{"id":2651,"date":"2025-03-24T11:07:08","date_gmt":"2025-03-24T11:07:08","guid":{"rendered":"https:\/\/truzzt.eu\/?p=2651"},"modified":"2025-05-14T13:06:28","modified_gmt":"2025-05-14T13:06:28","slug":"understanding-data-spaces-empowering-users-with-control-and-trust","status":"publish","type":"post","link":"https:\/\/truzzt.eu\/en\/understanding-data-spaces-empowering-users-with-control-and-trust\/","title":{"rendered":"Understanding Data Spaces: Empowering Users with Control"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2651\" class=\"elementor elementor-2651\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59de0306 e-con-full e-flex e-con e-parent\" data-id=\"59de0306\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca561b elementor-widget elementor-widget-heading\" data-id=\"5ca561b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the Data Spaces?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e979761 elementor-widget elementor-widget-text-editor\" data-id=\"7e979761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>Data spaces are decentralized ecosystems designed to facilitate the trustworthy exchange of data. In a data space, different parties - data providers, consumers and intermediaries - interact within a framework that ensures security, privacy and compliance. This exchange usually takes place between digital wallets managed by identity providers and is supported by connectors that handle the secure transfer of data.<\/p><p>A data space allows individuals or organizations (data providers) to share their data with others (data consumers) while maintaining control over who accesses it and under what conditions. These environments are designed to respect data sovereignty, i.e. to ensure that data remains within a specific legal and regulatory framework, and to protect the privacy of users. Data Spaces promote trust, transparency and security, making it easier for organizations to share valuable information while reducing the risks associated with data breaches.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62b2f35 elementor-widget elementor-widget-image\" data-id=\"62b2f35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"698\" src=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-1024x698.png\" class=\"attachment-large size-large wp-image-2659\" alt=\"Data Space Diagram\" srcset=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-1024x698.png 1024w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-300x204.png 300w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-768x523.png 768w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-1536x1047.png 1536w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-2048x1396.png 2048w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628166-18x12.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e67dcd elementor-widget elementor-widget-spacer\" data-id=\"0e67dcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da8325c elementor-widget elementor-widget-heading\" data-id=\"da8325c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The onboarding process<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-201a601 elementor-widget elementor-widget-spacer\" data-id=\"201a601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2543602 elementor-widget elementor-widget-heading\" data-id=\"2543602\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity verification and digital wallets<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e4594e elementor-widget elementor-widget-text-editor\" data-id=\"2e4594e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>The onboarding process to a Data Space starts with identity verification. Users (either data providers or consumers) must submit their identity data to an identity provider. The identity provider verifies the user's credentials and issues a certificate that confirms the user's identity. This certificate is stored in a digital wallet, which serves as a secure storage space for the user's verified identity.<\/p><p>The connector is then used to access the data space. This software or tool is responsible for interacting with the data space, representing the user within the ecosystem and securely handling data exchange.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e91f623 elementor-widget elementor-widget-spacer\" data-id=\"e91f623\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3578c7 elementor-widget elementor-widget-heading\" data-id=\"c3578c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Who provides the digital wallet?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b645d4a elementor-widget elementor-widget-text-editor\" data-id=\"b645d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>The digital wallet is provided and managed by trustworthy providers. These can be specialized companies or organizations that have experience in managing sensitive data. The wallet providers are responsible for the security of the stored credentials and ensure that only authorized persons can access them. In some cases, a wallet can also be integrated into the data space platform itself, which simplifies the process for users.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3e6b45 elementor-widget elementor-widget-image\" data-id=\"b3e6b45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"449\" src=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-1024x449.png\" class=\"attachment-large size-large wp-image-2660\" alt=\"Oboarding to a Data Space\" srcset=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-1024x449.png 1024w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-300x132.png 300w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-768x337.png 768w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-1536x674.png 1536w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-2048x899.png 2048w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628170-18x8.