{"id":50893,"date":"2020-09-01T10:25:00","date_gmt":"2020-09-01T08:25:00","guid":{"rendered":"https:\/\/www.xitrust.com\/shadow-attacks\/"},"modified":"2024-07-25T14:56:53","modified_gmt":"2024-07-25T12:56:53","slug":"shadow-attacks","status":"publish","type":"post","link":"https:\/\/www.xitrust.com\/en\/shadow-attacks\/","title":{"rendered":"Shadow Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50893\" class=\"elementor elementor-50893 elementor-46464\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6865c93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6865c93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8612c94\" data-id=\"8612c94\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9e6f86 elementor-widget elementor-widget-text-editor\" data-id=\"d9e6f86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tShadow attacks: This futuristic-sounding term has recently been used to describe a possible attack on the signature verification of PDFs. The readers are primarily affected, but not the entire process. XiTrust explains what it is actually about &#8211; and why MOXIS users have nothing to worry about. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-0b2efe4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b2efe4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b3a29e9\" data-id=\"b3a29e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf6934d elementor-widget elementor-widget-text-editor\" data-id=\"cf6934d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile paper-based documents are naturally easy to manipulate, digital PDF signatures offer far more security: they ensure that digitally signed PDFs cannot be manipulated at a later date &#8211; at least not without the PDF software&#8217;s signature verification recognising and reporting the changes. In July, a team of researchers from Ruhr University Bochum uncovered three potential methods with which the signature verification of PDF documents can evidently be manipulated or circumvented. \r\n\r\nThe researchers communicated the vulnerabilities to the manufacturers via the BSI&#8217;s CERT organisation as part of a so-called responsible disclosure process. This is a common process in IT security and gives manufacturers time to secure their software with updates before vulnerabilities are published. Almost all manufacturers of PDF readers have already closed these security gaps. \r\n\r\nIt is therefore imperative that you use the latest version of your PDF viewer. Most providers can handle all of these exploits very well. \r\n\r\nMOXIS is not directly affected, as most attacks occur after signing. Moreover, every document in MOXIS can be downloaded retrospectively exactly as it was signed, meaning that any manipulation after the signature process can be proven and documented. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-634a4a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"634a4a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77bd4ae\" data-id=\"77bd4ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90a1d90 elementor-widget elementor-widget-template\" data-id=\"90a1d90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"54266\" class=\"elementor elementor-54266 elementor-54260 elementor-54260\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-36323225 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36323225\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-426d54d8\" data-id=\"426d54d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-1a394b0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1a394b0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-70f6f392\" data-id=\"70f6f392\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-459dd54c elementor-widget elementor-widget-image\" data-id=\"459dd54c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"411\" src=\"https:\/\/www.xitrust.com\/app\/uploads\/2023\/09\/moxis-kostenlos-testen-1.png\" class=\"attachment-full size-full wp-image-40680\" alt=\"Testen Sie die f\u00fchrende E-Signatur-Plattform MOXIS kostenlos.\" srcset=\"https:\/\/www.xitrust.com\/app\/uploads\/2023\/09\/moxis-kostenlos-testen-1.png 600w, https:\/\/www.xitrust.com\/app\/uploads\/2023\/09\/moxis-kostenlos-testen-1-300x206.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6dacde49\" data-id=\"6dacde49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4de91e3c elementor-widget elementor-widget-text-editor\" data-id=\"4de91e3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDiscover MOXIS for your company<span>.<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21e4c07f elementor-widget elementor-widget-text-editor\" data-id=\"21e4c07f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFind out more about the leading eSignature platform, enjoy the benefits of legally secure digital signatures, save time and costs.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ebd6149 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6ebd6149\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-405c8fc\" data-id=\"405c8fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1310b444 elementor-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"1310b444\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.xitrust.com\/en\/free-demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26e91888 elementor-mobile-align-center elementor-widget__width-auto elementor-widget-tablet__width-initial elementor-widget elementor-widget-button\" data-id=\"26e91888\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.xitrust.com\/en\/moxis\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-arrow-link\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"> About MOXIS<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>All about Shadow Attacks &#8211; and why MOXIS users don&#8217;t need to worry.<\/p>\n","protected":false},"author":22,"featured_media":46466,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_links_to":"","_links_to_target":""},"categories":[255,251],"tags":[],"class_list":["post-50893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Shadow Attacks<\/title>\n<meta name=\"description\" content=\"All about Shadow Attacks - and why MOXIS users don&#039;t need to worry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.xitrust.com\/shadow-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow Attacks\" \/>\n<meta property=\"og:description\" content=\"All about Shadow Attacks - and why MOXIS users don&#039;t need to worry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.xitrust.com\/shadow-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"XiTrust - The eSignature Company\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-01T08:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T12:56:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pia Birk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@XiTrust_MOXIS\" \/>\n<meta name=\"twitter:site\" content=\"@XiTrust_MOXIS\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pia Birk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/\"},\"author\":{\"name\":\"Pia Birk\",\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df\"},\"headline\":\"Shadow Attacks\",\"datePublished\":\"2020-09-01T08:25:00+00:00\",\"dateModified\":\"2024-07-25T12:56:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/\"},\"wordCount\":237,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.xitrust.