{"id":667,"date":"2015-11-09T08:57:53","date_gmt":"2015-11-09T08:57:53","guid":{"rendered":"http:\/\/nethemba.com\/sk\/?p=667"},"modified":"2016-01-20T13:33:33","modified_gmt":"2016-01-20T13:33:33","slug":"sk-verzia-pre-zakon-o","status":"publish","type":"post","link":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/","title":{"rendered":"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov"},"content":{"rendered":"<p>(alebo pre\u010do treba legalizova\u0165 vlastnenie a predaj n\u00e1strojov umo\u017e\u0148uj\u00facich odpo\u010d\u00favanie)<\/p>\n<p align=\"left\">Koncom augusta 2015 slovensk\u00e1 vl\u00e1da schv\u00e1lila noveliz\u00e1ciu z\u00e1kona o ochrane pred odpo\u010d\u00favan\u00edm (166\/2003). Viac inform\u00e1cii v SME <a href=\"http:\/\/www.sme.sk\/c\/7994362\/tajni-budu-moct-odpocuvat-aj-internet.html\">Tajn\u00ed bud\u00fa m\u00f4c\u0165 odpo\u010d\u00fava\u0165 aj internet<\/a>, pr\u00edpadne na zive.sk <a href=\"http:\/\/www.zive.sk\/clanok\/108084\/spionazny-softver-bude-legalny-umozni-to-zmena-v-zakone\">\u0160pion\u00e1\u017eny softv\u00e9r bude leg\u00e1lny. Umo\u017en\u00ed to zmena v z\u00e1kone<\/a>.<\/p>\n<p align=\"left\">Hne\u010f na za\u010diatku by som r\u00e1d vysvetlil, \u010do je ITP (informa\u010dn\u00fd technick\u00fd prostriedok). V princ\u00edpe ide o ak\u00fdko\u013evek n\u00e1stroj alebo odpo\u010d\u00favac\u00ed prostriedok, ktor\u00fd m\u00f4\u017ee pou\u017e\u00edva\u0165 \u00fazka skupina \u013eud\u00ed (konkr\u00e9tne Slovensk\u00e1 informa\u010dn\u00e1 slu\u017eba, Vojensk\u00e9 spravodajstvo, Policajn\u00fd zbor, \u017delezni\u010dn\u00e1 pol\u00edcia, Zbor v\u00e4zenskej a\u00a0justi\u010dnej str\u00e1\u017ee, Coln\u00e1 spr\u00e1va \u2013 odstavec 2, paragrafu 2) na &#8222;leg\u00e1lne odpo\u010d\u00favanie&#8220;. Pou\u017eitie alebo vlastnenie ITP v\u0161etk\u00fdmi ostatn\u00fdmi &#8211; fyzick\u00fdmi alebo pr\u00e1vnickymi osobami je kriminalizovan\u00e9 (odstavec 7, paragrafu 2).<\/p>\n<p align=\"left\">Noveliz\u00e1cia uveden\u00e9ho z\u00e1kona roz\u0161iruje defin\u00edciu ITP aj na \u201esoftv\u00e9rovy prostriedok\u201c, \u010d\u00edm prakticky legalizuje pou\u017e\u00edvanie ak\u00e9hoko\u013evek \u0161pehovacieho malware-u (typu FinFisher alebo Galileo), ktor\u00e9ho pou\u017eitie bolo doteraz neleg\u00e1lne nako\u013eko nebol potrebn\u00fd s\u00fadny pr\u00edkaz (viac inform\u00e1ci\u00ed <a href=\"https:\/\/www.nethemba.com\/blog\/-\/blogs\/mate-strach-o-vase-sukromie-bojte-sa-sis-\">M\u00e1te strach o Va\u0161e s\u00fakromie? Bojte sa SIS<\/a>).