{"id":179,"date":"2007-06-12T19:59:38","date_gmt":"2007-06-12T17:59:38","guid":{"rendered":"http:\/\/security-planet.de\/2007\/06\/12\/wie-wir-uberwacht-werden\/"},"modified":"2007-06-12T19:59:38","modified_gmt":"2007-06-12T17:59:38","slug":"wie-wir-uberwacht-werden","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2007\/06\/12\/wie-wir-uberwacht-werden\/","title":{"rendered":"Wie wir \u00fcberwacht werden"},"content":{"rendered":"<p>Unter <a href=\"http:\/\/panopti.com.onreact.com\/swf\/index.htm\">http:\/\/panopti.com.onreact.com\/swf\/index.htm<\/a> wird sehr gut dargestellt, wie wir auch heute schon im t\u00e4glichen Leben \u00fcberwacht werden (k\u00f6nnen). Und <a href=\"http:\/\/www.vorratsdatenspeicherung.de\/\">wenn Sch\u00e4uble so weitermacht<\/a>, wird es wohl noch deutlich mehr.<\/p>\n<p>Danke an meinen Kollegen Michael f\u00fcr den Link.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unter http:\/\/panopti.com.onreact.com\/swf\/index.htm wird sehr gut dargestellt, wie wir auch heute schon im t\u00e4glichen Leben \u00fcberwacht werden (k\u00f6nnen). Und wenn Sch\u00e4uble so weitermacht, wird es wohl noch deutlich mehr. Danke an meinen Kollegen Michael f\u00fcr den Link.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2],"tags":[480,84],"class_list":["post-179","post","type-post","status-publish","format-standard","hentry","category-allgemeines","tag-politik","tag-uberwachung"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/179\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}