{"id":42489,"date":"2021-05-14T15:48:55","date_gmt":"2021-05-14T13:48:55","guid":{"rendered":"https:\/\/www2.polyas.de\/ct_content_page_2\/bsi-security-goals"},"modified":"2024-06-17T14:41:04","modified_gmt":"2024-06-17T12:41:04","slug":"bsi-security-goals","status":"publish","type":"page","link":"https:\/\/www.polyas.com\/security\/bsi-security-goals","title":{"rendered":"BSI security goals for virtual voting"},"content":{"rendered":"<div  class='flex_column av-2h0g7x4-de4ae1467e542757120a2c90fb2718d7 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1aizrzs-88d6cfb9164210043734225ccc6dd3a8\">\n.avia-image-container.av-1aizrzs-88d6cfb9164210043734225ccc6dd3a8 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-1aizrzs-88d6cfb9164210043734225ccc6dd3a8 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-1aizrzs-88d6cfb9164210043734225ccc6dd3a8 av-styling- avia-align-center  avia-builder-el-1  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image- avia-img-lazy-loading-not- avia_image ' src=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2021\/05\/BSI-security-goals-for-virtual-voting.png\" alt='' title=''   itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-ltsofnzg-e00b2b2a0be9be2e3c09c71bd36eb6b0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>BSI security goals for virtual voting<\/h1>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">Now that many votes are taking place on virtual channels, the question of their IT security has moved more into focus. Associations and companies in particular are suddenly faced with the question of how they can hold their general meeting or shareholders\u2019 conference digitally and with legal compliance.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\" style=\"color: #4c4c4c;\">In 2020, the\u00a0<\/span><span lang=\"EN-US\"><a style=\"color: #0563c1; text-decoration-line: underline;\" href=\"https:\/\/www.bsi.bund.de\/EN\/Home\/home_node.html\" target=\"_blank\" rel=\"noopener\">BSI (German Federal Office for Information Security<\/a><span style=\"color: #738f9b;\">)<\/span><\/span><span lang=\"EN-US\" style=\"color: #4c4c4c;\">\u00a0published a practice-relate<\/span><span style=\"color: #4a4a4a;\"><span lang=\"EN-US\">d ViVA guide\u00a0<\/span><\/span><span lang=\"EN-US\" style=\"color: #4c4c4c;\">to virtual events and voting. This names four pillars of security that are best used to explain the complex issue of cyber security:<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><strong><span lang=\"EN-US\">1) Confidentiality<\/span><\/strong><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">Secret content should remain secret and may only be transported via secure transmission routes. In general, as little data should be collected as possible.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><strong><span lang=\"EN-US\">2) Availability:<\/span><\/strong><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">The voting system, the transmission routes and the users\u2019 end devices must be available during the voting period so that all eligible voters are able to cast their votes.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><strong><span lang=\"EN-US\">3) Integrity:<\/span><\/strong><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">Ballot papers may not be added, changed or deleted from the outside. The system must have demonstrable integrity. Unexpected system behavior must be notified and acted upon immediately, up to and including the cancellation of the election.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><strong><span lang=\"EN-US\">4) Authentication:<\/span><\/strong><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">All participating persons must be unambiguously authenticated before casting their votes. Various authentication procedures are available for different security levels\u2014from the transmission of ID\/password combinations to digital identity cards.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">POLYAS Live Voting is constructed to allow secure digital voting.\u00a0This page presents the security mechanisms used by POLYAS Live Voting and is based on the four BSI security goals for virtual voting.<\/span><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-ltymfqmc-a7e66dfd12d3c3a0f73a2f3629a0358f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Confidentiality for virtual voting<\/h2>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">In order to meet the BSI&#8217;s security goal of confidentiality, information intended for the public may only be transmitted to the outside via secure channels Further, voting secrecy must be assured where required. Here, voter authentication (i.e. the check on voting eligibility) must be decoupled from the authenticated information (the vote). And in principle, the digital implementation of voting should collect no more information than the analog variant.<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Secret voting<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">End-to-end encryption of the ballot papers with POLYAS Live Voting ensures that voting is secret. The vote is encrypted on the device used by the eligible voter, it is transmitted securely and is only decoded after cryptographic shuffling in the ballot box.<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Secure communication of the system components<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">Communications between all components of the Live Voting System are controlled by communication keys. Thus only authorized components have access to the functions offered by other components, and this access is regulated by fine-grained access guidelines based on the principle of least privileges.<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Data protection<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">POLYAS works strictly in line with the principle of data minimization. Of course, we comply with the requirements of the European General Data Protection Regulation (EU GDPR). Furthermore, customers have the option to work with an anonymized electoral roll that is free of any personal data.