{"id":3860,"date":"2025-06-11T14:12:13","date_gmt":"2025-06-11T14:12:13","guid":{"rendered":"https:\/\/www.intnews.it\/?p=3860"},"modified":"2025-07-15T15:27:04","modified_gmt":"2025-07-15T15:27:04","slug":"cyber-review-lhacking-al-cinema-in-cinque-pellicole","status":"publish","type":"post","link":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/","title":{"rendered":"Cyber Review: Hacking at the cinema in five films"},"content":{"rendered":"\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Books and cinema have always had the gift of anticipating the times.<br>And when it comes to hacking, artificial intelligence and cybercrime, some films even seem to predict the dynamics that today cybersecurity faces every day.<br>In today\u2019s <strong>cyber-review<\/strong> we will build, compared to the usual,a path of iconic films by reviewing them through the lens of current digital threats.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Johnny Mnemonic (1995)&nbsp;<\/h3>\n\n\n\n<p>Set in 2021, a year now definitely past.<br>The scenario is cyberpunk: a world dominated by mega-corporations, virtual reality and clandestine information trafficking. Johnny (Keanu Reeves), &#8220;human data carrier,&#8221; agrees to carry a file implanted directly into his brain with decidedly unexpected consequences.<br>Inspired by the universe of<strong> William Gibson<\/strong>, whose books we recommend reading, the film anticipates concepts currently discussed in the real world such as bio-hacking, advanced cryptography and illicit trafficking of sensitive data.<\/p>\n\n\n\n<p><strong>The Cyber Parallel with the real world:<\/strong><br>Today, even without neural chips in the skull, sensitive data travels on vulnerable devices, poorly configured clouds and compromised supply chains. The idea of breached human memories is reflected in the risks of leaks, industrial espionage and the new frontiers of neurosecurity.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Matrix (1999)&nbsp;<\/h3>\n\n\n\n<p>Neo is a hacker who lives two lives: programmer by day, network outlaw by night.<br>Behind the curtain of his dual life, he discovers that reality itself is a simulation created by an artificial intelligence.<br>Matrix is not just a visual masterpiece, it\u2019s an invitation to look under the digital surface.<br>The allegory of code, free will and computer manipulation are powerful in this first chapter, with references and scenes that have remained in the collective imagination for years.<\/p>\n\n\n\n<p><strong>The Cyber Parallel with the real world:<\/strong><br>Today we live with virtualized environments, containers, test systems, deepfaking and social increasingly addictive. The risk of unintentional exposure of critical business systems, poorly segmented environments and data leaks is highest.&nbsp;<br>Security in complex systems requires identity control, robust encryption and real sandboxing.<br>Without forgetting ideologically how fragile is becoming the margin between the real world and the world of social, with a need to appear that begins to have psychological implications even catastrophic.<\/p>\n\n\n\n<p>It is also the milestone of technological transition at the level of film, just before the advent of smartphones, cross and delight of our time.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Millennium &#8211; Uomini che odiano le donne (2011)<\/h3>\n\n\n\n<p>Let\u2019s move on to an investigative thriller from Stieg Larsson\u2019s novel, where the real protagonist is <strong>Lisbeth Salander<\/strong>, a solitary, alternative and brilliant hacker who penetrates digital networks and identities with realistic and tangible methods.<br>We are far away, especially in the first version of the adaptation , from the world of special effects: they are actively used keylogging, social engineering, silent intrusions into systems, and an investigative style in which cyber merges with staff.<\/p>\n\n\n\n<p><strong>The Cyber Parallel with the real world:<\/strong><\/p>\n\n\n\n<p>The film portrays everyday hacking: identity theft, account theft, exploits and reconnaissance techniques in the dark web.<br>Attack modes that, even today, constitute 90% of real compromises. Lisbeth is an ethical hacker (though borderline) ante litteram.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Billion Dollar Heist (2023)<\/h3>\n\n\n\n<p>In this docu-thriller, reality surpasses fantasy with the story of a real world heist: the attempted theft of one billion dollars by an APT group at the expense of the central bank of Bangladesh.<br>No excess of imagination: only well-coordinated attacks, phishing, banking vulnerabilities and lack of procedures.<br>Interviews and experts highlight how fragile financial systems can still be today in the face of motivated and organized threat actors.<\/p>\n\n\n\n<p><strong>The Cyber Parallel with the real world:<\/strong><br>A clear lesson: infected emails, misconfigurations, delays in adapting procedures and mapping systems are enough to create a catastrophe. The film is a textbook on cyber risk governance disguised as a thriller.<\/p>\n\n\n\n<p>We close the circle with the last chapter of a saga already mentioned, beyond its critical and public success, taking into account its cyber profile.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Matrix Resurrections (2021)&nbsp;<\/h3>\n\n\n\n<p>In the sequel\/reboot, Neo is a game designer trapped in a new simulation.<br>A rebellious artificial intelligence, accesses its development environment to free it.<br>The film introduces a modern reflection: the boundaries between social, test environments, production and virtual reality are increasingly blurred.<\/p>\n\n\n\n<p><strong>The Cyber Parallel with the real world:<\/strong><\/p>\n\n\n\n<p>The film subtly criticises the growing confusion between test environments and real-world environments, as is often the case in modern DevOps.<br>It is the perfect metaphor for accidents caused by misconfigurations, unattended administrative accesses and permits or voluntary backdoors, with a potentially veiled critical tip to some governments&#8217; demands for control over systems.<\/p>\n\n\n\n<p>From the cyberpunk dystopia of Johnny Mnemonic, to the technical clarity of Billion Dollar Heist, cinema tells us what is reality today:<br>Cybersecurity is an integral part of our lives.<br>Even if in films the solutions are faster and more spectacular, the vulnerabilities, the methods of attack and the human limits remain current.<br>A critical look at the end, always need.<\/p>\n\n\n\n<p class=\"has-text-align-right has-small-font-size\"><em>Article in collaboration with Lorenzo Raimondo, Managing Director of <a href=\"https:\/\/www.observere.