{"id":50892,"date":"2020-09-01T09:24:00","date_gmt":"2020-09-01T07:24:00","guid":{"rendered":"https:\/\/www.xitrust.com\/shadow-attacks\/"},"modified":"2024-07-25T14:56:18","modified_gmt":"2024-07-25T12:56:18","slug":"shadow-attacks","status":"publish","type":"post","link":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/","title":{"rendered":"Shadow Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50892\" class=\"elementor elementor-50892 elementor-46464\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6865c93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6865c93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8612c94\" data-id=\"8612c94\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9e6f86 elementor-widget elementor-widget-text-editor\" data-id=\"d9e6f86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tShadow Attacks: Dieser futuristisch anmutende Terminus steht seit Neuestem f\u00fcr einen m\u00f6glichen Angriff auf die Signaturpr\u00fcfung von PDFs. Betroffen sind in erster Linie die Reader, nicht aber das gesamte Verfahren. XiTrust erkl\u00e4rt, worum es eigentlich geht \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-0b2efe4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b2efe4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b3a29e9\" data-id=\"b3a29e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf6934d elementor-widget elementor-widget-text-editor\" data-id=\"cf6934d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tW\u00e4hrend papiergebundene Dokumente naturgem\u00e4\u00df leicht zu manipulieren sind, bieten digitale PDF-Signaturen weit mehr Sicherheit: Sie gew\u00e4hrleisten, dass digital unterschriebene PDFs nachtr\u00e4glich nicht manipulierbar sind \u2013 jedenfalls nicht ohne dass die Signaturpr\u00fcfung der PDF-Software die \u00c4nderungen bemerkt und meldet. Im Juli hat ein Forscherteam der Ruhr-Universit\u00e4t Bochum drei potenzielle Methoden aufgedeckt, mit denen die Signaturpr\u00fcfung von PDF-Dokumenten anscheinend doch zu manipulieren oder zu umgehen ist.\n<br\/><br\/>\nDie Forscher kommunizierten die Schwachstellen \u00fcber das CERT-Bund des BSI im Rahmen eines Responsible-Disclosure-Prozesses an die Hersteller. Das ist ein g\u00e4ngiger Prozess in der IT-Sicherheit und gibt Herstellern Zeit vor der Ver\u00f6ffentlichung von Schwachstellen ihre Software mit Updates abzusichern. Fast alle Hersteller von PDF-Readern haben die Sicherheitsl\u00fccken auch schon geschlossen.\n<br\/><br\/>\nEs ist deshalb oberstes Gebot, die neueste Version Ihres PDF-Viewers zu verwenden. Diese k\u00f6nnen bei den meisten Anbietern mit allen beschriebenen Exploits sehr gut umgehen.\n<br\/><br\/>\nMOXIS ist nicht direkt betroffen, da die meisten Angriffe nach der Unterzeichnung durchgef\u00fchrt werden. Au\u00dferdem kann in MOXIS jedes Dokument in dem Zustand, in dem es unterzeichnet wurde, auch nachtr\u00e4glich heruntergeladen werden und damit ist jede Manipulation nach dem Signaturprozess beweis- und dokumentierbar.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-634a4a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"634a4a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77bd4ae\" data-id=\"77bd4ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90a1d90 elementor-widget elementor-widget-template\" data-id=\"90a1d90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"54265\" class=\"elementor elementor-54265 elementor-54260 elementor-54260\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-36323225 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36323225\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-426d54d8\" data-id=\"426d54d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-1a394b0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1a394b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-70f6f392\" data-id=\"70f6f392\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-459dd54c elementor-widget elementor-widget-image\" data-id=\"459dd54c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"411\" src=\"https:\/\/www.xitrust.com\/app\/uploads\/2023\/09\/moxis-kostenlos-testen-1.png\" class=\"attachment-full size-full wp-image-40681\" alt=\"Testen Sie die f\u00fchrende E-Signatur-Plattform MOXIS kostenlos.\" srcset=\"https:\/\/www.xitrust.com\/app\/uploads\/2023\/09\/moxis-kostenlos-testen-1.png 600w, https:\/\/www.xitrust.com\/app\/uploads\/2023\/09\/moxis-kostenlos-testen-1-300x206.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6dacde49\" data-id=\"6dacde49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4de91e3c elementor-widget elementor-widget-text-editor\" data-id=\"4de91e3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEntdecken Sie MOXIS f\u00fcr Ihr Unternehmen<span>.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21e4c07f elementor-widget elementor-widget-text-editor\" data-id=\"21e4c07f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLernen Sie die f\u00fchrende E-Signatur-Plattform kennen \u2013 nutzen Sie die Vorteile der rechtssicheren digitalen Unterschrift, sparen Sie Zeit und Kosten ein.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ebd6149 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6ebd6149\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-405c8fc\" data-id=\"405c8fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1310b444 elementor-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"1310b444\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.xitrust.com\/ch\/demo-buchen\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Demo buchen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26e91888 elementor-mobile-align-center elementor-widget__width-auto elementor-widget-tablet__width-initial elementor-widget elementor-widget-button\" data-id=\"26e91888\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.xitrust.com\/ch\/moxis\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-arrow-link\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr \u00fcber MOXIS<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.<\/p>\n","protected":false},"author":22,"featured_media":46467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_links_to":"","_links_to_target":""},"categories":[256,254],"tags":[],"class_list":["post-50892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-ch","category-sicherheit-ch"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Shadow Attacks<\/title>\n<meta name=\"description\" content=\"Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow Attacks\" \/>\n<meta property=\"og:description\" content=\"Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"XiTrust - The eSignature Company\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-01T07:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T12:56:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pia Birk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@XiTrust_MOXIS\" \/>\n<meta name=\"twitter:site\" content=\"@XiTrust_MOXIS\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pia Birk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\"},\"author\":{\"name\":\"Pia Birk\",\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df\"},\"headline\":\"Shadow Attacks\",\"datePublished\":\"2020-09-01T07:24:00+00:00\",\"dateModified\":\"2024-07-25T12:56:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\"},\"wordCount\":245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.xitrust.