{"id":3430,"date":"2023-04-06T20:07:36","date_gmt":"2023-04-07T01:07:36","guid":{"rendered":"https:\/\/ic4ml.org\/?p=3430"},"modified":"2023-04-06T20:07:42","modified_gmt":"2023-04-07T01:07:42","slug":"is-hacking-inevitable","status":"publish","type":"post","link":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/","title":{"rendered":"Is Hacking Inevitable?"},"content":{"rendered":"\n<p>Media has advanced so much throughout the years, and it continues to advance. It is without a doubt that media makes people&#8217;s lives easier and more entertaining. The benefits that the media has managed to provide for us are amazing. It helps inform us, entertain us, provide jobs for people. While media has given us all of these fantastic positives in our life, a lot of the technology is still relatively new to us. Hacking exploits these positives and exposes new pitfalls.<\/p>\n\n\n\n<p>When we create something new, we do not know if it will cause problems or not. Concerns about media and technology keep popping up throughout the years of our advancements in the field. New issues show up and make people panic . It is tough for us to know who or what to trust when it comes to these types of problems.<\/p>\n\n\n\n<p>Some issues include unwanted hacking and technology failures. These issues with media are not predictable and oftentimes they feel inevitable. Or so we think.<\/p>\n\n\n\n<p>I believe one of the biggest issues when it comes to technology is the surveillance the cameras on our electronic devices enable. Yes, this may sound ridiculous, but these rumors have been going on for a very long time now.<\/p>\n\n\n\n<p>I had first heard about this surveillance a couple years back when I saw that my friend had a piece of tape covering the front camera on his computer.I ended up asking him why he would ever do such a thing.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?resize=750%2C600&#038;ssl=1\" alt=\"I believe one of the biggest issues when it comes to hacking is the surveillance the cameras on our electronic devices enable\" class=\"wp-image-3431\" width=\"750\" height=\"600\" srcset=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?w=1000&amp;ssl=1 1000w, https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?resize=300%2C240&amp;ssl=1 300w, https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?resize=768%2C614&amp;ssl=1 768w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption class=\"wp-element-caption\">&#8220;I believe one of the biggest issues when it comes to technology is the surveillance the cameras on our electronic devices enable.&#8221;<\/figcaption><\/figure>\n<\/div>\n\n\n<p>While hacking into someone\u2019s camera is understandably a scary form of hacking, it is by no means the most common one.<\/p>\n\n\n\n<p>Hacking has been a problem ever\u00a0 since the internet and technology became popular way back when.<\/p>\n\n\n\n<p>I remember when someone hacked my high school\u2019s website and wrote racial slurs on its homepage. It took the school a day or two to fix and they never ended up finding who did it.&nbsp;<\/p>\n\n\n\n<p>Many different types of devices are vulnerable to hacking, and many different motivations exist for hacking. It could be because someone is trying to steal hidden files, gain access to an account, or just simply harass someone.<\/p>\n\n\n\n<p>The hacking of social media accounts has become more common in recent years. I know a lot of friends that have lost access to their Instagram account. They never got it back because the hackers changed their password. The amount of security one can utilize can only go so far to protect them from a breaching.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Iris.png?resize=750%2C600&#038;ssl=1\" alt=\"Hacking can feel inevitable.\" class=\"wp-image-3432\" width=\"750\" height=\"600\" srcset=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Iris.png?w=1000&amp;ssl=1 1000w, https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Iris.png?resize=300%2C240&amp;ssl=1 300w, https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Iris.png?resize=768%2C614&amp;ssl=1 768w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption class=\"wp-element-caption\">&#8220;Hacking can feel inevitable.&#8221;<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Last year hackers discovered a method to hack into Twitter accounts by, \u201c<a href=\"https:\/\/gizmodo.com\/twitter-hackers-social-media-1849827871\" class=\"ek-link\">submitting their phone number or email to the system<\/a>, even if the user had turned off that option in their account.\u201d Hackers were still able to breach into someone\u2019s account even if they did have the phone or email login option turned off in their settings. This example shows how hacking is almost impossible to avoid no matter how secure you believe your account to be. Millions of user IDs were exposed, and it was all because of a flaw that Twitter overlooked in their API.<\/p>\n\n\n\n<p>Hacking can feel inevitable. Hacking is definitely a huge concern in the media, and it gets more prominent and new technologies get \u00a0released. However, we are also getting better at preventing these types of errors \u00a0from occurring.