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Observere\u00a0<\/a><\/em><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even seem to predict the dynamics that&#8230;<\/p>\n","protected":false},"author":6,"featured_media":3867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[132,79],"tags":[],"class_list":{"0":"post-3860","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybereview-en","8":"category-sections"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Review: Hacking at the cinema in five films - INT News<\/title>\n<meta name=\"description\" content=\"Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Review: Hacking at the cinema in five films - INT News\" \/>\n<meta property=\"og:description\" content=\"Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/\" \/>\n<meta property=\"og:site_name\" content=\"INT News\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-11T14:12:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T15:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intnews.it\/wp-content\/uploads\/2025\/06\/HACKING-AL-CINEMA-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Redazione\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redazione\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/\"},\"author\":{\"name\":\"Redazione\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/person\\\/348bf8ca8793a1fff502097a042cb621\"},\"headline\":\"Cyber Review: Hacking at the cinema in five films\",\"datePublished\":\"2025-06-11T14:12:13+00:00\",\"dateModified\":\"2025-07-15T15:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/\"},\"wordCount\":826,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/HACKING-AL-CINEMA.png\",\"articleSection\":[\"Cybereview\",\"Sections\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/\",\"name\":\"Cyber Review: Hacking at the cinema in five films - INT News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/HACKING-AL-CINEMA.png\",\"datePublished\":\"2025-06-11T14:12:13+00:00\",\"dateModified\":\"2025-07-15T15:27:04+00:00\",\"description\":\"Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#primaryimage\",\"url\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/HACKING-AL-CINEMA.png\",\"contentUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/HACKING-AL-CINEMA.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/intnews.it\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Review: Hacking at the cinema in five films\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/\",\"name\":\"INT News\",\"description\":\"innovation tomorrow\",\"publisher\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\"},\"alternateName\":\"Innovation Tomorrow\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/intnews.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\",\"name\":\"INT News\",\"alternateName\":\"Innovation Tomorrow\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/int-logo2.webp\",\"contentUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/int-logo2.webp\",\"width\":538,\"height\":232,\"caption\":\"INT News\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/person\\\/348bf8ca8793a1fff502097a042cb621\",\"name\":\"Redazione\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"caption\":\"Redazione\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Review: Hacking at the cinema in five films - INT News","description":"Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Review: Hacking at the cinema in five films - INT News","og_description":"Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even","og_url":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/","og_site_name":"INT News","article_published_time":"2025-06-11T14:12:13+00:00","article_modified_time":"2025-07-15T15:27:04+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/06\/HACKING-AL-CINEMA-1024x576.png","type":"image\/png"}],"author":"Redazione","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Redazione","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#article","isPartOf":{"@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/"},"author":{"name":"Redazione","@id":"https:\/\/intnews.it\/en\/#\/schema\/person\/348bf8ca8793a1fff502097a042cb621"},"headline":"Cyber Review: Hacking at the cinema in five films","datePublished":"2025-06-11T14:12:13+00:00","dateModified":"2025-07-15T15:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/"},"wordCount":826,"commentCount":0,"publisher":{"@id":"https:\/\/intnews.it\/en\/#organization"},"image":{"@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#primaryimage"},"thumbnailUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/06\/HACKING-AL-CINEMA.png","articleSection":["Cybereview","Sections"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/","url":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/","name":"Cyber Review: Hacking at the cinema in five films - INT News","isPartOf":{"@id":"https:\/\/intnews.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#primaryimage"},"image":{"@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#primaryimage"},"thumbnailUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/06\/HACKING-AL-CINEMA.png","datePublished":"2025-06-11T14:12:13+00:00","dateModified":"2025-07-15T15:27:04+00:00","description":"Books and cinema have always had the gift of anticipating the times.And when it comes to hacking, artificial intelligence and cybercrime, some films even","breadcrumb":{"@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#primaryimage","url":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/06\/HACKING-AL-CINEMA.png","contentUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/06\/HACKING-AL-CINEMA.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/intnews.it\/en\/cyber-review-lhacking-al-cinema-in-cinque-pellicole\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intnews.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Review: Hacking at the cinema in five films"}]},{"@type":"WebSite","@id":"https:\/\/intnews.it\/en\/#website","url":"https:\/\/intnews.it\/en\/","name":"INT News","description":"innovation tomorrow","publisher":{"@id":"https:\/\/intnews.it\/en\/#organization"},"alternateName":"Innovation Tomorrow","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intnews.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intnews.it\/en\/#organization","name":"INT News","alternateName":"Innovation Tomorrow","url":"https:\/\/intnews.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intnews.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/10\/int-logo2.webp","contentUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/10\/int-logo2.webp","width":538,"height":232,"caption":"INT News"},"image":{"@id":"https:\/\/intnews.it\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/intnews.it\/en\/#\/schema\/person\/348bf8ca8793a1fff502097a042cb621","name":"Redazione","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","caption":"Redazione"}}]}},"_links":{"self":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/3860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/comments?post=3860"}],"version-history":[{"count":5,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/3860\/revisions"}],"predecessor-version":[{"id":4317,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/3860\/revisions\/4317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/media\/3867"}],"wp:attachment":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/media?parent=3860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/categories?post=3860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/tags?post=3860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}