{"id":251,"date":"2022-06-22T16:29:01","date_gmt":"2022-06-22T16:29:01","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=251"},"modified":"2022-06-22T16:29:01","modified_gmt":"2022-06-22T16:29:01","slug":"hur-saker-ar-blockchain-tekniken","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/hur-saker-ar-blockchain-tekniken\/","title":{"rendered":"Hur s\u00e4ker \u00e4r Blockchain-tekniken?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Vad \u00e4r blockchain-teknik? Du kanske har h\u00f6rt termen ofta p\u00e5 sistone, men vad betyder den? I korthet \u00e4r blockkedjeteknik ett s\u00e4tt att p\u00e5 ett s\u00e4kert och transparent s\u00e4tt dela data mellan tv\u00e5 eller flera parter. Blockkedjetekniken bygger p\u00e5 mycket restriktiva regler f\u00f6r matematik och programvara som g\u00f6r det sv\u00e5rt att hacka eller manipulera den, vilket g\u00f6r den till ett mycket s\u00e4kert alternativ f\u00f6r data\u00f6verf\u00f6ring. Den l\u00e4mpar sig s\u00e4rskilt v\u00e4l f\u00f6r situationer d\u00e4r f\u00f6rtroende och verifiering \u00e4r avg\u00f6rande, t.ex. finansiella transaktioner eller informationsutbyte mellan personer som inte k\u00e4nner varandra.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Blockkedjans s\u00e4kerhets\u00e5tg\u00e4rder<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">En av de fr\u00e4msta f\u00f6rdelarna med blockkedjetekniken \u00e4r dess s\u00e4kerhet. Eftersom varje block i en blockkedja inneh\u00e5ller en kryptografisk hash av det f\u00f6reg\u00e5ende blocket \u00e4r det en utmaning att f\u00f6ra in bedr\u00e4gliga data i kedjan. F\u00f6r att lyckas manipulera data i en blockkedja skulle man beh\u00f6va \u00e4ndra data i det aktuella blocket och alla block som kommer efter det - vilket blir allt sv\u00e5rare och dyrare ju fler block som l\u00e4ggs till i kedjan.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">En annan s\u00e4kerhets\u00e5tg\u00e4rd som g\u00f6r blockchain s\u00e4rskilt v\u00e4l l\u00e4mpad f\u00f6r finansiella transaktioner \u00e4r dess decentraliserade natur. Till skillnad fr\u00e5n traditionella banksystem, som \u00e4r beroende av centrala myndigheter f\u00f6r att verifiera och godk\u00e4nna transaktioner, g\u00f6r blockchain det m\u00f6jligt f\u00f6r anv\u00e4ndare att handla direkt med varandra utan behov av en tredje part. Detta g\u00f6r transaktionerna snabbare och effektivare och minskar risken f\u00f6r bedr\u00e4geri eller manipulering, eftersom det inte finns n\u00e5gon central kontrollpunkt.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Anv\u00e4ndningsomr\u00e5den f\u00f6r Blockchain-teknik<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">F\u00f6rutom s\u00e4kerhetsf\u00f6rdelarna har blockkedjetekniken flera andra potentiella anv\u00e4ndningsomr\u00e5den. Den skulle till exempel kunna anv\u00e4ndas f\u00f6r att skapa manipuleringss\u00e4kra r\u00f6stningssystem, fastighetsregister eller medicinska journaler. Den kan ocks\u00e5 anv\u00e4ndas f\u00f6r att effektivisera leveranskedjor eller se till att k\u00e4nsliga uppgifter inte l\u00e4cker ut. M\u00f6jligheterna \u00e4r o\u00e4ndliga - och i takt med att tekniken forts\u00e4tter att utvecklas kommer vi sannolikt att f\u00e5 se \u00e4nnu fler innovativa anv\u00e4ndningsomr\u00e5den f\u00f6r den.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Blockkedjetekniken befinner sig fortfarande i ett tidigt skede och m\u00e5ste ta itu med vissa utmaningar innan den kan anv\u00e4ndas p\u00e5 bred front. Dess potential \u00e4r dock obestridlig - och i takt med att allt fler f\u00f6retag och organisationer b\u00f6rjar utforska dess anv\u00e4ndningsomr\u00e5den kommer vi sannolikt att f\u00e5 se den spela en viktig roll f\u00f6r hur vi lever och arbetar under de kommande \u00e5ren.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Blockchains s\u00e4kerhetsutmaningar<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">En utmaning som blockkedjetekniken st\u00e5r inf\u00f6r \u00e4r skalbarheten. Eftersom varje block i en blockkedja inneh\u00e5ller en kryptografisk hash av det f\u00f6reg\u00e5ende blocket v\u00e4xer kedjans storlek i takt med att fler block l\u00e4ggs till - vilket i slut\u00e4ndan kan g\u00f6ra systemet l\u00e5ngsammare. En annan utmaning \u00e4r styrning. Eftersom ingen central myndighet kontrollerar en blockkedja kan det vara sv\u00e5rt att g\u00f6ra \u00e4ndringar eller uppdateringar i systemet. Detta kan g\u00f6ra det sv\u00e5rt att anpassa sig till nya regler eller behov.