<\/p>\n<p align=\"left\">Okrem in\u00e9ho noveliz\u00e1cia tie\u017e zav\u00e1dza, \u017ee ob\u010dania (s v\u00fdnimkou hore uveden\u00fdch \u0161t\u00e1tnych VIP skup\u00edn) nesm\u00fa uveden\u00e9 ITP prostriedky nielen pou\u017e\u00edva\u0165, ale ani \u201ema\u0165 v dr\u017ebe\u201c.<\/p>\n<p align=\"left\">Ond\u0159ej Neff na otv\u00e1racom ceremoni\u00e1le hackerskej konferencie <a href=\"http:\/\/www.hcpp.cz\/eng\/\">HCPP2015<\/a> uviedol, \u017ee vo svojich sci-fi knih\u00e1ch sa \u0161peci\u00e1lne venuje modern\u00fdm technol\u00f3gi\u00e1m, ktor\u00e9 dan\u00e1 vl\u00e1da\/\u0161t\u00e1t vn\u00edma ako svoje ohrozenie (po\u010d\u00ednaj\u00fac Gutenbergovou kn\u00edhtla\u010dou a kon\u010diac anonymn\u00fdm Internetom a kryptomenami). V\u0161etky uveden\u00e9 technol\u00f3gie v danej dobe podr\u00fdvali autoritu a moc dan\u00fdch vl\u00e1d, \u010do n\u00e1sledne viedlo ku kriminaliz\u00e1cii uveden\u00fdch technol\u00f3gi\u00ed.<\/p>\n<p align=\"left\">Bohu\u017eia\u013e toto sa od \u010dias stredoveku ve\u013emi nezmenilo \u2013 m\u00e1me tu st\u00e1le legislat\u00edvu, ktor\u00e1 pou\u017e\u00edvanie odpo\u010d\u00favac\u00edch technol\u00f3gi\u00ed (&#8222;ITP&#8220;) be\u017en\u00fdmi ob\u010danmi kriminalizuje a ich vlastnenie a pou\u017e\u00edvanie umo\u017e\u0148uje len \u00fazkej monopolizovanej skupine \u013eud\u00ed maj\u00facich \u201eoporu v z\u00e1kone\u201c.<\/p>\n<p align=\"left\">V nasleduj\u00facom \u010dl\u00e1nku by som r\u00e1d uviedol p\u00e1r d\u00f4le\u017eit\u00fdch argumentov, pre\u010do osobne poklad\u00e1m tento stav legislat\u00edvy za \u00faplne ne\u0161\u0165astn\u00fd a pre\u010do si mysl\u00edm, \u017ee je potrebn\u00e9 celoplo\u0161ne legalizova\u0165 technol\u00f3gie na \u0161pehovanie, nako\u013eko s\u00fa\u010dasn\u00e1 situ\u00e1cia m\u00e1 podstatne negat\u00edvnej\u0161\u00ed dopad na s\u00fakromie ob\u010danov ako keby boli v\u0161etky legalizovan\u00e9.<\/p>\n<h2>Pre\u010do legalizova\u0165 n\u00e1stroje na GSM\/3G odpo\u010d\u00favanie (tzv. IMSI catcher)<\/h2>\n<p><strong>S\u00fa\u010dasn\u00fd stav:<\/strong> Z\u00e1kaz vlastnenia a pou\u017e\u00edvania uveden\u00fdch n\u00e1strojov ob\u010danmi<\/p>\n<p>(ako ITP ich m\u00f4\u017ee pou\u017e\u00edva\u0165 len Slovensk\u00e1 informa\u010dn\u00e1 slu\u017eba, Vojensk\u00e9 spravodajstvo Policajn\u00fd zbor, \u017delezni\u010dn\u00e1 pol\u00edcia, Zbor v\u00e4zenskej a justi\u010dnej str\u00e1\u017ee, Coln\u00e1 spr\u00e1va).