{"id":41258,"date":"2024-11-12T15:52:20","date_gmt":"2024-11-12T15:52:20","guid":{"rendered":"https:\/\/www.cyberguru.it\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/"},"modified":"2024-12-04T13:15:36","modified_gmt":"2024-12-04T13:15:36","slug":"it-wallet-the-glitter-and-the-many-dark-sides","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/","title":{"rendered":"It Wallet, the glitter and the many dark sides&#8230;"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-quando-la-nostra-identita-viaggia-in-rete-siamo-sicuri-di-scegliere-noi-la-direzione\"><em>When our identity travels on the Web, are we sure we choose the direction?<\/em><\/h2>\n\n<p>Forgetting your driver&#8217;s license at home, not having your health card with you when you need it, standing in a long line at an administrative counter and finding that we are missing that very document that we can no longer find. Situations in which we have all come across and which, especially in our country where bureaucracy carries a lot of specific weight, can have a very disturbing impact on everyday life. <br\/>In the increasingly near future, these obstacles will no longer exist. Or at least that is the goal behind <strong>IT<\/strong> Wallet, the digital wallet that is being talked about a lot these days and that aims to collect in a single application on our smartphones the essential documents and information about our lives: biographical, health, economic, banking, educational, professional, etc. <\/p>\n\n<p>Currently there are about 50 thousand Italians who are experimenting with it before the official launch scheduled for December 4. At that point the real impact of IT Wallet will be measured by the number of people who download the application and start using it. The Italian tool is considered the forerunner of the European <a href=\"https:\/\/ec.europa.eu\/digital-building-blocks\/sites\/display\/EUDIGITALIDENTITYWALLET\/EU+Digital+Identity+Wallet+Home\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Digital Identity<\/em> Wall<\/a> et <a href=\"https:\/\/ec.europa.eu\/digital-building-blocks\/sites\/display\/EUDIGITALIDENTITYWALLET\/EU+Digital+Identity+Wallet+Home\" target=\"_blank\" rel=\"noreferrer noopener\">(EUDI Wallet)<\/a> project that will be launched in 2026. All European businesses and citizens will thus be able to authenticate their digital identity using for interactions with the public and private sectors a single ID that will dialogue with the digital wallets of the member states.   <\/p>\n\n<p>Coordinated by the <strong>Department for Digital Transformation<\/strong> and the<a href=\"https:\/\/www.agid.gov.it\/it\/piattaforme\/it-wallet\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>AgID<\/strong><\/a>, the project will involve up to <strong>44.5 million Italian citizens of age<\/strong>, making digitization accessible even to those who do not yet have a digital identity card or SPID.<\/p>\n\n<p>All digital documents will be saved in the &#8220;Wallet&#8221; section of the &#8220;IO&#8221; App ready to be used initially in physical settings, such as roadside checks or access to health services. Starting in 2025, the IT-Wallet will also allow online use, as with digital payments, making everything even more convenient and integrated. <\/p>\n\n<pre class=\"wp-block-verse\"><strong>It all sounds beautiful and convenient. No more bureaucracy, endless lines at counters, dangerous forgetfulness.   <\/strong><\/pre>\n\n<p>All collected in our phones, which are now real computers and without which living could be complicated. In addition, <strong>integration with the European EUDI Wallet system will enable the use of digital documents in other countries as well<\/strong>, facilitating travel and paperwork throughout the EU. <\/p>\n\n<p>However, not everyone is enchanted by this prospect and awaits the novelty with open arms. On the contrary, the debate has become very heated: for lovers of digitization, this is an important milestone achieved, which will also help speed up the ecological transition given the huge amount of paper saved; for others, it is a dangerous attack on our privacy and a further attempt to control our lives. <\/p>\n\n<p>The latter include not only the usual catastrophists ready to criminalize every new step toward technological and digital progress but also some <strong>cybersecurity experts<\/strong> and digital rights associations who have sounded the alarm about the potential risks.<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-i-principali-timori-riguardano\">The main concerns include:  <\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>The inadequacy of current authentication systems<\/strong> that rely on SPID or CIE and the consequent need to introduce other types of <strong>recognition<\/strong>, such as <strong>biometric<\/strong> (e.g., facial or through fingerprints), to increase the level of security. However, a solution that raises doubts and privacy issues;   <\/li>\n\n\n\n<li><strong>The risk of sharing data extranationally<\/strong>, a service that, despite its undoubted convenience, creates questions about how and where this information will be stored and who will be able to access it;<\/li>\n\n\n\n<li><strong>The risk of exclusion<\/strong>. Indeed, not everyone has access to a smartphone or a stable Internet connection. This makes it difficult, especially for the elderly or those living in underserved areas, to use the application efficiently resulting in inevitable inequalities among citizens.  <\/li>\n<\/ul>\n\n<p>A further concern relates to possible forms of state storage and monitoring of this personal digital data and its use for <strong>&#8220;social credit&#8221;<\/strong> <strong>or &#8220;points-based citizenship&#8221;<\/strong> <strong>systems<\/strong> <strong>that reward citizens based on their behavior<\/strong>, granting them services or excluding them from them, as is already done in various forms in China, the United Kingdom and Israel.<\/p>\n\n<p>Not to mention the <strong>risk of lost, broken, or stolen<\/strong> smartphones. Losing your phone could become a very serious problem from now on. <\/p>\n\n<p>Last, but certainly not least, there is another point of particular concern and one that is of close interest to us: the <strong>risk of cyber breaches and attacks<\/strong>: such a high concentration of sensitive data in a single app is a tasty morsel for cybercriminals who are certainly abuzz these days waiting for the arrival and wide distribution of this latest digital innovation.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-un-rischio-di-cui-gli-addetti-ai-lavori-sono-ben-consapevoli-tanto-che-eurosmart-associazione-che-riunisce-esperti-di-privacy-ha-evidenziato-la-necessita-di-una-sicurezza-informatica-rigorosa-per-i-componenti-fisici-del-portafoglio\">This is a risk that insiders are well aware of, so much so that Eurosmart (an association that brings together privacy experts) has highlighted the need for strict cybersecurity for physical wallet components.<\/h2>\n\n<p><strong>As a result, the European Commission tasked ENISA, the EU cybersecurity agency<\/strong>, to provide certification support for the national and European portfolios.<\/p>\n\n<p>As for Italy, according to available information, IT Wallet applications and features have been developed following the principles of <em>security by design<\/em>, an approach that implies that security is not a later addition, but is integrated into the development process from the beginning. This means that every step, from design to implementation, is careful to ensure that user data is protected, minimizing risks and improving system resilience. <\/p>\n\n<p>In addition, security processes will be reviewed periodically by relevant government agencies, which will ensure that in this way the security and privacy standards of citizens will be met.<\/p>\n\n<p>Regarding possible breaches of the &#8220;private key&#8221; of each digital wallet, IT-Wallet has introduced the use of a code or fingerprint, with the <strong>possibility of locking the wallet if the phone is stolen or lost.<\/strong> In addition, digital data will be encrypted and shared only temporarily with the State Mint and Printing Institute. To access services that require a higher level of security, the use of the CIE (Electronic Identity Card) will be required.  <\/p>\n\n<p>In short, it seems that along with the growth of digitization there is also an increased awareness of risks resulting in regulatory actions, at the European and individual state level, for greater protection from cyber risk.<\/p>\n\n<p>However, this can never ensure total protection because in the field of cybersecurity, relying on protections dropped from above can be very dangerous. In fact, we know that cybercriminals, who are becoming more and more skilled and cunning, will surely be able to bypass the main protections and, as always, will look for new ways to &#8220;work their flanks&#8221; on their victims. The human factor will continue to be the weak link in the chain in an increasingly connected and digitized world in which the sensitive data of all of us will be increasingly within the reach of dark web pirates.  <\/p>\n\n<p><strong>The only way to protect our digital identity is to strengthen our cyber knowledge and awareness of the actions we take online.<\/strong>  To do this, it is necessary to follow customized and quality training paths, built specifically on our level of digital literacy and increasingly indispensable in the reality ahead.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>When our identity travels on the Web, are we sure we choose the direction? Forgetting your driver&#8217;s license at home, not having your health card with you when you need it, standing in a long line at an administrative counter and finding that we are missing that very document that we can no longer find. [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":41200,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[468,470,957],"class_list":["post-41258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-security-en-2","tag-cyber-security-awareness-en-3","tag-privacy-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>It Wallet, the glitter and the many dark sides...