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Trots dessa utmaningar har blockkedjetekniken en enorm potential - och vi har bara b\u00f6rjat skrapa p\u00e5 ytan av vad den kan g\u00f6ra. I takt med att fler f\u00f6retag och organisationer utforskar dess anv\u00e4ndningsomr\u00e5den och hittar s\u00e4tt att \u00f6vervinna dess utmaningar kommer vi sannolikt att se \u00e4nnu fler innovativa till\u00e4mpningar f\u00f6r denna omv\u00e4lvande teknik under de kommande \u00e5ren.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Slutsats<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Blockkedjetekniken \u00e4r ett s\u00e4kert och transparent s\u00e4tt att dela data mellan tv\u00e5 eller flera parter. Den bygger p\u00e5 mycket restriktiva regler f\u00f6r matematik och programvara som g\u00f6r den sv\u00e5r att manipulera, vilket g\u00f6r den till ett utm\u00e4rkt alternativ f\u00f6r data\u00f6verf\u00f6ring. Blockkedjans decentraliserade natur g\u00f6r dessutom transaktionerna snabbare och effektivare samtidigt som risken f\u00f6r bedr\u00e4geri eller manipulering minskar. \u00c4ven om blockkedjetekniken fortfarande befinner sig i ett tidigt skede har den en enorm potential, och vi har bara b\u00f6rjat skrapa p\u00e5 ytan av vad den kan g\u00f6ra.<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Vad \u00e4r blockchain-teknik? Du kanske har h\u00f6rt termen mycket p\u00e5 sistone, men vad betyder den? Kort sagt \u00e4r blockkedjeteknik ett s\u00e4tt att p\u00e5 ett s\u00e4kert och transparent s\u00e4tt dela... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/hur-saker-ar-blockchain-tekniken\/\">Continue reading <span class=\"screen-reader-text\">Hur s\u00e4ker \u00e4r Blockchain-tekniken?<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Secure is Blockchain Technology? | Security Briefing<\/title>\n<meta name=\"description\" content=\"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/hur-saker-ar-blockchain-tekniken\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure is Blockchain Technology? | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/hur-saker-ar-blockchain-tekniken\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T16:29:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"How Secure is Blockchain Technology?\",\"datePublished\":\"2022-06-22T16:29:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\"},\"wordCount\":605,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"articleSection\":[\"Cryptocurrency\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\",\"name\":\"How Secure is Blockchain Technology? | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"datePublished\":\"2022-06-22T16:29:01+00:00\",\"description\":\"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg\",\"width\":1000,\"height\":563,\"caption\":\"How-secure-is-Blockchain-technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure is Blockchain Technology?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hur s\u00e4ker \u00e4r blockkedjetekniken? | S\u00e4kerhetsgenomg\u00e5ng","description":"Ta reda p\u00e5 vad blockkedjeteknik \u00e4r, hur s\u00e4ker den \u00e4r och p\u00e5 vilka olika s\u00e4tt du kan anv\u00e4nda den idag.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/hur-saker-ar-blockchain-tekniken\/","og_locale":"sv_SE","og_type":"article","og_title":"How Secure is Blockchain Technology? | Security Briefing","og_description":"Find out what blockchain technology is, how secure it is, and the different ways in which you can use it today.","og_url":"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/hur-saker-ar-blockchain-tekniken\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T16:29:01+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"How Secure is Blockchain Technology?","datePublished":"2022-06-22T16:29:01+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/"},"wordCount":605,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","articleSection":["Cryptocurrency"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/","name":"Hur s\u00e4ker \u00e4r blockkedjetekniken? | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","datePublished":"2022-06-22T16:29:01+00:00","description":"Ta reda p\u00e5 vad blockkedjeteknik \u00e4r, hur s\u00e4ker den \u00e4r och p\u00e5 vilka olika s\u00e4tt du kan anv\u00e4nda den idag.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/How-secure-is-Blockchain-technology-min.jpg","width":1000,"height":563,"caption":"How-secure-is-Blockchain-technology"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/how-secure-is-blockchain-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How Secure is Blockchain Technology?"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=251"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/251\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/252"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}