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f2365d elementor-widget elementor-widget-spacer\" data-id=\"1f2365d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70fa255 elementor-widget elementor-widget-heading\" data-id=\"70fa255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data sharing and consumption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-678429f elementor-widget elementor-widget-spacer\" data-id=\"678429f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9abf11 elementor-widget elementor-widget-heading\" data-id=\"b9abf11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Provider<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a36eff elementor-widget elementor-widget-text-editor\" data-id=\"7a36eff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>A data provider is a person or organization that makes valuable data available. By participating in a data room, data providers can upload and catalog their data and make it available to trusted data consumers. There are two reasons why data providers should participate in a data room:<\/p><p><strong>Security<br \/><\/strong>Data rooms ensure that the provider's data is only accessible to authorized users and protect it from unauthorized access or breaches.<\/p><p><strong>Monetization<br \/><\/strong>Providers can set terms of use that may include pricing for data usage, creating new revenue streams. A trusted environment such as a data room reduces friction when entering into agreements with consumers and ensures that all transactions are traceable and comply with data protection laws.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61fb423 elementor-widget elementor-widget-image\" data-id=\"61fb423\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"410\" src=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-1024x410.png\" class=\"attachment-large size-large wp-image-2661\" alt=\"Data Space Diagram- Data Provider\" srcset=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-1024x410.png 1024w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-300x120.png 300w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-768x308.png 768w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-1536x616.png 1536w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-2048x821.png 2048w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628165-1-18x7.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da19213 elementor-widget elementor-widget-spacer\" data-id=\"da19213\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62fa40e elementor-widget elementor-widget-heading\" data-id=\"62fa40e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Consumer<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-747f00c elementor-widget elementor-widget-text-editor\" data-id=\"747f00c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>Data consumers, on the other hand, are looking for specific data that can improve their work. They can search for data and request it from providers in the field. The consumer's connector ensures that their request is properly vetted and complies with the provider's terms and conditions before the data is released.<\/p><p>Consumers benefit from the transparency of the data room as they can be sure that the data they receive is verified and trustworthy and comes from reputable providers.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a742d8 elementor-widget elementor-widget-image\" data-id=\"5a742d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"439\" src=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-1024x439.png\" class=\"attachment-large size-large wp-image-2665\" alt=\"Data Space Diagram- Data Consumer\" srcset=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-1024x439.png 1024w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-300x128.png 300w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-768x329.png 768w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-1536x658.png 1536w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-2048x877.png 2048w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Frame-628166-18x8.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-148bcff elementor-widget elementor-widget-spacer\" data-id=\"148bcff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-463528d elementor-widget elementor-widget-heading\" data-id=\"463528d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ensuring trust and traceability<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65ece71 elementor-widget elementor-widget-spacer\" data-id=\"65ece71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fa2cd6 elementor-widget elementor-widget-text-editor\" data-id=\"0fa2cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>One of the most important components of a data room is the logging house. As data is exchanged between the two connectors, the logging house records each transaction to ensure traceability. This means that although the data itself is transferred directly between the connectors (outside the data room itself), the logging house maintains a secure audit trail.