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"articleSection\":[\"News\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.xitrust.com\/shadow-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/\",\"url\":\"https:\/\/www.xitrust.com\/shadow-attacks\/\",\"name\":\"Shadow Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.xitrust.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"datePublished\":\"2020-09-01T08:25:00+00:00\",\"dateModified\":\"2024-07-25T12:56:53+00:00\",\"description\":\"All about Shadow Attacks - and why MOXIS users don't need to worry.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.xitrust.com\/shadow-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage\",\"url\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"contentUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg\",\"width\":800,\"height\":533,\"caption\":\"Cyber Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.xitrust.com\/shadow-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"XiTrust\",\"item\":\"https:\/\/www.xitrust.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.xitrust.com\/#website\",\"url\":\"https:\/\/www.xitrust.com\/\",\"name\":\"XiTrust - The eSignature Company\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.xitrust.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.xitrust.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.xitrust.com\/#organization\",\"name\":\"XiTrust - The eSignature Company\",\"url\":\"https:\/\/www.xitrust.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png\",\"contentUrl\":\"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png\",\"width\":99,\"height\":78,\"caption\":\"XiTrust - The eSignature Company\"},\"image\":{\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH\",\"https:\/\/x.com\/XiTrust_MOXIS\",\"https:\/\/www.linkedin.com\/company\/xitrust-the-esignature-company\/\",\"https:\/\/www.youtube.com\/xitrust\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df\",\"name\":\"Pia Birk\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shadow Attacks","description":"All about Shadow Attacks - and why MOXIS users don't need to worry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.xitrust.com\/shadow-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Shadow Attacks","og_description":"All about Shadow Attacks - and why MOXIS users don't need to worry.","og_url":"https:\/\/www.xitrust.com\/shadow-attacks\/","og_site_name":"XiTrust - The eSignature Company","article_publisher":"https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH","article_published_time":"2020-09-01T08:25:00+00:00","article_modified_time":"2024-07-25T12:56:53+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","type":"image\/jpeg"}],"author":"Pia Birk","twitter_card":"summary_large_image","twitter_creator":"@XiTrust_MOXIS","twitter_site":"@XiTrust_MOXIS","twitter_misc":{"Written by":"Pia Birk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#article","isPartOf":{"@id":"https:\/\/www.xitrust.com\/shadow-attacks\/"},"author":{"name":"Pia Birk","@id":"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df"},"headline":"Shadow Attacks","datePublished":"2020-09-01T08:25:00+00:00","dateModified":"2024-07-25T12:56:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.xitrust.com\/shadow-attacks\/"},"wordCount":237,"commentCount":0,"publisher":{"@id":"https:\/\/www.xitrust.com\/#organization"},"image":{"@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","articleSection":["News","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.xitrust.com\/shadow-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.xitrust.com\/shadow-attacks\/","url":"https:\/\/www.xitrust.com\/shadow-attacks\/","name":"Shadow Attacks","isPartOf":{"@id":"https:\/\/www.xitrust.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","datePublished":"2020-09-01T08:25:00+00:00","dateModified":"2024-07-25T12:56:53+00:00","description":"All about Shadow Attacks - and why MOXIS users don't need to worry.","breadcrumb":{"@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.xitrust.com\/shadow-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#primaryimage","url":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","contentUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2024\/01\/shadow-attacks.jpg","width":800,"height":533,"caption":"Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.xitrust.com\/shadow-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"XiTrust","item":"https:\/\/www.xitrust.com\/"},{"@type":"ListItem","position":2,"name":"Shadow Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.xitrust.com\/#website","url":"https:\/\/www.xitrust.com\/","name":"XiTrust - The eSignature Company","description":"","publisher":{"@id":"https:\/\/www.xitrust.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.xitrust.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.xitrust.com\/#organization","name":"XiTrust - The eSignature Company","url":"https:\/\/www.xitrust.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png","contentUrl":"https:\/\/www.xitrust.com\/app\/uploads\/2021\/10\/logo-xitrust-sticky.png","width":99,"height":78,"caption":"XiTrust - The eSignature Company"},"image":{"@id":"https:\/\/www.xitrust.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XiTrustSecureTechnologiesGmbH","https:\/\/x.com\/XiTrust_MOXIS","https:\/\/www.linkedin.com\/company\/xitrust-the-esignature-company\/","https:\/\/www.youtube.com\/xitrust"]},{"@type":"Person","@id":"https:\/\/www.xitrust.com\/#\/schema\/person\/49812ef385580c3af8f7d6c16d7229df","name":"Pia Birk"}]}},"_links":{"self":[{"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/posts\/50893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/comments?post=50893"}],"version-history":[{"count":3,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/posts\/50893\/revisions"}],"predecessor-version":[{"id":59384,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/posts\/50893\/revisions\/59384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/media\/46466"}],"wp:attachment":[{"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/media?parent=50893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/categories?post=50893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xitrust.com\/en\/wp-json\/wp\/v2\/tags?post=50893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}