{"version":"1.0","provider_name":"SI Digital Magazine","provider_url":"https:\/\/magazine.swissinformatics.org\/en\/","author_name":"Reinhard Riedl","author_url":"https:\/\/magazine.swissinformatics.org\/en\/author\/reinhard-riedl\/","title":"Identity in Cyberspace - SI Digital Magazine","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"A8JlUxHZCF\"><a href=\"https:\/\/magazine.swissinformatics.org\/en\/identity-in-cyberspace\/\">Identity in Cyberspace<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/magazine.swissinformatics.org\/en\/identity-in-cyberspace\/embed\/#?secret=A8JlUxHZCF\" width=\"600\" height=\"338\" title=\"&#8220;Identity in Cyberspace&#8221; &#8212; SI Digital Magazine\" data-secret=\"A8JlUxHZCF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/07\/Economy2.FeatImage_SOMMER.png","thumbnail_width":612,"thumbnail_height":344,"description":"I have a colleague \u2013 and this not me myself \u2013 who has recently become victim of several identity thefts in a row. The goal of the thefts was to severely damage his life and to get into his footsteps, assignments, and contracts in business. According to popular assumptions the whole case is impossible: Money [&hellip;]"}