with barely noticeable latency are said to be possible with 5G. This delivers the advantage of being able to transmit significantly more information in much less time. However, the new 5G network standard is not only expected to create higher data rates and improved capacities, but also to link networks more intelligently. This opens up new opportunities for digitization for companies: 5G can, for example, optimize both internal company networking and networking between companies. The number of networked devices will increase dramatically. Although 5G is often described as the most secure mobile communications standard to date, there are definitely risks, warn the experts at PSW Group: It is possible to access user locations, but also to launch man-in-the-middle attacks.<\/p>\n<p><strong>5G vulnerability discovered<\/strong><\/p>\n<p>Tulinska points to researchers at Purdue and Iowa universities, among others, who developed a protocol analysis tool called \"5GReasoner\" in fall 2019 and used it to identify 11 potential vulnerabilities. Some of them allow DoS or replay attacks, for example. The latter lead to very high mobile bills. \"In order to be able to fix vulnerabilities, mobile communications protocols, including 5G, are constantly being developed. However, it can easily take 18 months or more before current versions are publicly available. Within these rather long update periods, 5G networks remain vulnerable,\" warns Patrycja Tulinska. Then there are the dangers of possible fallbacks to older protocol versions, such as when the mobile device cannot find a 5G signal. This device would then fall back to 4G or 3G and would thus be exposed to all the vulnerabilities that were left out of the previous generation protocol. There are also a whole range of other risks. For example, if manufacturers equip the network components with backdoors as hardware or software Trojans, not only can data be spied out, but sabotage attacks can also be carried out. \"It is true that data in the 5G network is encrypted during transmission over the radio network and during transmission between network operators when roaming. Openly, however, they are processed in the core network on the respective components,\" Tulinska points out.<\/p>\n<p>In any case, software plays a significant role in 5G architectures, so the resulting risks can be considerable. However, software vulnerabilities are a major gateway for cybercriminals, and vulnerabilities are a part of software. \"We have to assume that this is no different for complex 5G software architectures,\" Tulinska said. Such complex software consists of a multitude of software packages and libraries, known as the software supply chain. \"Dependencies in this globally distributed supply chain currently make it virtually impossible to attribute vulnerabilities or backdoors to a responsible party. Liability regulations aimed at this run elegantly into the void,\" notes the expert. When we talk about 5G end devices, we are not so much referring to 5G-capable smartphones as to critical processes and infrastructures, such as machines in a production line or self-driving buses. The software risks mentioned also apply here: \"Before data is transported over the 5G network, it can be protected with end-to-end encryption. In this way, they pass securely through the entire 5G network. However, the targeted distribution of spyware on end devices could also lead to the infiltration of encryption. If data is intercepted at the source, even the best encryption is useless,\" Tulinska points out. Government influence, which already exists in conventional systems, for example with the aim of espionage or sabotage, should also not be underestimated. This risk increases in 5G networks, because the low level of diversification and strong software-based nature make government influence possible, for example via national manufacturers or through targeted infiltration of manipulated software modules. After all, 5G contains protection mechanisms that its predecessors did not have. \"Components can be secured separately using new cryptographic solutions. So if it happens that individual components are compromised, the protection of the other components is still guaranteed,\" reassures Patrycja Tulinska. In addition, the long-term identity of a subscriber in the 5G network is finally transmitted in encrypted form. A new feature is also on board for roaming in 5G: Authentication Confirmation (AC). Tulinska explains, \"The user device sends cryptographic proof of the identity of the mobile operator on whose network the device is located to the home mobile operator. This makes it possible to verify the device's identity with the home mobile operator.\" This means that 5G security has reached an exceptionally high level. However, the corresponding features must also be implemented. The IT security expert is skeptical about this, however: \"It is unclear at the moment whether all security mechanisms will be deployed. This is because mobile network operators must first migrate their networks to 5G. Since this migration process is not laid down in the 5G specifications or by the legislator, the only thing left for companies to do is to prepare for the new network generation now.