<\/p>\n<p><strong>1. Il\u00fazia d\u00f4veryhodnosti a bezpe\u010dnosti mobilnej komunik\u00e1cie.<\/strong><\/p>\n<p>Z\u00e1kaz vlastnenia a predaja n\u00e1strojov na GSM\/3G odpo\u010d\u00favanie vyvol\u00e1va medzi ob\u010danmi falo\u0161n\u00fa il\u00faziu, \u017ee GSM\/3G predstavuje bezpe\u010dn\u00fa hlasov\u00fa komunik\u00e1ciu, ktorej je mo\u017en\u00e9 veri\u0165 a odpo\u010d\u00favanie je ve\u013emi n\u00e1ro\u010dn\u00e9 a technicky mo\u017en\u00e9 iba zo strany \u201eleg\u00e1lnych\u201c \u0161t\u00e1tnych zlo\u017eiek. Ako \u010dlovek, ktor\u00fd sa venuje ochrane digit\u00e1lneho s\u00fakromia, mus\u00edm kon\u0161tatova\u0165, \u017ee ni\u010d z toho nie je pravda.<\/p>\n<p><strong>2. Il\u00fazia, \u017ee n\u00e1strojmi na odpo\u010d\u00favanie disponuje len \u0161t\u00e1t a \u017eiadne s\u00fakromn\u00e9 subjekty.<\/strong><\/p>\n<p>V s\u00fa\u010dasnej dobe je mo\u017en\u00e9 postavi\u0165 IMSI catcher (zariadenie na mobiln\u00e9 odpo\u010d\u00favanie) za menej ako $1500 (viac inform\u00e1ci\u00ed <a href=\"http:\/\/www.wired.com\/2010\/07\/intercepting-cell-phone-calls\/\">Hacker Spoofs Cell Phone Tower to Intercept Calls<\/a> ), existuje viacero sp\u00f4sobov (<a href=\"http:\/\/www.ettus.com\/product\/quick-order\">USRP s pr\u00edslu\u0161n\u00fdmi GSM\/3G daughter boardami<\/a>, <a href=\"http:\/\/www.wired.com\/2010\/07\/intercepting-cell-phone-calls\/\">Hack RF<\/a>, pr\u00edpadne je mo\u017en\u00e9 pou\u017ei\u0165 star\u00e9 telef\u00f3ny <a href=\"https:\/\/opensource.srlabs.de\/projects\/mobile-network-assessment-tools\/wiki\/Tutorial\">Motorola C123 s OsmocomBB<\/a>). Ako softv\u00e9r je mo\u017en\u00e9 pou\u017ei\u0165 napr\u00edklad <a href=\"http:\/\/openbts.org\/\">OpenBTS<\/a> a hovory smerova\u0165 cez \u013eubovo\u013en\u00fa VoIP \u00fastred\u0148u (napr\u00edklad Asterisk).<\/p>\n<p>Od \u013eud\u00ed, ktor\u00ed sa problematike GSM\/3G venuj\u00fa, sa mi podarilo z\u00edska\u0165 cenov\u00fd preh\u013ead komponent na funk\u010dn\u00fd IMSI Catcher:<\/p>\n<table border=\"5\" width=\"597\" cellspacing=\"1\" cellpadding=\"1\">\n<caption>Odhadovan\u00e1 cena komponent IMSI Catcher-a<\/caption>\n<tbody>\n<tr>\n<td><strong>Komponenta IMSI Catcher-u<\/strong><\/td>\n<td><strong>Cena<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Ovl\u00e1dac\u00ed po\u010d\u00edta\u010d<\/td>\n<td>150-400 \u20ac<\/td>\n<\/tr>\n<tr>\n<td>R\u00e1dio: BladeRF<\/td>\n<td>270 \u20ac<\/td>\n<\/tr>\n<tr>\n<td>Alebo