{"id":12851,"date":"2021-04-01T00:00:00","date_gmt":"2021-04-01T00:00:00","guid":{"rendered":"https:\/\/e-dialog.group\/blog\/use-content-security-policy-with-google-tag-manager\/"},"modified":"2026-02-26T13:38:13","modified_gmt":"2026-02-26T13:38:13","slug":"use-content-security-policy-with-google-tag-manager","status":"publish","type":"post","link":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/","title":{"rendered":"Use Content Security Policy With Google Tag Manager"},"content":{"rendered":"<h2>How a content security policy works<\/h2>\n<p>The Content Security Policy is basically a text sent from your website to its visitors. This text defines which resources may be loaded on your website. You can decide very granularly on a domain basis which 3rd party domains are allowed to provide content on your website. But you can also very roughly block or allow all scripts or style properties.<\/p>\n<p><img decoding=\"async\" width=\"800\" height=\"173\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/csp.png\" alt=\"CSP\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/csp.png 931w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/csp-300x65.png 300w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/csp-768x166.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<p>Technically speaking, the server must inform the browser that only certain resources may be loaded. For this purpose, the so-called &ldquo;Content Security Policy&rdquo; is set in the HTTP header. When this is sent from the server to the browser, the browser analyzes its content, follows the rules and blocks content if necessary. If a browser is too old or does not support CSP, the HTTP header will be ignored by this browser.<\/p>\n<p>The reason for introducing this methodology is the numerous attacks that have occurred in the past, especially on dynamic websites. Suppose you have a forum where users can post content. A user could use the following trick to transmit third-party code to other users of the forum and use it, for example, to read passwords or user data:<\/p>\n<p><em>Example bulletin board code that I post for the fictional experiment on exampleforum.tld:<\/em><\/p>\n<blockquote>\n<p>[a href=&rdquo;https:\/\/www.beispielforum.tld\/index.php?search=&rdquo;]I found this! Be sure to take a look![\/a]<\/p>\n<\/blockquote>\n<p>In this example, this code is converted into a link by the forum and displayed to users as a link in a forum post.<br>Assuming someone clicks on the link and comes to the URL https:\/\/www.exampleforum.tld\/index.php?search=&hellip; which is a search results page from the forum, the malicious code https:\/\/boeshaftesscript.tld\/script.js will be loaded from the &ldquo;search&rdquo; parameter if the forum wants to display the search term from the &ldquo;search&rdquo; parameter and has no security mechanisms. If the forum had used CSP, no resource could be loaded from evilscript.tld.<\/p>\n<h2>Content Security Policy &amp; Google Tag Manager<\/h2>\n<p>When setting the content security policy on a website, an audit of the tools currently used should be carried out (as long as they will also be used after the CSP has been set).<br><strong>Danger:<\/strong>The use of a CSP without corresponding activation of the respective domains can, for example, completely block Google or Facebook Pixel (and thus tracking and remarketing).<\/p>\n<p>The use of Google Tag Manager (GTM) must also be approved in advance by the Content Security Policy (CSP). However, if you want to use Google Tag Manager to its full extent, it is not enough to just activate the Google Tag Manager domain (i.e. www.googletagmanager.com).<\/p>\n<p>Simply unlocking the GTM&rsquo;s domain means that user-defined settings such as custom JavaScript variables or GTM templates do not work properly.<\/p>\n<p>For example, with Custom JavaScript variables, the CSP prevents so-called script evaluations (the eval function), which means that the Custom JavaScript variables always return an undefined value (undefined).<\/p>\n<p>This can be remedied by adding the following addition to the Content Security Policy:<\/p>\n<blockquote>\n<p>script-src: &lsquo;unsafe-eval&rsquo; &lsquo;unsafe-inline&rsquo; https:\/\/www.googletagmanager.com<br>img-src: www.googletagmanager.com<\/p>\n<\/blockquote>\n<p>This ensures the correct execution of your GTM container. At the same time, no attacker who has gained access to your GTM container can execute scripts that query external resources or want to supply them with data.<\/p>\n<h3>Conclusion<\/h3>\n<p>The Content Security Policy is a useful tool for increasing control over content on your website.<\/p>\n<h3>If you are not yet using these or have concerns about your tracking or remarketing pixels, we will be happy to help you implement them!<a href=\"mailto:kontakt@e-dialog.group\">kontakt@e-dialog.group<\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator&#8217;s permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.<\/p>\n","protected":false},"author":1,"featured_media":4804,"comment_status":"closed","ping_status":"open","sticky":false,"template":"post-old.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,445],"channel":[],"goal":[463],"technology":[38],"c-year":[62],"class_list":{"0":"post-12851","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-analytics","9":"goal-digital-strategy","10":"technology-google-tag-manager","11":"c-year-62"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Use Content Security Policy With Google Tag Manager - e-dialog<\/title>\n<meta name=\"description\" content=\"In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator&#039;s permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use Content Security Policy With Google Tag Manager\" \/>\n<meta property=\"og:description\" content=\"In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator&#039;s permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"e-dialog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edialog.group\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-01T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T13:38:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2200\" \/>\n\t<meta property=\"og:image:height\" content=\"1180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"digitalists\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"digitalists\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/\"},\"author\":{\"name\":\"digitalists\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/person\\\/7b481e2ac90c21e4dc393821d35bb518\"},\"headline\":\"Use Content Security Policy With Google Tag Manager\",\"datePublished\":\"2021-04-01T00:00:00+00:00\",\"dateModified\":\"2026-02-26T13:38:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/\"},\"wordCount\":607,\"publisher\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"articleSection\":[\"Analytics\",\"Analytics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/\",\"name\":\"Use Content Security Policy With Google Tag Manager - e-dialog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"datePublished\":\"2021-04-01T00:00:00+00:00\",\"dateModified\":\"2026-02-26T13:38:13+00:00\",\"description\":\"In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator's permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#primaryimage\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"contentUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"width\":2200,\"height\":1180,\"caption\":\"|\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/use-content-security-policy-with-google-tag-manager\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use Content Security Policy With Google Tag Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/\",\"name\":\"e-dialog\",\"description\":\"Data-driven Marketing &amp; Strategie\",\"publisher\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#organization\",\"name\":\"e-dialog\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/e-dialog-logo.svg\",\"contentUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/e-dialog-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"e-dialog\"},\"image\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/edialog.group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/e-dialog-gmbh\\\/\",\"https:\\\/\\\/www.instagram.com\\\/e_dialog\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@e_dialog\"],\"description\":\"Bei e-dialog gestalteten wir gemeinsam die Zukunft des data-driven Marketings - mit einem gro\u00dfartigen Team aus passionierten Expert*innen.\",\"email\":\"kontakt@e-dialog.group\",\"telephone\":\"+43 1 309 09 09\",\"legalName\":\"e-dialog GmbH\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/person\\\/7b481e2ac90c21e4dc393821d35bb518\",\"name\":\"digitalists\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g\",\"caption\":\"digitalists\"},\"sameAs\":[\"https:\\\/\\\/e-dialog.group\"],\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/author\\\/digitalists\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Use Content Security Policy With Google Tag Manager - e-dialog","description":"In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator's permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/","og_locale":"en_US","og_type":"article","og_title":"Use Content Security Policy With Google Tag Manager","og_description":"In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator's permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.","og_url":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/","og_site_name":"e-dialog","article_publisher":"https:\/\/www.facebook.com\/edialog.group","article_published_time":"2021-04-01T00:00:00+00:00","article_modified_time":"2026-02-26T13:38:13+00:00","og_image":[{"width":2200,"height":1180,"url":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","type":"image\/png"}],"author":"digitalists","twitter_card":"summary_large_image","twitter_misc":{"Written by":"digitalists","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#article","isPartOf":{"@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/"},"author":{"name":"digitalists","@id":"https:\/\/e-dialog.group\/en\/#\/schema\/person\/7b481e2ac90c21e4dc393821d35bb518"},"headline":"Use Content Security Policy With Google Tag Manager","datePublished":"2021-04-01T00:00:00+00:00","dateModified":"2026-02-26T13:38:13+00:00","mainEntityOfPage":{"@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/"},"wordCount":607,"publisher":{"@id":"https:\/\/e-dialog.group\/en\/#organization"},"image":{"@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","articleSection":["Analytics","Analytics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/","url":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/","name":"Use Content Security Policy With Google Tag Manager - e-dialog","isPartOf":{"@id":"https:\/\/e-dialog.group\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#primaryimage"},"image":{"@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","datePublished":"2021-04-01T00:00:00+00:00","dateModified":"2026-02-26T13:38:13+00:00","description":"In order to increase security on the Internet, the so-called Content Security Policy (CSP) was introduced as a web standard. The content security policy aims to ensure that third-party content cannot easily be loaded onto a website without the website operator's permission. If you want to use the Content Security Policy together with Google tools, such as Google Tag Manager, a few things need to be taken into account.","breadcrumb":{"@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#primaryimage","url":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","contentUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","width":2200,"height":1180,"caption":"|"},{"@type":"BreadcrumbList","@id":"https:\/\/e-dialog.group\/en\/blog\/use-content-security-policy-with-google-tag-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/e-dialog.group\/en\/"},{"@type":"ListItem","position":2,"name":"Use Content Security Policy With Google Tag Manager"}]},{"@type":"WebSite","@id":"https:\/\/e-dialog.group\/en\/#website","url":"https:\/\/e-dialog.group\/en\/","name":"e-dialog","description":"Data-driven Marketing &amp; Strategie","publisher":{"@id":"https:\/\/e-dialog.group\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/e-dialog.group\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/e-dialog.group\/en\/#organization","name":"e-dialog","url":"https:\/\/e-dialog.group\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/e-dialog.group\/en\/#\/schema\/logo\/image\/","url":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/06\/e-dialog-logo.svg","contentUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/06\/e-dialog-logo.svg","width":1,"height":1,"caption":"e-dialog"},"image":{"@id":"https:\/\/e-dialog.group\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edialog.group","https:\/\/www.linkedin.com\/company\/e-dialog-gmbh\/","https:\/\/www.instagram.com\/e_dialog\/","https:\/\/www.tiktok.com\/@e_dialog"],"description":"Bei e-dialog gestalteten wir gemeinsam die Zukunft des data-driven Marketings - mit einem gro\u00dfartigen Team aus passionierten Expert*innen.","email":"kontakt@e-dialog.group","telephone":"+43 1 309 09 09","legalName":"e-dialog GmbH"},{"@type":"Person","@id":"https:\/\/e-dialog.group\/en\/#\/schema\/person\/7b481e2ac90c21e4dc393821d35bb518","name":"digitalists","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g","caption":"digitalists"},"sameAs":["https:\/\/e-dialog.group"],"url":"https:\/\/e-dialog.group\/en\/blog\/author\/digitalists\/"}]}},"_links":{"self":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts\/12851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/comments?post=12851"}],"version-history":[{"count":1,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts\/12851\/revisions"}],"predecessor-version":[{"id":13297,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts\/12851\/revisions\/13297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/media\/4804"}],"wp:attachment":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/media?parent=12851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/categories?post=12851"},{"taxonomy":"channel","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/channel?post=12851"},{"taxonomy":"goal","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/goal?post=12851"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/technology?post=12851"},{"taxonomy":"c-year","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/c-year?post=12851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}