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"articleSection\":[\"News\",\"Sicherheit\"],\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\",\"url\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\",\"name\":\"Shadow Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.xitrust.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"datePublished\":\"2020-09-01T07:24:00+00:00\",\"dateModified\":\"2024-07-25T12:56:18+00:00\",\"description\":\"Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#breadcrumb\"},\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage\",\"url\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"contentUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"width\":800,\"height\":533,\"caption\":\"Cyber Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"XiTrust\",\"item\":\"https:\/\/www.xitrust.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.xitrust.com\/#website\",\"url\":\"https:\/\/www.xitrust.com\/\",\"name\":\"XiTrust - The eSignature Company\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.xitrust.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.xitrust.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-CH\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.xitrust.com\/#organization\",\"name\":\"XiTrust - The eSignature Company\",\"url\":\"https:\/\/www.xitrust.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png\",\"contentUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png\",\"width\":99,\"height\":78,\"caption\":\"XiTrust - The eSignature Company\"},\"image\":{\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH\",\"https:\/\/x.com\/XiTrust_MOXIS\",\"https:\/\/www.linkedin.com\/company\/xitrust-the-esignature-company\/\",\"https:\/\/www.youtube.com\/xitrust\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df\",\"name\":\"Pia Birk\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shadow Attacks","description":"Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/","og_locale":"de_DE","og_type":"article","og_title":"Shadow Attacks","og_description":"Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.","og_url":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/","og_site_name":"XiTrust - The eSignature Company","article_publisher":"https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH","article_published_time":"2020-09-01T07:24:00+00:00","article_modified_time":"2024-07-25T12:56:18+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","type":"image\/jpeg"}],"author":"Pia Birk","twitter_card":"summary_large_image","twitter_creator":"@XiTrust_MOXIS","twitter_site":"@XiTrust_MOXIS","twitter_misc":{"Written by":"Pia Birk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#article","isPartOf":{"@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/"},"author":{"name":"Pia Birk","@id":"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df"},"headline":"Shadow Attacks","datePublished":"2020-09-01T07:24:00+00:00","dateModified":"2024-07-25T12:56:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/"},"wordCount":245,"commentCount":0,"publisher":{"@id":"https:\/\/www.xitrust.com\/#organization"},"image":{"@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","articleSection":["News","Sicherheit"],"inLanguage":"de-CH","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/","url":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/","name":"Shadow Attacks","isPartOf":{"@id":"https:\/\/www.xitrust.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","datePublished":"2020-09-01T07:24:00+00:00","dateModified":"2024-07-25T12:56:18+00:00","description":"Alles \u00fcber Shadow Attacks \u2013 und warum sich MOXIS-Anwender keine Sorgen zu machen brauchen.","breadcrumb":{"@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#breadcrumb"},"inLanguage":"de-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.xitrust.com\/ch\/shadow-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#primaryimage","url":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","contentUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","width":800,"height":533,"caption":"Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.xitrust.com\/ch\/shadow-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"XiTrust","item":"https:\/\/www.xitrust.com\/"},{"@type":"ListItem","position":2,"name":"Shadow Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.xitrust.com\/#website","url":"https:\/\/www.xitrust.com\/","name":"XiTrust - The eSignature Company","description":"","publisher":{"@id":"https:\/\/www.xitrust.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.xitrust.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-CH"},{"@type":"Organization","@id":"https:\/\/www.xitrust.com\/#organization","name":"XiTrust - The eSignature Company","url":"https:\/\/www.xitrust.com\/","logo":{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png","contentUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png","width":99,"height":78,"caption":"XiTrust - The eSignature Company"},"image":{"@id":"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH","https:\/\/x.com\/XiTrust_MOXIS","https:\/\/www.linkedin.com\/company\/xitrust-the-esignature-company\/","https:\/\/www.youtube.com\/xitrust"]},{"@type":"Person","@id":"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df","name":"Pia Birk"}]}},"_links":{"self":[{"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/posts\/50892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/comments?post=50892"}],"version-history":[{"count":3,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/posts\/50892\/revisions"}],"predecessor-version":[{"id":59382,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/posts\/50892\/revisions\/59382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/media\/46467"}],"wp:attachment":[{"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/media?parent=50892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/categories?post=50892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xitrust.com\/ch\/wp-json\/wp\/v2\/tags?post=50892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}