{"id":6045,"date":"2018-07-12T07:37:40","date_gmt":"2018-07-12T07:37:40","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/"},"modified":"2018-07-12T07:37:40","modified_gmt":"2018-07-12T07:37:40","slug":"tim-larry-we-need-to-talk-about-smartphones-and-privacy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/","title":{"rendered":"Tim? Larry? We need to talk about smartphones and privacy"},"content":{"rendered":"<p>Oracle\u2019s busy backgrounding about Android privacy last year appears to have helped draw US lawmakers&#8217; attention to Google and Apple.<\/p>\n<p>Members of the US House Energy and Commerce Committee have jumped on a report by Quartz\u2019s Keith Collins <a target=\"_blank\" href=\"https:\/\/qz.com\/1131515\/google-collects-android-users-locations-even-when-location-services-are-disabled\/\">from November 2017<\/a> as the basis of letters to Apple CEO Tim Cook and Alphabet CEO Larry Page, demanding various details of how their respective operating systems treat users&#8217; privacy. The letters mention Collins&#8217; article (Here\u2019s the <a target=\"_blank\" href=\"https:\/\/energycommerce.house.gov\/wp-content\/uploads\/2018\/07\/070918-Android-Letter.pdf\">letter to Page (PDF)<\/a>, and the <a target=\"_blank\" href=\"https:\/\/energycommerce.house.gov\/wp-content\/uploads\/2018\/07\/070918-Apple-Letter.pdf\">letter to Apple<\/a> (also a PDFs).<\/p>\n<p>After Collins&#8217; story was published, former federal trade commission chief technologist and one-time White House staffer Ashkan Soltani claimed that Quartz&#8217;s report was based on information Oracle had shopped around for several months. <em>Reg<\/em> hack Thomas Claburn therefore <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/11\/22\/google_oracle_location_privacy\/\">asked<\/a> Soltani, Oracle, Google, and Quartz reporter Keith Collins about the claim. None responded.<\/p>\n<p>But the theory that Oracle had something to do with the location-leaking allegations was given credence when Big Red made a <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/05\/14\/oracle_tells_tales_about_google_data_slurps_to_australian_regulator\/\">similar complaint<\/a> to Australia\u2019s competition regulator.<\/p>\n<p>The letter to Page wants answers on:<\/p>\n<ul>\n<li>When an Android phone&#8217;s location services are disabled, is location information available to the phone through Wi-Fi and Bluetooth stored for upload to Google;<\/li>\n<li>Whether \u2018droids collect audio data, incidentally, while they try to find \u201ctrigger phrases\u201d like \u201cOK Google\u201d in speech;<\/li>\n<li>Why Google allowed third-party Gmail developers to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/07\/03\/gmail_api_access\/\">trawl<\/a> user e-mails for marketing insights.<\/li>\n<\/ul>\n<p>Similar answers seem to be sought in the letter to Apple&#8217;s Tim Cook. Regarding iPhone location collection, the House members ask the same question about location collection when that service is disabled, and the \u201ctrigger\u201d question is edited to refer to Siri rather than Google. Tim Cook will have an easier time dealing at least with questions arising from the Quartz story, since it was specifically about Google even though the letter contains a reference to a mythical accompanying story on Quartz, as the non-existent URL below shows.<\/p>\n<div class=\"CaptionedImage Border width_85\" readability=\"9\"><a href=\"https:\/\/regmedia.co.uk\/2018\/07\/12\/house_letter_to_apple_howler.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/07\/12\/house_letter_to_apple_howler.jpg?x=648&amp;y=263&amp;infer_y=1\" alt=\"Strange URL\" title=\"Strange URL\" height=\"263\" width=\"648\"\/><\/a><\/p>\n<p class=\"text_center\">Who edited Quartz&#8217;s Android story headline and URL to point to a non-existent Apple story, and why? Click to embiggen<\/p>\n<\/div>\n<p>The giants are also asked to detail both the access granted to, and the restrictions placed on, third party vendors publishing software in their app stores.<\/p>\n<p>Also Apple-specific is a demand for information about an arrangement with RapidSOS, which Apple contracted to improve positioning accuracy in cases where an iPhone is calling emergency services (starting in the USA, for 911 calls).<\/p>\n<p>So, if you\u2019ve ever wanted to know how much the \u201cyour phone is spying on you\u201d is real, how much is almost real, and how much is conspiracist moonshine, Apple and Alphabet&#8217;s answers these letters might get you a little closer to the truth.<\/p>\n<p>We might even know who thought there was a story about Apple leaking Android locations, and why they thought they would alter a URL to make it look that way. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/07\/12\/us_lawmakers_demand_privacy_answers_from_apple_and_alphabet\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Congress sends Apple and Alphabet a &#8216;please explain&#8217;, perhaps because Oracle asked Oracle\u2019s busy backgrounding about Android privacy last year appears to have helped draw US lawmakers&#8217; attention to Google and Apple.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":6046,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-6045","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tim? Larry? We need to talk about smartphones and privacy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tim? Larry? We need to talk about smartphones and privacy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-12T07:37:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tim? Larry? We need to talk about smartphones and privacy\",\"datePublished\":\"2018-07-12T07:37:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/\"},\"wordCount\":502,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/\",\"name\":\"Tim? Larry? We need to talk about smartphones and privacy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg\",\"datePublished\":\"2018-07-12T07:37:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg\",\"width\":648,\"height\":263},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tim? Larry? We need to talk about smartphones and privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tim? Larry? We need to talk about smartphones and privacy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Tim? Larry? We need to talk about smartphones and privacy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-12T07:37:40+00:00","og_image":[{"width":648,"height":263,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tim? Larry? We need to talk about smartphones and privacy","datePublished":"2018-07-12T07:37:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/"},"wordCount":502,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/","url":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/","name":"Tim? Larry? We need to talk about smartphones and privacy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg","datePublished":"2018-07-12T07:37:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/tim-larry-we-need-to-talk-about-smartphones-and-privacy.jpg","width":648,"height":263},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tim-larry-we-need-to-talk-about-smartphones-and-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Tim? Larry? We need to talk about smartphones and privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=6045"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6045\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/6046"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=6045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=6045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=6045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}