{"id":19754,"date":"2023-10-13T00:28:00","date_gmt":"2023-10-12T22:28:00","guid":{"rendered":"https:\/\/magazine.swissinformatics.org\/?p=19754"},"modified":"2023-10-13T00:36:11","modified_gmt":"2023-10-12T22:36:11","slug":"self-sovereign-identities","status":"publish","type":"post","link":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/","title":{"rendered":"Self-Sovereign Identities: Challenges and Chances"},"content":{"rendered":"\n<p><em>Self-sovereign identity (SSI) is a new concept for identity management that shall be used in the Swiss E-ID which is currently under development. The main advantage of SSI is that it better protects the users\u2019 privacy than classical identity solutions do.<\/em><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:28% auto\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"800\" src=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration.png\" alt=\"Swiss E-ID Illustration\" class=\"wp-image-19764 size-full\" srcset=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration.png 1200w, https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration-400x267.png 400w, https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration-120x80.png 120w, https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration-768x512.png 768w, https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration-391x260.png 391w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>In September 2021, the Federal Council defined the principles for the design of a future Swiss E-ID. The corresponding law is currently being drafted. With the planned E-ID, users will be given control over their data. The principles of privacy by design, data economy\/minimization and decentralized data storage shall be guaranteed.<\/p>\n<\/div><\/div>\n\n\n\n<p>  The concept of \u201cself-sovereign identities\u201d to be implemented in E-ID is a new technology that is known to only a few experts and still leaves many questions unanswered.To understand the benefits of self-managed identities, you need to compare them with classic concepts, based on the\u00a0Security Assertion Markup Language (SAML)\u00a0[1]\u00a0or OpenID Connect\u00a0[2]\u00a0.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Classical identity solutions<\/strong><\/h3>\n\n\n\n<p>Classical identity solutions rely on a central identity service to which a user logs on. The identity service, also called Identity Provider (IdP), knows the user, and authenticates them. For this purpose, each user must provide a username (identifier) and at least a password. More sophisticated IdPs require a two-factor authentication, typically using&nbsp;&nbsp;an SMS code or an authenticator app on the smartphone. As the IdP is involved every time when the user wants to access a service, the IdP exactly knows the user behavior and can form so-called profiles. The IdP will know the typical behavior of both user groups and individuals. In addition, identity services usually store a lot of user data centrally, which creates&nbsp;&nbsp;a potential target for hackers.<\/p>\n\n\n\n<p>These classical solutions work well, offer the best user comfort, and are usually sufficiently secure. But as the IdP is the central element in the architecture, there can be issues with data protection and privacy. There are only regulatory means \u2013 and rarely technical ones \u2013 to prevent this.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SSI \u2013 Self-sovereign identities<\/strong><\/h3>\n\n\n\n<p>According to the principles of so-called\u00a0<em>self-sovereign identities<\/em>\u00a0(SSI)\u00a0[3], the user is at the center. Therefore, SSIs belong to the user-centric identities, like X.509 certificates or the German identity card with e-ID functionality\u00a0[4].<\/p>\n\n\n\n<p>The main difference of user-centric identities to classic solutions is the separation of the issuance and usage processes. In the issuing process of SSI, users usually receive their identity in form of verifiable credentials (VC)\u00a0[5]\u00a0in a smartphone wallet. Now, users have full control and responsibility of their VCs. Only the users decides when and to whom to present their VCs. The identity service (issuer) that gave the VCs to the users is not involved in this presentation process and therefore can no longer track the users nor collect information about where the VCs are being used.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center\">\u00a0<em>The better protection of privacy is the main reason<\/em> why<br><em>user-centric identities, like SSI,<\/em> <em>are preferred today<\/em>.<\/h4>\n\n\n\n<p>This allows the users to better protect their privacy and gives them more control and responsibility over their identity. The biggest advantages are:<\/p>\n\n\n\n<ul>\n<li>local storage of the users\u2019 data on their smartphones instead of a central identity service<\/li>\n\n\n\n<li>the decoupling of issuance and usage.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>However, besides those benefits, there is also a downside of SSI. SSI is a technology with a high level of complexity: the infrastructure reaches from blockchain over central components to cloud agents which are connected to smartphones. Many of these components use new technologies and protocols that are not yet mature and are only in the initial standardization phase.<\/p>\n\n\n\n<p>In addition, some concepts that are widely cited, such as zero-knowledge proofs or selective disclosures, exist only on paper so far or may have just made it into the first prototypes. There are also still a couple of unresolved research questions\u00a0[6], e.g., concerning signature blinding, user binding or privacy-aware revocation. Some say that SSI will probably reach a sufficient maturity only in the next five to ten years before it can be expected to be used by ordinary citizens. Accordingly, implementation efforts and costs are difficult to estimate.The greater control by the users also comes with greater responsibility. The users must not only store their identity and digital credentials securely, but also protect them from misuse, keep them up to date, and possibly back them up.