<\/title>\n<meta name=\"description\" content=\"IT-Wallet, Italy&#039;s first digital wallet, is coming! Between the enthusiasts and the catastrophists, what are the risks to privacy and cyber security?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It Wallet, the glitter and the many dark sides...\" \/>\n<meta property=\"og:description\" content=\"IT-Wallet, Italy&#039;s first digital wallet, is coming! Between the enthusiasts and the catastrophists, what are the risks to privacy and cyber security?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-12T15:52:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-04T13:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/11\/IT-wallet-header.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"It Wallet, the glitter and the many dark sides&#8230;\",\"datePublished\":\"2024-11-12T15:52:20+00:00\",\"dateModified\":\"2024-12-04T13:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/\"},\"wordCount\":1174,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/IT-wallet-header.webp\",\"keywords\":[\"Cyber Security\",\"Cyber Security Awareness\",\"Privacy\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/\",\"name\":\"It Wallet, the glitter and the many dark sides...\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/IT-wallet-header.webp\",\"datePublished\":\"2024-11-12T15:52:20+00:00\",\"dateModified\":\"2024-12-04T13:15:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"IT-Wallet, Italy's first digital wallet, is coming! Between the enthusiasts and the catastrophists, what are the risks to privacy and cyber security?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/IT-wallet-header.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/IT-wallet-header.webp\",\"width\":1200,\"height\":688,\"caption\":\"IT-wallet-header\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/11\\\/12\\\/it-wallet-the-glitter-and-the-many-dark-sides\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It Wallet, the glitter and the many dark sides&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"It Wallet, the glitter and the many dark sides...","description":"IT-Wallet, Italy's first digital wallet, is coming! Between the enthusiasts and the catastrophists, what are the risks to privacy and cyber security?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/","og_locale":"en_US","og_type":"article","og_title":"It Wallet, the glitter and the many dark sides...","og_description":"IT-Wallet, Italy's first digital wallet, is coming! Between the enthusiasts and the catastrophists, what are the risks to privacy and cyber security?","og_url":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-11-12T15:52:20+00:00","article_modified_time":"2024-12-04T13:15:36+00:00","og_image":[{"width":1200,"height":688,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/11\/IT-wallet-header.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"It Wallet, the glitter and the many dark sides&#8230;","datePublished":"2024-11-12T15:52:20+00:00","dateModified":"2024-12-04T13:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/"},"wordCount":1174,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/11\/IT-wallet-header.webp","keywords":["Cyber Security","Cyber Security Awareness","Privacy"],"articleSection":["Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/","url":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/","name":"It Wallet, the glitter and the many dark sides...","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/11\/IT-wallet-header.webp","datePublished":"2024-11-12T15:52:20+00:00","dateModified":"2024-12-04T13:15:36+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"IT-Wallet, Italy's first digital wallet, is coming! Between the enthusiasts and the catastrophists, what are the risks to privacy and cyber security?","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/11\/IT-wallet-header.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/11\/IT-wallet-header.webp","width":1200,"height":688,"caption":"IT-wallet-header"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2024\/11\/12\/it-wallet-the-glitter-and-the-many-dark-sides\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"It Wallet, the glitter and the many dark sides&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/41258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=41258"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/41258\/revisions"}],"predecessor-version":[{"id":41259,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/41258\/revisions\/41259"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/41200"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=41258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=41258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=41258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}