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5b54d5 elementor-widget elementor-widget-heading\" data-id=\"e5b54d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data Consumer<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5956081 elementor-widget elementor-widget-text-editor\" data-id=\"5956081\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>The transaction takes place directly between the two connectors, without a third party in the data room acting as an intermediary. This ensures that no unnecessary data is forwarded or stored and the risk of data leaks is minimized. The connectors act as trusted agents for both the data provider and consumer and handle the data exchange securely, while the logging point ensures that every action is tracked for future reference and compliance.<\/p><\/div><p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-078df92 elementor-widget elementor-widget-image\" data-id=\"078df92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-1024x683.png\" class=\"attachment-large size-large wp-image-2673\" alt=\"Data Transfer Diagram\" srcset=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-1024x683.png 1024w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-300x200.png 300w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-768x513.png 768w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-1536x1025.png 1536w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-2048x1367.png 2048w, https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/Group-628171-18x12.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In today's digital world, the value of data is constantly increasing. With data flowing freely between systems and organizations, the need for secure, trusted environments to manage this data is critical. This is where Data Spaces come into play, providing a structured and secure environment for data exchange while ensuring data sovereignty and traceability.<\/p>","protected":false},"author":1,"featured_media":2698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[1],"tags":[15],"class_list":["post-2651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-data-spaces","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben - truzzt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truzzt.eu\/en\/understanding-data-spaces-empowering-users-with-control-and-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben - truzzt\" \/>\n<meta property=\"og:description\" content=\"In der heutigen digitalen Welt nimmt der Wert von Daten st\u00e4ndig zu. Da Daten ungehindert zwischen Systemen und Organisationen flie\u00dfen, ist der Bedarf an sicheren, vertrauensw\u00fcrdigen Umgebungen zur Verwaltung dieser Daten entscheidend. Hier kommen Data Spaces ins Spiel, die eine strukturierte und sichere Umgebung f\u00fcr den Datenaustausch bieten und gleichzeitig die Datenhoheit und R\u00fcckverfolgbarkeit gew\u00e4hrleisten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truzzt.eu\/en\/understanding-data-spaces-empowering-users-with-control-and-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"truzzt\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-24T11:07:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T13:06:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1664\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"truzzt Alliance\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"truzzt Alliance\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/\"},\"author\":{\"name\":\"truzzt Alliance\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#\\\/schema\\\/person\\\/e083cdfdec8ed830c02434161812397d\"},\"headline\":\"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben\",\"datePublished\":\"2025-03-24T11:07:08+00:00\",\"dateModified\":\"2025-05-14T13:06:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/\"},\"wordCount\":742,\"publisher\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truzzt.eu\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png\",\"keywords\":[\"Data Spaces\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/\",\"url\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/\",\"name\":\"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben - truzzt\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truzzt.eu\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png\",\"datePublished\":\"2025-03-24T11:07:08+00:00\",\"dateModified\":\"2025-05-14T13:06:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truzzt.eu\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png\",\"contentUrl\":\"https:\\\/\\\/truzzt.eu\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png\",\"width\":1664,\"height\":896},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/understanding-data-spaces-empowering-users-with-control-and-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truzzt.eu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#website\",\"url\":\"https:\\\/\\\/truzzt.eu\\\/\",\"name\":\"truzzt\",\"description\":\"Data Sovereignty, Traceability &amp; trust Anchors\",\"publisher\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truzzt.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#organization\",\"name\":\"truzzt\",\"url\":\"https:\\\/\\\/truzzt.