\u00a0\u00a0In a digital ecosystem, where a user receives VCs from multiple issuers, there is no longer a central point of contact to consult in case of problems or loss. Whether an ordinary citizen, who is not necessarily digitally savvy, can handle this remains to be seen. Not to mention the emerging questions about digital inclusion and ethics\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h3>\n\n\n\n<p>SSI has the potential to change today\u2019s paradigm that users pay with their data for the services they use. It can help to bring the user more in control and to better protect data and privacy.To achieve these ambitious goals and solve all the problems that a new technology brings, the concepts of SSI must be further developed. Components and technology must be brought to maturity, and all stakeholders from academia to IT providers, government institutions and citizens should work together. Neither time constraints nor monetary interests should cause SSI solutions to be deployed too early and thus prevent the full potential from being realized.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>References<\/strong><\/h3>\n\n\n\n<ol>\n<li>OASIS, \u201eSecurity Assertion Markup Language (SAML) V2.0 Technical Overview,\u201c 25 March 2008.\u00a0[Online]. Available: <a href=\"http:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0.html\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0.html<\/a>.<\/li>\n\n\n\n<li>OpenID Foundation, [Online]. Available: <a href=\"https:\/\/openid.net\/developers\/how-connect-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/openid.net\/developers\/how-connect-works\/<\/a>.<\/li>\n\n\n\n<li>Sovrin Foundation , \u201eDie Grunds\u00e4tze von SSI,\u201c 16 Dezember 2020.\u00a0[Online]. Available: <a href=\"https:\/\/sovrin.org\/wp-content\/uploads\/Principles-of-SSI-V1.01-German-v01.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/sovrin.org\/wp-content\/uploads\/Principles-of-SSI-V1.01-German-v01.pdf<\/a>.<\/li>\n\n\n\n<li>Wikipedia, [Online]. Available: <a href=\"https:\/\/en.wikipedia.org\/wiki\/German_identity_card\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/en.wikipedia.org\/wiki\/German_identity_card<\/a>.<\/li>\n\n\n\n<li>W3C, \u201eVerifiable Credentials Data Model v1.1,\u201c Nov 2021.\u00a0[Online]. Available: <a href=\"https:\/\/www.w3.org\/TR\/vc-data-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.w3.org\/TR\/vc-data-model\/<\/a>.<\/li>\n\n\n\n<li>FedPol, [Online]. Available: <a href=\"https:\/\/github.com\/e-id-admin\/governance-sounding-board\/discussions\/45\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/e-id-admin\/governance-sounding-board\/discussions\/45<\/a>.<\/li>\n<\/ol>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Dr. Annett Laube<\/strong>\u00a0is a professor at the School of Engineering and Computer Science at BFH, the Bern University of Applied Sciences. Her interests are identity management, security and trust. She can be reached at <a href=\"https:\/\/www.bfh.ch\/en\/about-bfh\/people\/6db55klgpiwo\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bfh.ch\/en\/about-bfh\/people\/6db55klgpiwo\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Self-sovereign identity (SSI) is a new concept for identity management that shall be used in the Swiss E-ID which is currently under development. The main advantage of SSI is that it better protects the users\u2019 privacy than classical identity solutions do. In September 2021, the Federal Council defined the principles for the design of a [&hellip;]<\/p>\n","protected":false},"author":2008,"featured_media":19764,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4866,354,355,4851,4848],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Self-Sovereign Identities: Challenges and Chances - SI Digital Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Self-Sovereign Identities: Challenges and Chances - SI Digital Magazine\" \/>\n<meta property=\"og:description\" content=\"Self-sovereign identity (SSI) is a new concept for identity management that shall be used in the Swiss E-ID which is currently under development. The main advantage of SSI is that it better protects the users\u2019 privacy than classical identity solutions do. In September 2021, the Federal Council defined the principles for the design of a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\" \/>\n<meta property=\"og:site_name\" content=\"SI Digital Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T22:28:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T22:36:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Annett Laube\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AnnettLaube\" \/>\n<meta name=\"twitter:site\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annett Laube\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\"},\"author\":{\"name\":\"Annett Laube\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/25a39305e005c853847a54003ff7bb11\"},\"headline\":\"Self-Sovereign Identities: Challenges and Chances\",\"datePublished\":\"2023-10-12T22:28:00+00:00\",\"dateModified\":\"2023-10-12T22:36:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\"},\"wordCount\":1004,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"articleSection\":[\"\u2022 Article \u2022\",\"Society\",\"Technology\",\"ZZ_InFocus\",\"ZZ_Slider\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\",\"name\":\"Self-Sovereign Identities: Challenges and Chances - SI Digital Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\"},\"datePublished\":\"2023-10-12T22:28:00+00:00\",\"dateModified\":\"2023-10-12T22:36:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/magazine.swissinformatics.