{"id":28091,"date":"2019-07-29T06:57:48","date_gmt":"2019-07-29T06:57:48","guid":{"rendered":"http:\/\/e26ee782-45da-4fc6-92b7-ebbb0a3cec16"},"modified":"2019-07-29T06:57:48","modified_gmt":"2019-07-29T06:57:48","slug":"telstra-questions-whether-metadata-restrictions-are-working-as-intended","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/","title":{"rendered":"Telstra questions whether metadata restrictions are working as intended"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2014\/10\/02\/71ac9abd-4a0a-11e4-b6a0-d4ae52e95e57\/thumbnail\/770x578\/9f5216fbd22812f054fd9d001f060a84\/40153870-1-police-line-notice-cops-610.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Australia&#8217;s incumbent telco has questioned whether the legislation restrictions on the nation&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/mandatory-data-retention-passes-australian-parliament\/\">metadata regime<\/a> are &#8220;operating as effective as intended&#8221;.<\/p>\n<p>The scheme, which has cost telcos <a href=\"https:\/\/www.zdnet.com\/article\/data-retention-costs-australian-telcos-upwards-of-au210-million-to-date\/\">AU$210 million so far<\/a> to set up and operate, forces carriers to store customer call records, location information, IP addresses, billing information, and other data for two years, and make this information accessible without a warrant by law-enforcement agencies.<\/p>\n<p>However, despite the legislation spelling out only 21 enforcement agencies have the ability to access the retained data, <a href=\"https:\/\/www.zdnet.com\/article\/local-councils-and-taxi-commission-continued-to-seek-telco-metadata-comms-alliance\/\">many other agencies<\/a> are also able to request metadata under different legal provisions.<\/p>\n<p>Telstra said in a submission to the Parliamentary Joint Committee on Intelligence and Security review of the mandatory data retention regime that some of those agencies skirting the metadata laws are not paying for access.<\/p>\n<p>&#8220;There is a risk this type of access to telecommunications data could erode public trust in the regime and undermine the relationship we have with our customers in relation to protection of their privacy,&#8221; Telstra wrote.<\/p>\n<p>&#8220;In some cases, these agencies and bodies are also not contributing to the cost recovery of the regime.&#8221;<\/p>\n<p><strong>Read: <a href=\"https:\/\/www.zdnet.com\/article\/optus-gained-exemption-to-store-metadata-unencrypted\/\">Optus gained exemption to store metadata unencrypted<\/a><\/strong>&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>In an earlier submission, the Law Council of Australia said the agencies that are able to access metadata should be <a href=\"https:\/\/www.zdnet.com\/article\/law-council-wants-warrants-and-crime-threshold-for-metadata-retention-scheme\/%22\">spelled out in legislation<\/a>, however Telstra was not so brave, instead saying non-enforcement agencies should be forced to go through the same process as enforcement agencies.<\/p>\n<p>&#8220;It would provide clarity that all entities seeking telecommunications data are captured under the standard cost recovery system of the regime, which may also encourage them to carefully consider the amount and scope of data required,&#8221; the telco said.<\/p>\n<p>Generally agreeing with the <a href=\"https:\/\/www.zdnet.com\/article\/clean-energy-regulator-wa-mines-department-and-vet-surgeons-board-trying-to-access-metadata-comms-alliance\/\">submission by the Communications Alliance<\/a>, Telstra echoed that non-enforcement agencies often request large amounts of data and are unable to interpret it.<\/p>\n<p>Telstra added that non-enforcement agencies might not be encrypting data received from telcos.<\/p>\n<p>&#8220;We believe there is a need for the introduction of appropriate oversight mechanisms to ensure measures are in place to securely protect disclosed data and to control who can\/can&#8217;t access the data,&#8221; Telstra said.<\/p>\n<p>The telco <a href=\"https:\/\/www.zdnet.com\/article\/optus-gained-exemption-to-store-metadata-unencrypted\/\">joined calls<\/a> that Internet of Things (IoT) data should be exempted from the metadata regime.<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.zdnet.com\/article\/home-affairs-floats-making-telcos-retain-mac-addresses-and-port-numbers\/\">Home Affairs floats making telcos retain MAC addresses and port numbers<\/a><\/strong><\/p>\n<p>&#8220;It seems unlikely that the timing and length of data sessions from a smart meter which provides throughput or output measures at regular intervals would provide useful information to the listed law-enforcement agencies,&#8221; Telstra said.<\/p>\n<p>Last week, Home Affairs Minister Peter Dutton defended the checks and protections within <a href=\"https:\/\/www.zdnet.com\/article\/data-retention-costs-australian-telcos-upwards-of-au210-million-to-date\/\">Australia&#8217;s data retention regime<\/a>.<\/p>\n<p>&#8220;There are mechanisms in place, safe checks, and they should be adhered to, and if not, there are consequences for that,&#8221; he said.<\/p>\n<p>&#8220;Take the protections very seriously. But in the end, the vast majority of cases, 99% of the use of these laws will be appropriate, and they&#8217;ll be used in a way that that will result in protecting Australians &#8212; and that&#8217;s the reality.&#8221;<\/p>\n<p>Later in the week, ACT Policing confessed to accessing metadata without authorisation <a href=\"https:\/\/www.zdnet.com\/article\/act-policing-had-an-unauthorised-metadata-access-party-3249-further-times-in-2015\/%22\">3,249 extra times in 2015<\/a> than previously disclosed.<\/p>\n<p>&#8220;Once the issue was discovered, ACT Policing notified the Ombudsman&#8217;s Office to seek advice on how to remedy this administrative oversight,&#8221; it said.<\/p>\n<p>&#8220;ACT Policing has sought legal advice regarding the management of two matters relating to a missing persons case and a criminal matter where the data in question may have been used in a prosecution.&#8221;<\/p>\n<p>The only consequences identified by ACT Policing on Friday was &#8220;refresher training&#8221; for officers.<\/p>\n<h3>Related Coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Freeloading agencies skirting Australia&#8217;s metadata restrictions often do not understand, or adequately protect requested metadata, the telco says.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28092,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-28091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Telstra questions whether metadata restrictions are working as intended 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Telstra questions whether metadata restrictions are working as intended 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-29T06:57:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Telstra questions whether metadata restrictions are working as intended\",\"datePublished\":\"2019-07-29T06:57:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/\"},\"wordCount\":609,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/\",\"name\":\"Telstra questions whether metadata restrictions are working as intended 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg\",\"datePublished\":\"2019-07-29T06:57:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Telstra questions whether metadata restrictions are working as intended\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Telstra questions whether metadata restrictions are working as intended 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/","og_locale":"en_US","og_type":"article","og_title":"Telstra questions whether metadata restrictions are working as intended 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-29T06:57:48+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Telstra questions whether metadata restrictions are working as intended","datePublished":"2019-07-29T06:57:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/"},"wordCount":609,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/","url":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/","name":"Telstra questions whether metadata restrictions are working as intended 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg","datePublished":"2019-07-29T06:57:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/telstra-questions-whether-metadata-restrictions-are-working-as-intended.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/telstra-questions-whether-metadata-restrictions-are-working-as-intended\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Telstra questions whether metadata restrictions are working as intended"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28091"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28092"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}