{"id":86452,"date":"2022-06-30T13:06:49","date_gmt":"2022-06-30T11:06:49","guid":{"rendered":"https:\/\/www.hiig.de\/?p=86452"},"modified":"2022-09-28T17:30:17","modified_gmt":"2022-09-28T15:30:17","slug":"hack-and-leak-eu","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/","title":{"rendered":"The EU&#8217;s Regulatory Awakening? Hack-and-Leak Operations in the new EU Code on Disinformation"},"content":{"rendered":"\n<p><strong>Elections are democracy\u2019s most important, yet most vulnerable moment. Interference in the process presents an attack on the foundations of trust and knowledge. One form of this is hacking candidates and then spreading the materials via social media. Twitter came up with policies on the issue \u2013 but their context and design merely enhanced the urgency of a regulatory response by the EU. The new EU Code on Disinformation might bring an end to the platform\u2019s arbitrary handling of the issue.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Numerous Cases of Hack-and-Leak<\/h2>\n\n\n\n<p>When it comes to election interference through social media, the world\u2019s democrats do not shy away from big words. \u201c<a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2017\/05\/06\/macronleaks-debut-d-un-long-et-fastidieux-travail-d-enquete_5123577_4408996.html\" target=\"_blank\" rel=\"noreferrer noopener\">This is about our democracy, sovereignty and national independence<\/a>\u201d, said back then French Minister of Foreign Affairs, Jean-Marc Ayrault, about the Kremlin-orchestrated hack of the Macron campaign in 2017. The so-called #MacronLeaks present one of the most prominent cases of hacked materials being spread via social media. They were preceded by the well known case of the hack-and-leak of emails from the Clinton campaign and the Democratic National Committee before the 2016 US elections.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Lack of Ethics (Codes) for Social Media&#8230;&nbsp;<\/h2>\n\n\n\n<p>Twitter played a role in both cases. While journalistic ethics codes on fact-checking prevented traditional news media from reporting on the contents of the hacked materials (more so in Europe than in the US), the materials spread at near-instantaneous speed on Twitter. This re-affirms a central challenge in the regulation of social media platforms. They share some decisive features with traditional media companies \u2013 but are governed and regulated as technology companies. <a href=\"https:\/\/oxford.universitypressscholarship.com\/view\/10.1093\/oso\/9780198866367.001.0001\/oso-9780198866367-chapter-11\" target=\"_blank\" rel=\"noreferrer noopener\">Platform regulation scholars agree<\/a> that there are several aspects setting social media platforms apart from traditional media companies (such as ownership structure or business model). However, many users are consuming content on social media platforms <a href=\"https:\/\/www.journals.uchicago.edu\/doi\/10.1086\/596645\" target=\"_blank\" rel=\"noreferrer noopener\">in the same way<\/a> they would consume traditional media, and only rarely post themselves. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&#8230; but the trust is still low<\/h2>\n\n\n\n<p>In support of this argument, studies such as the <a href=\"https:\/\/reutersinstitute.politics.ox.ac.uk\/sites\/default\/files\/2020-06\/DNR_2020_FINAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Reuters Institute Digital News<\/a> <a href=\"https:\/\/reutersinstitute.politics.ox.ac.uk\/sites\/default\/files\/2020-06\/DNR_2020_FINAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Report<\/a> have found that individuals around the globe are increasingly getting their news through social media instead of consuming traditional news media. Therefore, social media platforms are fulfilling the function of traditional media for many users \u2013 but are not guided by comparable journalistic standards. This can be dangerous, particularly in vulnerable moments such as elections and election silence periods. In France and several other countries, the electoral code demands that the media stops reporting on the candidates in the hours leading up to the opening of polling stations. The #MacronLeaks accordingly fell into the time of this journalistic vacuum and <a href=\"https:\/\/link.springer.com\/article\/10.1057\/s41253-019-00090-w\" target=\"_blank\" rel=\"noreferrer noopener\">had people turn to Twitter<\/a>. Paradoxically, the high democratic commitment by French media could have been a real threat to the electoral process \u2013 if it had not been for <a href=\"https:\/\/www.csis.org\/analysis\/successfully-countering-russian-electoral-interference\" target=\"_blank\" rel=\"noreferrer noopener\">several factors<\/a> such as low trust in social media among French voters which made the attempt of interference fail.