R\u00e1dio:USRP B200<\/td>\n<td>760 \u20ac<\/td>\n<\/tr>\n<tr>\n<td>Zosi\u013e\u0148ova\u010d pre ka\u017ed\u00e9 p\u00e1smo 2G, 3G, 4G, LTE<\/td>\n<td>100 \u20ac na ka\u017ed\u00e9 p\u00e1smo<\/td>\n<\/tr>\n<tr>\n<td>Spr\u00e1vne ant\u00e9ny<\/td>\n<td>50 \u20ac<\/td>\n<\/tr>\n<tr>\n<td>Ru\u0161i\u010dk\u00e1 na p\u00e1sma, ktor\u00e9 nebude vedie\u0165 IMSI catcher zachyti\u0165 \/ vysiela\u0165<\/td>\n<td>50 \u20ac (na p\u00e1smo) alebo 150 \u20ac (na \u0161irokop\u00e1smov\u00fa ru\u0161i\u010dku)<\/td>\n<\/tr>\n<tr>\n<td><strong>Odhadovan\u00e1 cena IMSI Catchera<\/strong><\/td>\n<td><strong>600 \u20ac &#8211; 1500 \u20ac<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Pou\u017e\u00edvate\u013eov bezpe\u010dn\u00e9ho 3G je mo\u017en\u00e9 odpo\u010d\u00fava\u0165 tak, \u017ee \u00fato\u010dn\u00edk kompletne zaru\u0161\u00ed 3G p\u00e1smo (tzv. 3G jamming) a don\u00fati ich telef\u00f3ny pripoji\u0165 sa cez menej bezpe\u010dn\u00e9 2G na podvrhnut\u00fa BTS a n\u00e1sledne realizova\u0165 kompletn\u00e9 odpo\u010d\u00favanie hovoru. IMSI catcher je mo\u017en\u00e9 si vysklada\u0165 z plne leg\u00e1lnych komponentov za n\u00edzku cenu. 3G jammer stoj\u00ed r\u00e1dovo p\u00e1r desiatok dol\u00e1rov.<\/p>\n<p>To, \u017ee cena zariaden\u00ed na mobiln\u00e9 odpo\u010d\u00favanie je tak n\u00edzka, znamen\u00e1 dve veci \u2013 \u017ee t\u00ed, ktor\u00ed maj\u00fa potrebu niekoho re\u00e1lne odpo\u010d\u00fava\u0165, si IMSI catcher na \u010diernom trhu ur\u010dite zak\u00fapia nez\u00e1visle od toho, \u010di je vlastnenie a pou\u017e\u00edvanie tohto zariadenia zak\u00e1zan\u00e9 \u0161t\u00e1tom alebo nie. Tu by som podotkol, \u017ee pas\u00edvne odpo\u010d\u00favanie a l\u00e1manie GSM komunik\u00e1cie (tam nepatr\u00ed IMSI catcher, kde ide o MITM \u00fatok) nie je mo\u017en\u00e9 odhali\u0165. Podobne komplikovan\u00e9 je to v pr\u00edpade sofistikovan\u00e9ho IMSI catcheru, ktor\u00fd m\u00f4\u017ee ma\u0165 dostato\u010dne mal\u00fd v\u00fdkon na to, aby si ho niekto v\u0161imol a dok\u00e1\u017ee by\u0165 presne zacielen\u00fd vo\u010di obeti. Tento \u00fatok dok\u00e1\u017ee realizova\u0165 prakticky ktoko\u013evek, kto si uveden\u00e9 zariadenie zak\u00fapi. A to bohu\u017eia\u013e aj vo\u010di ob\u010danom, ktor\u00ed \u017eij\u00fa v il\u00fazii, \u017ee odpo\u010d\u00favanie ich mobiln\u00fdch hovorov je mo\u017en\u00e9 vykona\u0165 len \u201eleg\u00e1lnymi \u0161t\u00e1tnymi in\u0161tit\u00faciami\u201c.