{"id":46020,"date":"2022-04-01T11:28:00","date_gmt":"2022-04-01T11:28:00","guid":{"rendered":"http:\/\/ed5e4da6-f8a4-4894-b9a0-2174b3aebc90"},"modified":"2022-04-01T11:28:00","modified_gmt":"2022-04-01T11:28:00","slug":"sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/","title":{"rendered":"SunVia bets that controlling your own identity will make the metaverse successful"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp\" class alt=\"woman's face appears within a network of computer circuitry\" height=\"auto\" width=\"1200\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Getty Images <\/span><\/figcaption><\/figure>\n<p>Startup&nbsp;<a href=\"https:\/\/sunvia.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">SunVia<\/a>&nbsp;believes that managing your own identity will be critical to the future metaverse.&nbsp;<\/p>\n<p>Identification will be the most important component in making the digital future work, and personal IDs will help individuals gain control of their data &#8212; taking it away from the big platforms.&nbsp;<\/p>\n<p>&#8220;Over the past 10 to 15 years, people&#8217;s digital identity has grown in importance; everyone now has a much larger digital life,&#8221; says Jay Williams, President and CTO of SunVia. &#8220;People want to be able to control their personal data and manage who has access to that data.&#8221;<\/p>\n<p>The current political sentiment is focusing on curbing corporate access to personal data through new privacy laws, such as those in California. Advertisers are finding it increasingly difficult to target individuals with relevant messages, but SunVia is betting there&#8217;s a solution to satisfy the stakeholders in this sensitive subject of data privacy.<\/p>\n<p>What is needed, Williams says, is a more ethical relationship between consumers and advertisers, specifically regarding how personal data can be used. SunVia is working on tools that will help create that ethical relationship by enabling people to manage their personal data and grant or deny access to it.<\/p>\n<p>Currently, there is no easy way for individuals to check the accuracy of personal data &#8212; or to control who profits from that data. Yet there&#8217;s a $100 billion advertising industry that relies on that data. It creates billions of dollars in profits for the vendors of personal data, and there&#8217;s a clear imbalance here with value being lost to third-parties.&nbsp;<\/p>\n<p>Williams believes that there needs to be new legislation to guarantee individual rights, and that legal code needs to be reflected in software code.&nbsp;<\/p>\n<p>The California Data Privacy laws show a strong shift to increasing an individual&#8217;s control over their data, and other states are introducing similar legislation. California residents, for example, can demand a company to reveal how it&#8217;s using their personal data and if that data has been sold.&nbsp;<\/p>\n<p>California&#8217;s tough approach, along with large punitive fines, is likely to limit the collection of personal data. Many organizations will conclude that the cost of generating data reports for individuals will eclipse any benefits from collecting that data.<\/p>\n<p>Less personal data creates a problem with targeting advertising. With SunVia, however, this problem is solved because consumers will own their data and manage the commercial messages they see.&nbsp;<\/p>\n<p>&#8220;Brands still want to have a direct and meaningful relationship with consumers, and this will be enabled through our platform. It will be based on ethical licenses,&#8221; explains Williams.<\/p>\n<p>For Williams and his colleague John Humphrey, Chief Revenue Officer at SunVia, almost everything about the digital future requires the need for verifiable IDs.<\/p>\n<p>&#8220;In 2020, during the lockdowns, the world crossed the Rubicon with 52% of the population with at least one online account; we&#8217;ve come even further now,&#8221; says Humphrey. &#8220;With individuals typically having multiple online accounts &#8212; and the introduction of new digital markets, such as trading NFTs &#8212; the need for verifiable IDs is critical to market growth.&#8221;<\/p>\n<p>SunVia has begun to roll out some of its technology and is looking for participants for&nbsp;<a href=\"https:\/\/sunvia.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Protagonist<\/a>, an alpha version of what will become The Metaverse Operations Manager.<\/p>\n<p>SunVia recently published an article that reads like a manifesto and a call to action. Here is an excerpt:&nbsp;<\/p>\n<p>&#8220;\u2026 the Platforms own our identity. We gave it to them in exchange for some trinkets. They now own the most important and scarce resource on the planet. Ourselves.<\/p>\n<p>&#8220;People are not here to be used. We are not Consumers to be classified, sliced, diced, and resold to brands to fuel more consumption. We are Producers. We are Creators. We are the Brands. We are now the drivers of the economy.&#8221;&nbsp;<\/p>\n<p>It later adds, &#8220;We need a Decentralized Autonomous Association (DAA) to allow us to own ourselves and our information. This is the next economy. The Relationship Economy. Come join us.&#8221;<\/p>\n<p>You can read SunVia&#8217;s&nbsp;<a href=\"https:\/\/articles.sunvia.com\/origin-of-the-relationship-economy-1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">&#8220;Origin of the Relationship Economy&#8221; here<\/a>.<\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">Social Networking<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/sunvia-is-betting-that-individual-control-of-identity-will-be-critical-to-making-the-metaverse-successful\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a battle raging over data privacy. SunVia&#8217;s solution gives control to the individual and creates a more ethical relationship between consumers and corporations.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-46020","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SunVia bets that controlling your own identity will make the metaverse successful 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SunVia bets that controlling your own identity will make the metaverse successful 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-01T11:28:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SunVia bets that controlling your own identity will make the metaverse successful\",\"datePublished\":\"2022-04-01T11:28:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/514844c91ed18142513a390b6a954b08fe2ecfdf\\\/2022\\\/04\\\/01\\\/419b4e20-761c-4e05-a94c-e86f238ac8e7\\\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/\",\"name\":\"SunVia bets that controlling your own identity will make the metaverse successful 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/514844c91ed18142513a390b6a954b08fe2ecfdf\\\/2022\\\/04\\\/01\\\/419b4e20-761c-4e05-a94c-e86f238ac8e7\\\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp\",\"datePublished\":\"2022-04-01T11:28:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/514844c91ed18142513a390b6a954b08fe2ecfdf\\\/2022\\\/04\\\/01\\\/419b4e20-761c-4e05-a94c-e86f238ac8e7\\\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/514844c91ed18142513a390b6a954b08fe2ecfdf\\\/2022\\\/04\\\/01\\\/419b4e20-761c-4e05-a94c-e86f238ac8e7\\\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SunVia bets that controlling your own identity will make the metaverse successful\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SunVia bets that controlling your own identity will make the metaverse successful 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/","og_locale":"en_US","og_type":"article","og_title":"SunVia bets that controlling your own identity will make the metaverse successful 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-01T11:28:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SunVia bets that controlling your own identity will make the metaverse successful","datePublished":"2022-04-01T11:28:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/"},"wordCount":698,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/","url":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/","name":"SunVia bets that controlling your own identity will make the metaverse successful 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp","datePublished":"2022-04-01T11:28:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/514844c91ed18142513a390b6a954b08fe2ecfdf\/2022\/04\/01\/419b4e20-761c-4e05-a94c-e86f238ac8e7\/gettyimages-923872378-womans-face-appears-within-a-network-of-computer-circuitry2.jpg?width=1200&amp;fit=bounds&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sunvia-bets-that-controlling-your-own-identity-will-make-the-metaverse-successful\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"SunVia bets that controlling your own identity will make the metaverse successful"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46020"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46020\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}