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hack-and-Leak Operations are now on the EU\u2019s Regulatory Agenda<\/h2>\n\n\n\n<p>That hacked materials are often spiked with disinformation and disclose names, contact details or even more sensitive information. That given, the distribution presents a challenge at the interplay of many regulatory areas. First and foremost, the regulatory \u201cproblem child\u201d of dis- and mal-information. The EU has recognized the threat which online information operations orchestrated by malicious foreign actors, such as the leaking of hacked materials, can present to elections. Before the European Elections in 2019, several social media platforms became signatories of the <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/2018-code-practice-disinformation\" target=\"_blank\" rel=\"noreferrer noopener\">2018 EU Code of Practice on Disinformation<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Responding to company&#8217;s self-regulation practices<\/h2>\n\n\n\n<p>This Code of Practice is a self-regulatory tool which essentially failed to bring about real change. With the <a href=\"https:\/\/ec.europa.eu\/info\/strategy\/priorities-2019-2024\/europe-fit-digital-age\/digital-services-act-ensuring-safe-and-accountable-online-environment_en\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Services Act<\/a> (DSA) the EU has now recognized that platforms with behaviorally targeted advertising business models need to be strictly co-regulated. On June 16th 2022, the EU Commission <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/code-practice-disinformation\" target=\"_blank\" rel=\"noreferrer noopener\">finally published a revised version<\/a> of the Code of Practice on Disinformation which is a part of the DSA. As the first regulatory document, the Code now mentions hack-and-leak operations in its chapter on impermissible manipulative behavior. Under Measure 14.1 of the code, platforms are obliged to \u201c<a href=\"https:\/\/digital-strategy.ec.europa.eu\/news-redirect\/749495\" target=\"_blank\" rel=\"noreferrer noopener\">adopt, reinforce and implement clear policies<\/a>\u201d regarding hack-and-leak operations by malicious actors. This can be seen as a regulatory awakening in response to Twitter\u2019s self-regulation of the issue.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Twitter\u2019s Hacked Materials Policy made it a Plaything of Populists<\/h2>\n\n\n\n<p>The platform first published a hacked materials policy before the US midterm elections in 2018 in response to the uproar over Russian interference and hacking in the 2016 elections. This first version of the policy \u201c<a href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2018\/an-update-on-our-elections-integrity-work\" target=\"_blank\" rel=\"noreferrer noopener\">prohibit[s] the distribution of hacked material that contains private information or trade secrets<\/a>\u201d or those that could potentially be harmful; and the company says it will \u201c<a href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2018\/an-update-on-our-elections-integrity-work\" target=\"_blank\" rel=\"noreferrer noopener\">take actions on accounts claiming responsibility for a hack or include[..] threats or incentives to hack specific people or accounts.<\/a>\u201d Two years later, ahead of the US presidential election, Twitter initially removed and blocked links to a NY Post article containing private content, allegedly obtained by a hack of Hunter Biden\u2019s laptop. After populist outcry of denying freedom of speech, Twitter reversed its decision and<a href=\"https:\/\/help.twitter.com\/de\/rules-and-policies\/hacked-materials\" target=\"_blank\" rel=\"noreferrer noopener\"> changed its hacked materials policy<\/a> to<a href=\"https:\/\/twitter.com\/vijaya\/status\/1316923557268652033?s=20&amp;t=g28bP2zxnLsYGReJYiIicg\" target=\"_blank\" rel=\"noreferrer noopener\"> allow links to hacked information<\/a>. Essentially, the platform decided to overhaul its former policy completely and no longer delete tweets distributing or leaking hacked materials \u2013 unless they are posted by the hackers themselves. Vijaya Gadde, head of legal, policy, and trust at Twitter, explained the change in the policy in a <a href=\"https:\/\/twitter.com\/vijaya\/status\/1316923557268652033?s=20&amp;t=g28bP2zxnLsYGReJYiIicg\" target=\"_blank\" rel=\"noreferrer noopener\">lengthy thread<\/a>. The platform made itself a plaything of populist outcries and excused it with the protection of freedom of speech. The two policies and their context show that the company responded to current perceived political sentiments rather than developing a policy on hacked materials which would mirror ethics codes of traditional media.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Efficiency on hack-and-leak&nbsp;operations remains open&nbsp;&nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/digital-strategy.ec.europa.eu\/news-redirect\/749495\" target=\"_blank\" rel=\"noreferrer noopener\">updated EU Code of Practice on Disinformation<\/a> now co-regulates hack-and-leak operations as impermissible manipulative behavior. The coming months will show how Twitter\u2019s hacked materials policy will change as a response. In the light of especially <a href=\"https:\/\/www.aspi.org.au\/report\/cyber-enabled-foreign-interference-elections-and-referendums\" target=\"_blank\" rel=\"noreferrer noopener\">Russia\u2019s frequent election interference activities<\/a>, one can only hope that the EU\u2019s regulatory awakening includes effective enforcement measures.