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable? <\/p>\n","protected":false},"author":1,"featured_media":3431,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"series":[],"ppma_author":[672],"class_list":["post-3430","post","type-post","status-publish","format-standard","has-post-thumbnail","category-blogs","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is Hacking Inevitable? - Blogs - International Council for Media Literacy<\/title>\n<meta name=\"description\" content=\"Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Hacking Inevitable? - Blogs - International Council for Media Literacy\" \/>\n<meta property=\"og:description\" content=\"Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/\" \/>\n<meta property=\"og:site_name\" content=\"International Council for Media Literacy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IC4ML\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T01:07:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-07T01:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adhurim Tetaj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IC4ML\" \/>\n<meta name=\"twitter:site\" content=\"@IC4ML\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"IC4ML Admininstrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/\"},\"author\":{\"name\":\"ic4mladmin75\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/person\\\/0310600ca60f8c9310e86d06d8a161f9\"},\"headline\":\"Is Hacking Inevitable?\",\"datePublished\":\"2023-04-07T01:07:36+00:00\",\"dateModified\":\"2023-04-07T01:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/\"},\"wordCount\":583,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Code-and-Lens.png?fit=1000%2C800&ssl=1\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/\",\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/\",\"name\":\"Is Hacking Inevitable? - Blogs - International Council for Media Literacy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Code-and-Lens.png?fit=1000%2C800&ssl=1\",\"datePublished\":\"2023-04-07T01:07:36+00:00\",\"dateModified\":\"2023-04-07T01:07:42+00:00\",\"description\":\"Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Code-and-Lens.png?fit=1000%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Code-and-Lens.png?fit=1000%2C800&ssl=1\",\"width\":1000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/is-hacking-inevitable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Hacking Inevitable?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#website\",\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/\",\"name\":\"International Council for Media Literacy\",\"description\":\"Bridging Academia to Action\",\"publisher\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#organization\"},\"alternateName\":\"IC4ML\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#organization\",\"name\":\"International Council for Media Literacy\",\"alternateName\":\"IC4ML\",\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1\",\"width\":400,\"height\":255,\"caption\":\"International Council for Media Literacy\"},\"image\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/IC4ML\",\"https:\\\/\\\/x.com\\\/IC4ML\",\"https:\\\/\\\/www.instagram.com\\\/ICforML\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/person\\\/0310600ca60f8c9310e86d06d8a161f9\",\"name\":\"ic4mladmin75\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg9c9d1a7d2b48a423c82a8dea17af784c\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg\",\"caption\":\"ic4mladmin75\"},\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/author\\\/ic4mladmin75\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Hacking Inevitable? - Blogs - International Council for Media Literacy","description":"Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/","og_locale":"pt_PT","og_type":"article","og_title":"Is Hacking Inevitable? - Blogs - International Council for Media Literacy","og_description":"Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable?","og_url":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/","og_site_name":"International Council for Media Literacy","article_publisher":"https:\/\/www.facebook.com\/IC4ML","article_published_time":"2023-04-07T01:07:36+00:00","article_modified_time":"2023-04-07T01:07:42+00:00","og_image":[{"width":1000,"height":800,"url":"https:\/\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png","type":"image\/png"}],"author":"Adhurim Tetaj","twitter_card":"summary_large_image","twitter_creator":"@IC4ML","twitter_site":"@IC4ML","twitter_misc":{"Escrito por":"IC4ML Admininstrator","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#article","isPartOf":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/"},"author":{"name":"ic4mladmin75","@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/person\/0310600ca60f8c9310e86d06d8a161f9"},"headline":"Is Hacking