<\/p>\n<h2>D\u00f4sledky legaliz\u00e1cie vlastnenia a predaja odpo\u010d\u00favac\u00edch zariaden\u00ed<\/h2>\n<p>1. Zrejme na za\u010diatku n\u00e1rast predaja zariaden\u00ed na mobiln\u00e9 odpo\u010d\u00favanie (na za\u010diatku by za m\u00e1lo pe\u0148az\u00ed ka\u017ed\u00fd chcel odpo\u010d\u00fava\u0165 ka\u017ed\u00e9ho).<\/p>\n<p>2. Obrovsk\u00e1 medializ\u00e1cia, \u017ee je mo\u017en\u00e9 relat\u00edvne jednoducho a lacno odpo\u010d\u00fava\u0165 mobiln\u00fa komunik\u00e1ciu kohoko\u013evek prakticky k\u00fdmko\u013evek. Zv\u00fd\u0161enie bezpe\u010dnostn\u00e9ho povedomia.<\/p>\n<p>V tejto situ\u00e1cii by nastal \u201eokamih pravdy\u201c a re\u00e1lne by sme dozvedeli, \u010di t\u00fdm, ktor\u00ed tvrdia, \u017ee im je jedno, \u010di ich niekto odpo\u010d\u00fava alebo nie, lebo nemaj\u00fa \u201e\u010do\u201c skr\u00fdva\u0165, by bolo skuto\u010dne ukradnut\u00e9, \u017ee ich dok\u00e1\u017ee odpo\u010d\u00fava\u0165 ich sused \u010di \u013eubovo\u013en\u00fd kolega v pr\u00e1ci. Mo\u017eno niektor\u00fdm by na tom skuto\u010dne nez\u00e1le\u017ealo a na\u010falej by pou\u017e\u00edvali doteraj\u0161iu mobiln\u00fa komunik\u00e1ciu. V\u0161etci ostatn\u00ed by ale za\u010dali svoj hlas \/ komunik\u00e1ciu \u0161ifrova\u0165. A nain\u0161talovali by si RedPhone, Signal Private Messenger, k\u00fapili Blackphone, \u010di inak zabezpe\u010dili svoju komunik\u00e1ciu.<\/p>\n<p>3. Zn\u00ed\u017eenie silovej asymetrie medzi \u0161t\u00e1tom a \u013eudmi, ktor\u00ed ileg\u00e1lne vlastnia a pou\u017e\u00edvaj\u00fa odpo\u010d\u00favacie mobiln\u00e9 zariadenia a v\u0161etk\u00fdmi ostatn\u00fdmi ob\u010danmi, ktor\u00ed moment\u00e1lne \u017eij\u00fa v il\u00fazii, \u017ee GSM\/3G hovory s\u00fa bezpe\u010dn\u00e9 a d\u00f4veryhodn\u00e9 odpo\u010d\u00favate\u013en\u00e9 iba \u0161t\u00e1tnymi leg\u00e1lnymi zlo\u017ekami.<\/p>\n<p>V kone\u010dnom d\u00f4sledku legaliz\u00e1cia odpo\u010d\u00favac\u00edch zariaden\u00ed by v\u00fdrazne <strong>nav\u00fd\u0161ila bezpe\u010dnostn\u00e9 povedomie <\/strong><strong>medzi \u013eudmi <\/strong>a don\u00fatila ich celoplo\u0161ne svoje hovory \u0161ifrova\u0165 a chr\u00e1ni\u0165. A ukon\u010dila ich falo\u0161n\u00e9 il\u00fazie o tom, \u017ee ide o bezpe\u010dn\u00fa komunik\u00e1ciu, ku ktorej maj\u00fa pr\u00edstup len \u0161t\u00e1tne leg\u00e1lne zlo\u017eky a nikto in\u00fd.