\"<\/p>\n<p><a href=\"https:\/\/www.psw-group.de\/blog\/5g-sicherheit\/7719\"><em>More information here<\/em><\/a><\/p>\n<p><em>Source: PSW Group<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Die Gesch\u00e4ftsf\u00fchrerin der PSW Group verweist vor allem auf die Neuerungen, die f\u00fcr Unternehmen im Allgemeinen, aber auch f\u00fcr die Sicherheit im Besonderen bedeutsam sein k\u00f6nnen. Dazu Tulinska: \u00abUm den 5G-Netzwerkstandard so sicher wie m\u00f6glich zu machen, sollten unterschiedliche Sicherheitsvorkehrungen gepr\u00fcft und optimiert werden.\u00bb 5G stellt in vielerlei Hinsicht seine Vorg\u00e4nger in den Schatten: Die [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":10675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[439,1029,1030],"class_list":["post-10674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-5g","tag-5g-netze","tag-5g-risiken"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"5G-Risiken","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobilfunktstandard 5G: Schwachstellen entdeckt - Save<\/title>\n<meta name=\"description\" content=\"5G: \u00dcberzeugende Sicherheitsaspekte treffen auf neue und bekannte Risiken. Um den Wandel in zu 5G erfolgreich zu nutzen, sind Vorbereitungen unumg\u00e4nglich.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobilfunktstandard 5G: Schwachstellen entdeckt - Save\" \/>\n<meta property=\"og:description\" content=\"5G: \u00dcberzeugende Sicherheitsaspekte treffen auf neue und bekannte Risiken. Um den Wandel in zu 5G erfolgreich zu nutzen, sind Vorbereitungen unumg\u00e4nglich.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-06T04:40:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Mobilfunktstandard 5G: Schwachstellen entdeckt\",\"datePublished\":\"2020-10-06T04:40:04+00:00\",\"dateModified\":\"2023-03-14T07:56:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Depositphotos_251614668_s-2019.jpg\",\"keywords\":[\"5G\",\"5G-Netze\",\"5G-Risiken\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/\",\"name\":\"Mobilfunktstandard 5G: Schwachstellen entdeckt - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Depositphotos_251614668_s-2019.jpg\",\"datePublished\":\"2020-10-06T04:40:04+00:00\",\"dateModified\":\"2023-03-14T07:56:33+00:00\",\"description\":\"5G: \u00dcberzeugende Sicherheitsaspekte treffen auf neue und bekannte Risiken. Um den Wandel in zu 5G erfolgreich zu nutzen, sind Vorbereitungen unumg\u00e4nglich.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Depositphotos_251614668_s-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Depositphotos_251614668_s-2019.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, Tzido\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobilfunktstandard 5G: Schwachstellen entdeckt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile radio standard 5G: Vulnerabilities discovered - Save","description":"5G: Convincing security aspects meet new and known risks. Preparations are essential to successfully exploit the shift to 5G.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/","og_locale":"en_US","og_type":"article","og_title":"Mobilfunktstandard 5G: Schwachstellen entdeckt - Save","og_description":"5G: \u00dcberzeugende Sicherheitsaspekte treffen auf neue und bekannte Risiken. Um den Wandel in zu 5G erfolgreich zu nutzen, sind Vorbereitungen unumg\u00e4nglich.","og_url":"https:\/\/news.save.ch\/en\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/","og_site_name":"Save","article_published_time":"2020-10-06T04:40:04+00:00","article_modified_time":"2023-03-14T07:56:33+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Mobilfunktstandard 5G: Schwachstellen entdeckt","datePublished":"2020-10-06T04:40:04+00:00","dateModified":"2023-03-14T07:56:33+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/"},"wordCount":840,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg","keywords":["5G","5G-Netze","5G-Risiken"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/","url":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/","name":"Mobile radio standard 5G: Vulnerabilities discovered - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg","datePublished":"2020-10-06T04:40:04+00:00","dateModified":"2023-03-14T07:56:33+00:00","description":"5G: Convincing security aspects meet new and known risks. Preparations are essential to successfully exploit the shift to 5G.","breadcrumb":{"@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_251614668_s-2019.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, Tzido"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/5g-ueberzeugende-sicherheitsaspekte-treffen-auf-risiken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Mobilfunktstandard 5G: Schwachstellen entdeckt"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=10674"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10674\/revisions"}],"predecessor-version":[{"id":17305,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10674\/revisions\/17305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/10675"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=10674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=10674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=10674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}