\u00a0<\/span><\/p>\n<h2 style=\"margin: 0cm 0cm 9pt; font-size: 18pt;\"><span lang=\"EN-US\" style=\"font-size: 25.5pt;\">The availability of virtual voting<\/span><\/h2>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">The availability must be ensured for the voting system itself, the communication link, and the decentralized end devices (cell phones, PCs, laptops). System and communication failures must be prevented at all of these points.\u00a0<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Protection of the POLYAS infrastructure<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">POLYAS ensures the best possible availability of the voting software thanks to a scalable operating concept that dynamically adapts to load, and a hosting concept that offers redundancy. Furthermore, POLYAS takes extensive protective measures to protect the system from external attacks. This includes, for example, regular penetration tests, as well as protection against DDos and brute force attacks.\u00a0<\/span><span lang=\"EN-US\"><a style=\"color: #0563c1; text-decoration-line: underline;\" href=\"\/security\/system-security\">More information is available here.<\/a><\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">In general, the ballots in POLYAS Online Voting and Live Voting are optimized so that the minimum of data is transmitted and not all elements have to be reloaded at every step. This amounts to just a few kilobytes per ballot.\u00a0<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Security instructions for browsers<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">To guarantee the security of the end devices used for voting, it is important that these devices have operating systems and web browsers that are updated regularly. We provide an overview of the supported operating systems and browsers for POLYAS Live Voting.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><strong><span lang=\"EN-US\">Get to know the POLYAS Online Voting Manager and set up your own Live Voting in just a few steps.<\/span><\/strong><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-ltymg7xp-b78053bb5458bc6df78350d079a20a72 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Integrity of the voting software<\/h2>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">The integrity of voting software is assured if votes are demonstrably transmitted without alteration.\u00a0This means that ballot papers may not be added, changed or deleted from the outside.\u00a0<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Unaltered transmission of ballots<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">With POLYAS CORE 3, the ballot of each eligible voter is encrypted in the browser during the voting process. This encryption is also active on mobile devices. Like all POLYAS systems, votes are transmitted exclusively over a TLS-encrypted connection based on a server certificate from D-Trust GmbH. This prevents tampering with the ballot paper while it is transmitted over the Internet.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">The securely transmitted ballots undergo a cryptographic shuffling process in the ballot box before being decrypted and the vote being counted. The integrity of the ballot papers is checked by zero-knowledge proofs, a cryptographic protocol that verifies the probability of ballot-paper integrity without revealing the content.<\/span><\/p>\n<h4 style=\"margin: 9pt 0cm; font-size: 12pt;\"><span lang=\"EN-US\" style=\"font-size: 15pt;\">Bulletin boards for an exhaustive audit trail<\/span><\/h4>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">POLYAS CORE 3 makes use of\u00a0<\/span><span lang=\"EN-US\">bulletin boards<\/span><span lang=\"EN-US\"> to store all data that is critical to the security of an election. The POLYAS Live Voting thus has a database that all relevant information is added to during the voting, but from which nothing can be deleted and for which there is a complete audit log. Changes can only be made by authorized persons.<\/span><\/p>\n<p style=\"margin: 0cm 0cm 12.6pt; font-size: 12pt;\"><span lang=\"EN-US\">After the election, the bulletin board policy can be reviewed by controllers who ensure that all published entries are properly signed and that the integrity of the hash chain is maintained. This technology is comparable to the blockchain, with the difference that the bulletin board is hosted centrally and not decentrally (i.e. on a large number of servers).<\/span><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-wz0wl4-34aab32a2d0f1ae4906b93362ed1f18e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Voter authentication<\/h2>\n<p>Various authentication methods are available for POLYAS Live Voting.\u00a0The overall security of unambiguous authentication can be increased by additional functions, such as two-factor authentication or the generation of login data by a third party.<\/p>\n<p>Each method ensures that eligible voters can exercise their voting right once only.\u00a0Eligible voters cast their votes directly and independently using an Internet-enabled device. Visually impaired voters are also able to vote independently with the help of a screen reader.