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Self-Sovereign Identities: Challenges and Chances\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"name\":\"SI Digital Magazine\",\"description\":\"Articles from the Swiss Informatics Society (Blog)\",\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\",\"name\":\"Swiss Informatics Society\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"contentUrl\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"width\":1441,\"height\":1081,\"caption\":\"Swiss Informatics Society\"},\"image\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\",\"https:\/\/twitter.com\/SIGesellschaft\",\"https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/25a39305e005c853847a54003ff7bb11\",\"name\":\"Annett Laube\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f62cb5329f09bfcf887af69cf1e9861b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f62cb5329f09bfcf887af69cf1e9861b?s=96&d=mm&r=g\",\"caption\":\"Annett Laube\"},\"sameAs\":[\"https:\/\/bfh.ch\/de\/ueber-die-bfh\/personen\/6db55klgpiwo\/\",\"https:\/\/twitter.com\/AnnettLaube\"],\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/author\/annett-laube\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Self-Sovereign Identities: Challenges and Chances - SI Digital Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/","og_locale":"en_US","og_type":"article","og_title":"Self-Sovereign Identities: Challenges and Chances - SI Digital Magazine","og_description":"Self-sovereign identity (SSI) is a new concept for identity management that shall be used in the Swiss E-ID which is currently under development. The main advantage of SSI is that it better protects the users\u2019 privacy than classical identity solutions do. In September 2021, the Federal Council defined the principles for the design of a [&hellip;]","og_url":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/","og_site_name":"SI Digital Magazine","article_publisher":"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","article_published_time":"2023-10-12T22:28:00+00:00","article_modified_time":"2023-10-12T22:36:11+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2023\/10\/E-ID-Illustration.png","type":"image\/png"}],"author":"Annett Laube","twitter_card":"summary_large_image","twitter_creator":"@AnnettLaube","twitter_site":"@SIGesellschaft","twitter_misc":{"Written by":"Annett Laube","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#article","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/"},"author":{"name":"Annett Laube","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/25a39305e005c853847a54003ff7bb11"},"headline":"Self-Sovereign Identities: Challenges and Chances","datePublished":"2023-10-12T22:28:00+00:00","dateModified":"2023-10-12T22:36:11+00:00","mainEntityOfPage":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/"},"wordCount":1004,"commentCount":0,"publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"articleSection":["\u2022 Article \u2022","Society","Technology","ZZ_InFocus","ZZ_Slider"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/","url":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/","name":"Self-Sovereign Identities: Challenges and Chances - SI Digital Magazine","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#website"},"datePublished":"2023-10-12T22:28:00+00:00","dateModified":"2023-10-12T22:36:11+00:00","breadcrumb":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/magazine.swissinformatics.org\/en\/self-sovereign-identities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/magazine.swissinformatics.org\/en\/"},{"@type":"ListItem","position":2,"name":"Self-Sovereign Identities: Challenges and Chances"}]},{"@type":"WebSite","@id":"https:\/\/magazine.swissinformatics.org\/en\/#website","url":"https:\/\/magazine.swissinformatics.org\/en\/","name":"SI Digital Magazine","description":"Articles from the Swiss Informatics Society (Blog)","publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization","name":"Swiss Informatics Society","url":"https:\/\/magazine.swissinformatics.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","contentUrl":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","width":1441,"height":1081,"caption":"Swiss Informatics Society"},"image":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","https:\/\/twitter.com\/SIGesellschaft","https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g"]},{"@type":"Person","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/25a39305e005c853847a54003ff7bb11","name":"Annett Laube","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f62cb5329f09bfcf887af69cf1e9861b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f62cb5329f09bfcf887af69cf1e9861b?s=96&d=mm&r=g","caption":"Annett Laube"},"sameAs":["https:\/\/bfh.ch\/de\/ueber-die-bfh\/personen\/6db55klgpiwo\/","https:\/\/twitter.com\/AnnettLaube"],"url":"https:\/\/magazine.swissinformatics.org\/en\/author\/annett-laube\/"}]}},"_links":{"self":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/19754"}],"collection":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/users\/2008"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/comments?post=19754"}],"version-history":[{"count":18,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/19754\/revisions"}],"predecessor-version":[{"id":19791,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/19754\/revisions\/19791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/media\/19764"}],"wp:attachment":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/media?parent=19754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/categories?post=19754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/tags?post=19754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}