{"id":26570,"date":"2022-04-20T17:29:00","date_gmt":"2022-04-20T15:29:00","guid":{"rendered":"https:\/\/perseus.de\/hackers\/"},"modified":"2026-03-30T10:06:06","modified_gmt":"2026-03-30T08:06:06","slug":"hackers","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/hackers\/","title":{"rendered":"Hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26570\" class=\"elementor elementor-26570 elementor-22266\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Hackers<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bb1d56b e-flex e-con-boxed e-con e-parent\" data-id=\"5bb1d56b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-235b0387 e-con-full e-flex e-con e-child\" data-id=\"235b0387\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>In the field of information technology, a &#8220;hacker&#8221; is someone who penetrates computer systems without authorization. Criminal hackers are predominantly present in the public consciousness, using their skills to their advantage and to the detriment of others. However, there are also &#8220;ethical hackers&#8221; who uncover gaps in systems and networks so that they can be better secured. For this purpose, the Federal Intelligence Service (BND), for example, employs professional hackers.   <\/p><h4> <\/h4><h4>What does the term hacker mean in detail?<\/h4><div> <\/div><p>The term is derived from the English verb &#8220;to hack&#8221;, which (similar to the German term) means to chop something, to disassemble something. The term &#8220;hacker&#8221; originated in the 1950s and originally referred to tinkerers who dismantled technical devices and tried to reassemble them differently, new or improved. Since the early 1980s, the term hacker has been increasingly linked to the topic of cybercrime. Today, there are roughly three types of hackers:   <\/p><ul><li>Ethical hackers or &#8220;white hats&#8221; detect security gaps and problems so that these vulnerabilities can be eliminated. They can do this professionally or in their free time and even prove their ethics with internationally recognized certificates. <\/li><li>Criminal hackers or &#8220;black hats&#8221; are those who are predominantly associated with the word &#8220;hacker&#8221; today. For good reason. Because it is of great importance to raise awareness of the dangers they pose.  <\/li><li>A third group is called &#8220;grey hats&#8221;. This is a collective term for all hackers who cannot be clearly assigned to the other two groups. For example, because they use illegal means to uncover security vulnerabilities in a computer program and publish them on the Internet \u2013 but without giving the manufacturer time to close the gaps beforehand.<br>The original meaning of the term hacker is linked to the &#8220;life hacks&#8221; popular on the Internet. These are playful tricks that (at least supposedly) make life easier. For example, how to cool a beer in 2 minutes or how to clean the computer keyboard with a post-it.    <\/li><\/ul><h4> <\/h4><h4>Where do I encounter hackers in my everyday work?<\/h4><div> <\/div><p>You can encounter hackers almost anywhere in your everyday work. Virtually, for example, through a cleverly designed email that wants to persuade you to open the attachment (<a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/social-engineering\/\">social engineering<\/a>). In our connected world, the work of hackers can also have an impact on seemingly non-digital aspects of our everyday lives. For example, train, bus or train cancellations may occur due to a hack at a public transport service provider. Or thanks to an ethical hacker, the next update of the on-board computer of your company car contains program lines that make it difficult for unauthorized persons to open the central locking system.    <\/p><h4> <\/h4><h4>What can I do to protect myself from hackers?<\/h4><div> <\/div><p>Hackers use many different methods, starting points and security gaps to penetrate computer systems without authorization. Comprehensively increase your organization&#8217;s <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybersicherheit\/\">cybersecurity<\/a> to minimize points of attack for hackers. Important measures include:  <\/p><ul><li>Updates <a href=\"https:\/\/perseus.de\/2022\/04\/26\/update\/\">that are as<\/a> up-to-date as possible<\/li><li>Relevant IT structures such as <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">firewalls<\/a> and virus scanners<\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/mitarbeitenden-sensibilisierung\/\">Sensitization of your employees<\/a><\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/passwortsicherheit\/\">Secure passwords<\/a><\/li><li>If necessary, separate networks for sensitive company divisions or departments<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc607f0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fc607f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Hackers In the field of information technology, a &#8220;hacker&#8221; is someone who penetrates computer systems without authorization. Criminal hackers are predominantly present in the public consciousness, using their skills to their advantage and to the detriment of others. However, there are also &#8220;ethical hackers&#8221; who uncover gaps in systems and networks so that they can [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"tags":[],"class_list":["post-26570","post","type-post","status-publish","format-standard","hentry","category-cyber-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Hackers In the field of information technology, a &#8220;hacker&#8221; is someone who penetrates computer systems without authorization. Criminal hackers are predominantly present in the public consciousness, using their skills to their advantage and to the detriment of others. However, there are also &#8220;ethical hackers&#8221; who uncover gaps in systems and networks so that they can [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T15:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T08:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Hackers\",\"datePublished\":\"2022-04-20T15:29:00+00:00\",\"dateModified\":\"2026-03-30T08:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/\"},\"wordCount\":509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyber Glossary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/\",\"name\":\"Hackers - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-20T15:29:00+00:00\",\"dateModified\":\"2026-03-30T08:06:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/hackers\/","og_locale":"en_US","og_type":"article","og_title":"Hackers - Perseus Technologies","og_description":"Hackers In the field of information technology, a &#8220;hacker&#8221; is someone who penetrates computer systems without authorization. Criminal hackers are predominantly present in the public consciousness, using their skills to their advantage and to the detriment of others. However, there are also &#8220;ethical hackers&#8221; who uncover gaps in systems and networks so that they can [&hellip;]","og_url":"https:\/\/perseus.de\/en\/hackers\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-20T15:29:00+00:00","article_modified_time":"2026-03-30T08:06:06+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/hackers\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/hackers\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Hackers","datePublished":"2022-04-20T15:29:00+00:00","dateModified":"2026-03-30T08:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/hackers\/"},"wordCount":509,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyber Glossary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/hackers\/","url":"https:\/\/perseus.de\/en\/hackers\/","name":"Hackers - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/hackers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-20T15:29:00+00:00","dateModified":"2026-03-30T08:06:06+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/hackers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Hackers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26570"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26570\/revisions"}],"predecessor-version":[{"id":26571,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26570\/revisions\/26571"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}