&nbsp;<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fhack-and-leak-eu%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=The%20EU%E2%80%99s%20Regulatory%20Awakening%3F%20Hack-and-Leak%20Operations%20in%20the%20new%20EU%20Code%20on%20Disinformation https%3A%2F%2Fwww.hiig.de%2Fen%2Fhack-and-leak-eu%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fhack-and-leak-eu%2F&subject=The%20EU%E2%80%99s%20Regulatory%20Awakening%3F%20Hack-and-Leak%20Operations%20in%20the%20new%20EU%20Code%20on%20Disinformation\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Digital Policy: The new EU Code on Disinformation might bring an end to platform\u2019s arbitrary handling of hack-and-leak operations. <\/p>\n","protected":false},"author":9999998,"featured_media":86659,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[1235,1508,1269,1259],"class_list":["post-86452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en","tag-demokratie-en","tag-digitalpolitik","tag-europa-en","tag-plattform-governance-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Society Blog &#8211; Hack-and-Leak Operations in the EU<\/title>\n<meta name=\"description\" content=\"The new EU Code on Disinformation might bring an end to the platform\u2019s arbitrary handling of the issue of hack-and-leak operations\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Society Blog &#8211; Hack-and-Leak Operations in the EU\" \/>\n<meta property=\"og:description\" content=\"The new EU Code on Disinformation might bring an end to the platform\u2019s arbitrary handling of the issue of hack-and-leak operations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-30T11:06:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-28T15:30:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/06\/Blog-Titelbild-\u2013-6-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stefanie Barth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Barth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Society Blog &#8211; Hack-and-Leak Operations in the EU","description":"The new EU Code on Disinformation might bring an end to the platform\u2019s arbitrary handling of the issue of hack-and-leak operations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/","og_locale":"en_US","og_type":"article","og_title":"Digital Society Blog &#8211; Hack-and-Leak Operations in the EU","og_description":"The new EU Code on Disinformation might bring an end to the platform\u2019s arbitrary handling of the issue of hack-and-leak operations","og_url":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/","og_site_name":"HIIG","article_published_time":"2022-06-30T11:06:49+00:00","article_modified_time":"2022-09-28T15:30:17+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/06\/Blog-Titelbild-\u2013-6-1.png","type":"image\/png"}],"author":"Stefanie Barth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefanie Barth","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/"},"author":{"name":"Stefanie Barth","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/a07aa81c80d1dbd4ef1ab5c1cd9c10fd"},"headline":"The EU&#8217;s Regulatory Awakening? Hack-and-Leak Operations in the new EU Code on Disinformation","datePublished":"2022-06-30T11:06:49+00:00","dateModified":"2022-09-28T15:30:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/06\/Blog-Titelbild-\u2013-6-1.png","keywords":["Demokratie","Digitalpolitik","Europa","Plattform Governance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/","url":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/","name":"Digital Society Blog &#8211; Hack-and-Leak Operations in the EU","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/06\/Blog-Titelbild-\u2013-6-1.png","datePublished":"2022-06-30T11:06:49+00:00","dateModified":"2022-09-28T15:30:17+00:00","description":"The new EU Code on Disinformation might bring an end to the platform\u2019s arbitrary handling of the issue of hack-and-leak operations","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/06\/Blog-Titelbild-\u2013-6-1.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2022\/06\/Blog-Titelbild-\u2013-6-1.png","width":800,"height":450,"caption":"Dunkler Raum und Computer Code"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/hack-and-leak-eu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"The EU&#8217;s Regulatory Awakening? Hack-and-Leak Operations in the new EU Code on Disinformation"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/a07aa81c80d1dbd4ef1ab5c1cd9c10fd","name":"Stefanie Barth"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/86452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/9999998"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=86452"}],"version-history":[{"count":4,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/86452\/revisions"}],"predecessor-version":[{"id":87906,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/86452\/revisions\/87906"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/86659"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=86452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=86452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=86452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}