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truzzt.eu\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/06\\\/cropped-cropped-truzzt_logo_wh.png\",\"contentUrl\":\"https:\\\/\\\/truzzt.eu\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2021\\\/06\\\/cropped-cropped-truzzt_logo_wh.png\",\"width\":628,\"height\":160,\"caption\":\"truzzt\"},\"image\":{\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truzzt.eu\\\/#\\\/schema\\\/person\\\/e083cdfdec8ed830c02434161812397d\",\"name\":\"truzzt Alliance\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c69a03043f856d205391452b85a2bee794faad9a0fa7d1ea9168c752a547fb6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c69a03043f856d205391452b85a2bee794faad9a0fa7d1ea9168c752a547fb6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c69a03043f856d205391452b85a2bee794faad9a0fa7d1ea9168c752a547fb6?s=96&d=mm&r=g\",\"caption\":\"truzzt Alliance\"},\"url\":\"https:\\\/\\\/truzzt.eu\\\/en\\\/author\\\/orbiter-wordpress-admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben - truzzt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truzzt.eu\/en\/understanding-data-spaces-empowering-users-with-control-and-trust\/","og_locale":"en_GB","og_type":"article","og_title":"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben - truzzt","og_description":"In der heutigen digitalen Welt nimmt der Wert von Daten st\u00e4ndig zu. Da Daten ungehindert zwischen Systemen und Organisationen flie\u00dfen, ist der Bedarf an sicheren, vertrauensw\u00fcrdigen Umgebungen zur Verwaltung dieser Daten entscheidend. Hier kommen Data Spaces ins Spiel, die eine strukturierte und sichere Umgebung f\u00fcr den Datenaustausch bieten und gleichzeitig die Datenhoheit und R\u00fcckverfolgbarkeit gew\u00e4hrleisten.","og_url":"https:\/\/truzzt.eu\/en\/understanding-data-spaces-empowering-users-with-control-and-trust\/","og_site_name":"truzzt","article_published_time":"2025-03-24T11:07:08+00:00","article_modified_time":"2025-05-14T13:06:28+00:00","og_image":[{"width":1664,"height":896,"url":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png","type":"image\/png"}],"author":"truzzt Alliance","twitter_card":"summary_large_image","twitter_misc":{"Written by":"truzzt Alliance","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#article","isPartOf":{"@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/"},"author":{"name":"truzzt Alliance","@id":"https:\/\/truzzt.eu\/#\/schema\/person\/e083cdfdec8ed830c02434161812397d"},"headline":"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben","datePublished":"2025-03-24T11:07:08+00:00","dateModified":"2025-05-14T13:06:28+00:00","mainEntityOfPage":{"@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/"},"wordCount":742,"publisher":{"@id":"https:\/\/truzzt.eu\/#organization"},"image":{"@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png","keywords":["Data Spaces"],"articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/","url":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/","name":"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben - truzzt","isPartOf":{"@id":"https:\/\/truzzt.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#primaryimage"},"image":{"@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png","datePublished":"2025-03-24T11:07:08+00:00","dateModified":"2025-05-14T13:06:28+00:00","breadcrumb":{"@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#primaryimage","url":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png","contentUrl":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2025\/03\/f26d8c8f-e45a-475f-8c71-ea7b892934e6-1.png","width":1664,"height":896},{"@type":"BreadcrumbList","@id":"https:\/\/truzzt.eu\/understanding-data-spaces-empowering-users-with-control-and-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truzzt.eu\/"},{"@type":"ListItem","position":2,"name":"Datenr\u00e4ume verstehen: Nutzern die Kontrolle \u00fcber ihre Daten geben"}]},{"@type":"WebSite","@id":"https:\/\/truzzt.eu\/#website","url":"https:\/\/truzzt.eu\/","name":"truzzt","description":"Data Sovereignty, Traceability &amp; trust Anchors","publisher":{"@id":"https:\/\/truzzt.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truzzt.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/truzzt.eu\/#organization","name":"truzzt","url":"https:\/\/truzzt.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/truzzt.eu\/#\/schema\/logo\/image\/","url":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-cropped-truzzt_logo_wh.png","contentUrl":"https:\/\/truzzt.eu\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-cropped-truzzt_logo_wh.png","width":628,"height":160,"caption":"truzzt"},"image":{"@id":"https:\/\/truzzt.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truzzt.eu\/#\/schema\/person\/e083cdfdec8ed830c02434161812397d","name":"truzzt Alliance","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/1c69a03043f856d205391452b85a2bee794faad9a0fa7d1ea9168c752a547fb6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1c69a03043f856d205391452b85a2bee794faad9a0fa7d1ea9168c752a547fb6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c69a03043f856d205391452b85a2bee794faad9a0fa7d1ea9168c752a547fb6?s=96&d=mm&r=g","caption":"truzzt Alliance"},"url":"https:\/\/truzzt.eu\/en\/author\/orbiter-wordpress-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/posts\/2651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/comments?post=2651"}],"version-history":[{"count":22,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/posts\/2651\/revisions"}],"predecessor-version":[{"id":3253,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/posts\/2651\/revisions\/3253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/media\/2698"}],"wp:attachment":[{"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/media?parent=2651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/categories?post=2651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truzzt.eu\/en\/wp-json\/wp\/v2\/tags?post=2651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}