Inevitable?","datePublished":"2023-04-07T01:07:36+00:00","dateModified":"2023-04-07T01:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/"},"wordCount":583,"commentCount":0,"publisher":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#organization"},"image":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?fit=1000%2C800&ssl=1","articleSection":["Blogs"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/","url":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/","name":"Is Hacking Inevitable? - Blogs - International Council for Media Literacy","isPartOf":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#primaryimage"},"image":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?fit=1000%2C800&ssl=1","datePublished":"2023-04-07T01:07:36+00:00","dateModified":"2023-04-07T01:07:42+00:00","description":"Technology has infiltrated nearly every aspect of our lives. But what happens when bad actors infiltrate our technology? Is hacking inevitable?","breadcrumb":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#primaryimage","url":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?fit=1000%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?fit=1000%2C800&ssl=1","width":1000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/is-hacking-inevitable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ic4ml.org\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Is Hacking Inevitable?"}]},{"@type":"WebSite","@id":"https:\/\/ic4ml.org\/pt-pt\/#website","url":"https:\/\/ic4ml.org\/pt-pt\/","name":"International Council for Media Literacy","description":"Bridging Academia to Action","publisher":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#organization"},"alternateName":"IC4ML","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ic4ml.org\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/ic4ml.org\/pt-pt\/#organization","name":"International Council for Media Literacy","alternateName":"IC4ML","url":"https:\/\/ic4ml.org\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/06\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/06\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1","width":400,"height":255,"caption":"International Council for Media Literacy"},"image":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IC4ML","https:\/\/x.com\/IC4ML","https:\/\/www.instagram.com\/ICforML"]},{"@type":"Person","@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/person\/0310600ca60f8c9310e86d06d8a161f9","name":"ic4mladmin75","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/secure.gravatar.com\/avatar\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg9c9d1a7d2b48a423c82a8dea17af784c","url":"https:\/\/secure.gravatar.com\/avatar\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg","caption":"ic4mladmin75"},"url":"https:\/\/ic4ml.org\/pt-pt\/author\/ic4mladmin75\/"}]}},"author_meta":{"display_name":"IC4ML Admininstrator","author_link":"https:\/\/ic4ml.org\/pt-pt\/author\/ic4mladmin75\/"},"featured_img":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?fit=300%2C240&ssl=1","featured_image_src":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?resize=600%2C400&ssl=1","featured_image_src_square":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?resize=600%2C600&ssl=1","author_info":{"display_name":"IC4ML Admininstrator","author_link":"https:\/\/ic4ml.org\/pt-pt\/author\/ic4mladmin75\/"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2023\/04\/Code-and-Lens.png?fit=1000%2C800&ssl=1","coauthors":[{"link":"https:\/\/ic4ml.org\/pt-pt\/author\/adhurim-tetaj\/","display_name":"Adhurim Tetaj"}],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/\" class=\"advgb-post-tax-term\">Blogs<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Blogs<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 3 anos ago","modified":"Updated 3 anos ago"},"absolute_dates":{"created":"Posted on 6 de Abril, 2023","modified":"Updated on 6 de Abril, 2023"},"absolute_dates_time":{"created":"Posted on 6 de Abril, 2023 20:07","modified":"Updated on 6 de Abril, 2023 20:07"},"featured_img_caption":"","series_order":null,"jetpack_sharing_enabled":true,"authors":[{"term_id":672,"user_id":0,"is_guest":1,"slug":"adhurim-tetaj","display_name":"Adhurim Tetaj","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=blank&r=pg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":"","9":"","10":"","11":"","12":""}],"_links":{"self":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts\/3430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/comments?post=3430"}],"version-history":[{"count":1,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts\/3430\/revisions"}],"predecessor-version":[{"id":3433,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts\/3430\/revisions\/3433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/media\/3431"}],"wp:attachment":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/media?parent=3430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/categories?post=3430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/tags?post=3430"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/series?post=3430"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/ppma_author?post=3430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}