<\/p>\n<p>Tu by som r\u00e1d uviedol anal\u00f3giu &#8211; roz\u0161\u00edrenie a \u013eahk\u00e1 dostupnos\u0165 ve\u013ek\u00e9ho mno\u017estvo open-source sie\u0165ov\u00fdch odpo\u010d\u00favac\u00edch softv\u00e9rov (tzv. \u201esniffers\u201c) (snort, wireshark,&#8230;), pr\u00edpadne n\u00e1strojov na MITM \u00fatoky na ne\u0161ifrovan\u00fa komunik\u00e1ciu (ettercap), sp\u00f4sobilo to, \u017ee na Internete sa celoplo\u0161ne roz\u0161\u00edrili \u0161ifrovan\u00e9 protokoly a implement\u00e1cie (TLS, VPN, SSH) umo\u017e\u0148uj\u00face end-to-end \u0161ifrovan\u00fa komunik\u00e1ciu bez mo\u017enosti ak\u00e9hoko\u013evek odpo\u010d\u00favania.<\/p>\n<p>Ak by si \u0161t\u00e1t uzurpoval v\u00fdhradn\u00e9 pr\u00e1vo pou\u017e\u00edva\u0165 \u201eodpo\u010d\u00favacie sie\u0165ov\u00e9 n\u00e1stroje\u201c a v\u0161etci ostatn\u00ed by ich mali zo z\u00e1kona zak\u00e1zan\u00e9 (s argument\u00e1ciou, \u017ee veri\u0165 sa d\u00e1 len \u0161t\u00e1tu), tak je dos\u0165 mo\u017en\u00e9, \u017ee doteraz pou\u017e\u00edvame ne\u0161ifrovan\u00e9 Internetov\u00e9 protokoly a spoliehame sa na d\u00f4veryhodnos\u0165 a opodstatnenos\u0165 \u201eleg\u00e1lneho odpo\u010d\u00favania\u201c (ked\u017ee by mno\u017estvo \u013eud\u00ed \u017eilo v il\u00fazii, \u017ee v\u010faka z\u00e1konnej legislat\u00edve nikto okrem \u0161t\u00e1tu nedok\u00e1\u017ee ich sie\u0165ov\u00fa komunik\u00e1ciu odpo\u010d\u00fava\u0165, ked\u017ee sniffre s\u00fa predsa z\u00e1konom zak\u00e1zan\u00e9).<\/p>\n<h2>Pre\u010do ponecha\u0165 legaliz\u00e1ciu softv\u00e9rov\u00fdch \u0161pehovac\u00edch n\u00e1strojov<\/h2>\n<p><strong>S\u00fa\u010dasn\u00fd stav: <\/strong>\u0160t\u00e1tne slu\u017eby moment\u00e1lne nem\u00f4\u017eu pou\u017e\u00edva\u0165 softv\u00e9rov\u00e9 \u0161pehovacie n\u00e1stroje ako ITP bez s\u00fadneho pr\u00edkazu. To im ale bude umo\u017e\u0148ova\u0165 nov\u00e1 legislat\u00edva.<\/p>\n<p><strong>1. Uzavretos\u0165 pou\u017e\u00edvate\u013eov \u0161pehovacieho malware-u (ak\u00e1ko\u013evek, napr\u00edklad ich pou\u017e\u00edvanie v\u00fdhradne \u0161t\u00e1tmi, \u010do je tento pr\u00edpad) vedie k nemo\u017enosti sa vo\u010di nemu efekt\u00edvne br\u00e1ni\u0165.<\/strong><\/p>\n<p>Ak FinFisher, Galileo \u010di in\u00fd \u0161pehovac\u00ed softv\u00e9r si m\u00f4\u017eu zak\u00fapi\u0165 v\u00fdhradne len vl\u00e1dy (ako sme svedkami, tak aj tie, ktor\u00e9 s\u00fa totalitn\u00e9), a nie \u017eiadne s\u00fakromne subjekty (napr\u00edklad aktivisti, ktor\u00ed sa venuj\u00fa ochrane digit\u00e1lneho s\u00fakromia, \u010di v\u00fdrobcovia softv\u00e9ru, ktor\u00e9ho zranite\u013enosti dan\u00fd malware vyu\u017e\u00edva), tak