{"id":5706,"date":"2026-01-29T06:44:35","date_gmt":"2026-01-29T05:44:35","guid":{"rendered":"https:\/\/www.cyberagentur.de\/?page_id=5706"},"modified":"2026-01-29T12:09:56","modified_gmt":"2026-01-29T11:09:56","slug":"vertrauenswuerdige-technische-wertschoepfungsketten","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/","title":{"rendered":"Trustworthy technical value chains"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle-hight-space\">Without trust in digital solutions, they will not be accepted and used by citizens. However, trust can only be established if we control the chain of IT solutions from start to finish as well as possible. And this is exactly what the Cyberagentur team in Dresden is dedicated to. And Dresden is exactly the right location for this, as there is a large ecosystem in the field of secure IT solutions, communication, chip design and chip production from research, industry and government partners, which complements the Cyberagentur team.   <\/p>\n<div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default ce-frame--with-icon has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__content__wrapper\">\n          <div class=\"ce-frame__icon ce-frame__icon--mobile\">\n        \n    <\/div>\n      \n      <div class=\"ce-frame__content__row\">\n              <div class=\"ce-frame__icon\">\n        \n    <\/div>\n          <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Our topics in this focus area<\/h2>\n\n\n  <div class=\"ce-faqaccordions wp-block-cyberagentur-faqaccordions accordion\" id=\"69f25dde31d4c\">\n  <div class=\"accordion-item\" id=\"vertrauenswuerdige-it-architekturen-und-lieferketten\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f25dde31d4c_5711\" aria-expanded=\"false\" aria-controls=\"69f25dde31d4c_5711\">\n      <span>Trustworthy IT architectures and supply chains<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f25dde31d4c_5711\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>Without raw materials, there are no chips, and without knowledge and control of the hardware and software, there is no security for an individual IT solution. This is precisely where we come in and look for solutions to lay the foundations for a digital, trustworthy value chain with verifiably secure IT products and sustainably secured supply chains. <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"vertrauenswuerdige-kommunikation\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f25dde31d4c_5714\" aria-expanded=\"false\" aria-controls=\"69f25dde31d4c_5714\">\n      <span>Trustworthy communication<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f25dde31d4c_5714\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>Today, a single IT system alone has no real added value. The networking of a wide variety of systems is essential. But how can we secure this networking and communication of systems? We ask ourselves these questions and, in addition to the technical aspects, also examine the sociological aspects of communication &#8211; as a link in the trustworthy value chain.   <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"identitaeten-und-verbraucherschutz-im-cyberraum\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69f25dde31d4c_5716\" aria-expanded=\"false\" aria-controls=\"69f25dde31d4c_5716\">\n      <span>Identities and consumer protection in cyberspace<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69f25dde31d4c_5716\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>Without the user, I don&#8217;t need a secure IT solution. So at the end of the trustworthy value chain, we are looking at how everyday digital life and the digital self can be made secure and transparent. Resilient digital services that guarantee the protection of citizens and their identity and increase vigilance are key to strengthening citizens&#8217; trust in digital solutions.  <\/p>\n\n    <\/div>\n  <\/div>\n<\/div>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-panel-buttons is-layout-constrained alignfull ce-panel-buttons__columns-3 ce-panel-buttons--default has-background has-white-background-color align align is-style-less-space wp-block-cyberagentur-panelbuttons has-background has-white-background-color\">\n  <div class=\"ce-panel-buttons__content\">\n    <div class=\"acf-innerblocks-container\">\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/programs\/' target='_self' aria-label='go to  Programs'>  <h2 class=\"title\">Programs<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/awarded\/' target='_self' aria-label='go to  Awards'>  <h2 class=\"title\">Awards<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/karriere\/' target='_self' aria-label='go to  Vacancies'>  <h2 class=\"title\">Vacancies<\/h2>\n  <p><\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n<\/div>\n  <\/div>\n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-right ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-misty-background-color align is-style-default wp-block-cyberagentur-frame has-background has-purple-misty-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__background\">\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/Fragezeichen_space_white.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\n    <\/div>    \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Questions about this focus?<\/h2>\n\n\n\n<p>Write us an e-mail: <br\/><a href=\"mailto:s&#105;&#99;&#104;ere&#45;&#115;&#121;s&#116;&#101;me&#64;&#99;y&#98;erage&#110;&#116;&#117;r&#46;de\">sic&#104;e&#114;e&#45;&#115;ys&#116;&#101;m&#101;&#64;&#99;&#121;b&#101;&#114;a&#103;entu&#114;.&#100;&#101;<\/a><\/p>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left is-style-subtitle is-style-subheadline\">Also interesting<\/h2>\n\n\n<div class=\"ce-focusmenu ce-focusmenu--2columns has-background has-white-background-color align wp-block-cyberagentur-focusmenu has-background has-white-background-color\">\n    <ul class=\"ce-panelmenu\">\n        <li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/\" aria-label=\"go to  Secure society\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Gesellschaft.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Secure society<\/h3>\n      <p>So that we are safe in the digital world of the day after tomorrow.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\" aria-label=\"go to  Key technologies\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Schluesseltechnologien-2.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Key technologies<\/h3>\n      <p>The impact is coming. Let&#8217;s make use of it. <\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/\" aria-label=\"go to  Cybersecurity of complex systems\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Systeme.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Cybersecurity of complex systems<\/h3>\n      <p>New security paradigms for complex digital orders.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li>\n    <\/ul>\n<\/div>\n<\/div>\n    <\/div>\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p>Without trust in digital solutions, they will not be accepted and used by citizens. However, trust can only be established if we control the chain of IT solutions from start to finish as well as possible. And this is exactly what the Cyberagentur team in Dresden is dedicated to. And Dresden is exactly the right [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":3321,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5706","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trustworthy technical value chains - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trustworthy technical value chains - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Without trust in digital solutions, they will not be accepted and used by citizens. However, trust can only be established if we control the chain of IT solutions from start to finish as well as possible. And this is exactly what the Cyberagentur team in Dresden is dedicated to. And Dresden is exactly the right [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T11:09:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/vertrauenswuerdige-technische-wertschoepfungsketten\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/vertrauenswuerdige-technische-wertschoepfungsketten\\\/\",\"name\":\"Trustworthy technical value chains - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2026-01-29T05:44:35+00:00\",\"dateModified\":\"2026-01-29T11:09:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/vertrauenswuerdige-technische-wertschoepfungsketten\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/vertrauenswuerdige-technische-wertschoepfungsketten\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/vertrauenswuerdige-technische-wertschoepfungsketten\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focal points\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trustworthy technical value chains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trustworthy technical value chains - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/","og_locale":"en_GB","og_type":"article","og_title":"Trustworthy technical value chains - Cyberagentur","og_description":"Without trust in digital solutions, they will not be accepted and used by citizens. However, trust can only be established if we control the chain of IT solutions from start to finish as well as possible. And this is exactly what the Cyberagentur team in Dresden is dedicated to. And Dresden is exactly the right [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/","og_site_name":"Cyberagentur","article_modified_time":"2026-01-29T11:09:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/","url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/","name":"Trustworthy technical value chains - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2026-01-29T05:44:35+00:00","dateModified":"2026-01-29T11:09:56+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Focal points","item":"https:\/\/www.cyberagentur.de\/en\/focal-points\/"},{"@type":"ListItem","position":3,"name":"Trustworthy technical value chains"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/5706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=5706"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/5706\/revisions"}],"predecessor-version":[{"id":6210,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/5706\/revisions\/6210"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=5706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}