<\/p>\n<p><a href=\"\/security\/secure-authentication\">Learn more about secure authentication with POLYAS<\/a><\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-1nz9rg8-75c54a224fb808df4d271da46d3d88ea av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lu9i2vcx-f98b442447e01de64a594721f37db094\">\n#top .hr.hr-invisible.av-lu9i2vcx-f98b442447e01de64a594721f37db094{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-lu9i2vcx-f98b442447e01de64a594721f37db094 hr-invisible  avia-builder-el-7  el_before_av_textblock  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-ltym5gx4-4b5d2bf9f8cb84828b4c30d830082a87 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock cnt2_sidemenu1'  itemprop=\"text\" ><h3><strong>Topics<\/strong><\/h3>\n<ul>\n<li><a href=\"\/security\">Secure Online Voting with POLYAS<\/a><\/li>\n<li><a href=\"\/security\/certified-online-voting-software\">Certified online voting software<\/a><\/li>\n<li><a href=\"\/security\/secrecy-of-the-ballot\">Secrecy of the Ballot with POLYAS Online Voting<\/a><\/li>\n<li><a href=\"\/security\/verification-election-results\">Independent verification of the election results<\/a><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n<div  class='hr av-13shxaw-70ecde758ef09bd32c279342ccec690e hr-default  avia-builder-el-9  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lu9idg7z-bf603fd1ba39051b13a329fc88d83331 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock cnt2_sidemenu2'  itemprop=\"text\" ><h3><strong>Further information<\/strong><\/h3>\n<ul>\n<li><a href=\"https:\/\/community.polyas.com\/english\">POLYAS Help Center &#8211; Instructions and FAQ<\/a><\/li>\n<li><a href=\"\/about-polyas\/research\">Electoral Research at POLYAS<\/a><\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-42489","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v25.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BSI security goals for virtual voting<\/title>\n<meta name=\"description\" content=\"The BSI (German Federal Office for Information Security) defines four security goals for secure virtual voting. Learn now how POLYAS implements IT security for virtual elections in Live Voting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.com\/security\/bsi-security-goals\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BSI security goals for virtual voting\" \/>\n<meta property=\"og:description\" content=\"The BSI (German Federal Office for Information Security) defines four security goals for secure virtual voting. Learn now how POLYAS implements IT security for virtual elections in Live Voting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.com\/security\/bsi-security-goals\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-17T12:41:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/07\/Design-ohne-Titel-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.com\/security\/bsi-security-goals\",\"url\":\"https:\/\/www.polyas.com\/security\/bsi-security-goals\",\"name\":\"BSI security goals for virtual voting\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/#website\"},\"datePublished\":\"2021-05-14T13:48:55+00:00\",\"dateModified\":\"2024-06-17T12:41:04+00:00\",\"description\":\"The BSI (German Federal Office for Information Security) defines four security goals for secure virtual voting. Learn now how POLYAS implements IT security for virtual elections in Live Voting\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.com\/security\/bsi-security-goals#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.com\/security\/bsi-security-goals\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.com\/security\/bsi-security-goals#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BSI security goals for virtual voting\",\"item\":\"https:\/\/www.polyas.com\/security\/bsi-security-goals\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BSI security goals for virtual voting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/#website\",\"url\":\"https:\/\/www.polyas.de\/\",\"name\":\"POLYAS\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BSI security goals for virtual voting","description":"The BSI (German Federal Office for Information Security) defines four security goals for secure virtual voting. Learn now how POLYAS implements IT security for virtual elections in Live Voting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.com\/security\/bsi-security-goals","og_locale":"de_DE","og_type":"article","og_title":"BSI security goals for virtual voting","og_description":"The BSI (German Federal Office for Information Security) defines four security goals for secure virtual voting. Learn now how POLYAS implements IT security for virtual elections in Live Voting","og_url":"https:\/\/www.polyas.com\/security\/bsi-security-goals","og_site_name":"POLYAS","article_modified_time":"2024-06-17T12:41:04+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/07\/Design-ohne-Titel-3.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.com\/security\/bsi-security-goals","url":"https:\/\/www.polyas.com\/security\/bsi-security-goals","name":"BSI security goals for virtual voting","isPartOf":{"@id":"https:\/\/www.polyas.de\/#website"},"datePublished":"2021-05-14T13:48:55+00:00","dateModified":"2024-06-17T12:41:04+00:00","description":"The BSI (German Federal Office for Information Security) defines four security goals for secure virtual voting. Learn now how POLYAS implements IT security for virtual elections in Live Voting","breadcrumb":{"@id":"https:\/\/www.polyas.com\/security\/bsi-security-goals#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.com\/security\/bsi-security-goals"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.com\/security\/bsi-security-goals#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/"},{"@type":"ListItem","position":2,"name":"BSI security goals for virtual voting","item":"https:\/\/www.polyas.com\/security\/bsi-security-goals"},{"@type":"ListItem","position":3,"name":"BSI security goals for virtual voting"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/#website","url":"https:\/\/www.polyas.de\/","name":"POLYAS","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages\/42489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/comments?post=42489"}],"version-history":[{"count":0,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages\/42489\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/media?parent=42489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/categories?post=42489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/tags?post=42489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}