je mo\u017en\u00e9, \u017ee sa nikdy nedozvedieme, ak\u00e9 0-day exploity (n\u00e1stroje na 0-day zranite\u013enosti vo\u010di ktor\u00fdm neexistuj\u00fa bezpe\u010dnostn\u00e9 z\u00e1platy) tieto malware softv\u00e9ry pou\u017e\u00edvaj\u00fa. T\u00fdm p\u00e1dom spolo\u010dnosti (Microsoft, Google, Apple a in\u00e9) nedok\u00e1\u017eu publikova\u0165 bezpe\u010dnostn\u00e9 z\u00e1platy na svoje ohrozen\u00e9 zranite\u013en\u00e9 produkty a teda umo\u017eni\u0165 svojim pou\u017e\u00edvate\u013eom \u00fa\u010dinn\u00fa ochranu ich s\u00fakromia.<\/p>\n<p><strong>2. 0-day \u0161pehovac\u00ed malware vytv\u00e1ra v\u00fdrazn\u00fa silov\u00fa asymetriu medzi t\u00fdm, kto \u0161pehuje (\u0161t\u00e1t) a t\u00fdm, kto je \u0161pehovan\u00fd (ob\u010dan).<\/strong><\/p>\n<p>\u0160pehovacie softv\u00e9rov\u00e9 n\u00e1stroje (v na\u0161om z\u00e1konnom pon\u00edman\u00ed u\u017e ITP) vyu\u017e\u00edvaj\u00face 0-day exploity s\u00fa \u010dastokr\u00e1t \u00faplne nedetegovate\u013en\u00e9 antiv\u00edrov\u00fdmi n\u00e1strojmi a ked\u017ee ide o utajen\u00e9 zranite\u013enosti, na uveden\u00e9 exploity neexistuj\u00fa bezpe\u010dnostn\u00e9 z\u00e1platy zo strany v\u00fdrobcov dan\u00e9ho softv\u00e9ru. Pou\u017e\u00edvatelia dan\u00e9ho softv\u00e9ru teda str\u00e1caj\u00fa technick\u00fa mo\u017enos\u0165 sa vo\u010di t\u00fdmto \u0161pehovac\u00edm n\u00e1strojom akoko\u013evek br\u00e1ni\u0165.<\/p>\n<p><strong>3.<\/strong> <strong>Pou\u017eitie softv\u00e9rov\u00e9ho \u0161pehovacia n\u00e1stroja je <\/strong><strong>technicky <\/strong><strong>mo\u017en\u00e9 a \u013eahko realizovate\u013en\u00e9 aj bez s\u00fadneho pr\u00edkazu \u2013 mo\u017enos\u0165 neodhalite\u013en\u00e9ho zneu\u017eitia.<\/strong><\/p>\n<p>To, \u017ee z\u00e1kon bude vy\u017eadova\u0165 platn\u00fd s\u00fadny pr\u00edkaz na nasadenie softv\u00e9rov\u00e9ho \u0161pehovacieho n\u00e1stroja, neznamen\u00e1, \u017ee tajn\u00e9 slu\u017eby o tento pr\u00edkaz skuto\u010dne po\u017eiadaj\u00fa. Obzvl\u00e1\u0161\u0165 v situ\u00e1cii, ke\u010f je prakticky softv\u00e9rovo neodhalite\u013en\u00e9 \u010di dan\u00fd \u0161pehovac\u00ed n\u00e1stroj bol pou\u017eit\u00fd bez s\u00fadneho pr\u00edkazu (nie je pritom nutn\u00e1 ani interakcia viacero os\u00f4b, ked\u017ee ten n\u00e1stroj dok\u00e1\u017ee obsluhova\u0165 jeden \u010dlovek a samotn\u00e9 logy dok\u00e1\u017ee zmaza\u0165).<\/p>\n<p><strong>4. S\u00fa\u010dasn\u00e1 legislat\u00edva zakazuj\u00faca pou\u017eitie softv\u00e9rov\u00e9ho odpo\u010d\u00favacieho prostriedku (ITP) in\u00fdmi subjektami ako s\u00fa \u0161t\u00e1tne, m\u00f4\u017ee kriminalizova\u0165 legit\u00edmne pou\u017e\u00edvanie odpo\u010d\u00favac\u00edch n\u00e1strojov.<\/strong><\/p>\n<p>Pri na\u0161ej pr\u00e1ci (penetra\u010dn\u00e9 testy, bezpe\u010dnostn\u00e9 audity) pou\u017e\u00edvame r\u00f4zne odpo\u010d\u00favacie softv\u00e9ry (Wireshark, Burpsuite, Metasploit, BeEF, Weevely a in\u00e9), ktor\u00e9 maj\u00fa povahu softv\u00e9rov\u00e9ho ITP. R\u00f4zne \u0161pehovacie softv\u00e9ry, ktor\u00e9 maj\u00fa charakter softv\u00e9rov\u00e9ho ITP, vyu\u017e\u00edvame tie\u017e pri obojstranne dohodnutom a legit\u00edmnom soci\u00e1lnom in\u017einierstve (napr\u00edklad simul\u00e1cia phishing \u00fatokov).<\/p>\n<p>Podobne anal\u00fdza malware v antiv\u00edrov\u00fdch spolo\u010dnostiach vyu\u017e\u00edva \u010dastokr\u00e1t prostriedky, ktor\u00e9 maj\u00fa povahu softv\u00e9rov\u00e9ho ITP.<\/p>\n<p>Osobne si viem tie\u017e predstavi\u0165 d\u00f4vody, kedy zamestn\u00e1vate\u013e sa po obojstrannej dohode so svojimi zamestnancami rozhodne nasadi\u0165 odpo\u010d\u00favacie n\u00e1stroje po\u010das v\u00fdkonu ich povolania (v r\u00e1mci zabr\u00e1nenia podvodu, zneu\u017e\u00edvaniu ich pr\u00e1vomoci apod). V\u0161etky tieto odpo\u010d\u00favacie n\u00e1stroje maj\u00fa charakter softv\u00e9rov\u00e9ho ITP.<\/p>\n<p><strong>V\u00e1gna interpret\u00e1cia tohto z\u00e1kona m\u00f4\u017ee vies\u0165 ku kriminaliz\u00e1cii v\u0161etk\u00fdch t\u00fdchto <\/strong><strong>legit\u00edmnych <\/strong><strong>\u010dinnost\u00ed a existen\u010dne ohrozi\u0165 na\u0161u <\/strong><strong>ako aj in\u00e9<\/strong><strong> firm<\/strong><strong>y, <\/strong><strong>ktor\u00e9 \u0161pehovacie n\u00e1stroje pri svojej be\u017enej pr\u00e1ci pou\u017e\u00edvaj\u00fa.<\/strong><\/p>\n<h2>Zhrnutie<\/h2>\n<p>Z\u00e1kon, ktor\u00fd zakazuje vlastnenie a pou\u017e\u00edvanie odpo\u010d\u00favac\u00edch zariaden\u00ed be\u017en\u00fdmi ob\u010danmi a s\u00fa\u010dasne na to privilegizuje \u00fazku skupinu \u013eud\u00ed, vedie k zneu\u017e\u00edvaniu uveden\u00fdch technol\u00f3gi\u00ed (a to nielen zo strany \u0161t\u00e1tu, ale aj \u013eud\u00ed, ktor\u00ed nimi disponuj\u00fa neleg\u00e1lne). Tie\u017e vytv\u00e1ra il\u00faziu bezpe\u010dnosti a d\u00f4veryhodnosti t\u00fdchto technol\u00f3gi\u00ed, v\u010faka \u010domu si ob\u010dania riziko odpo\u010d\u00favania svojej komunik\u00e1cie nedostato\u010dne uvedomuj\u00fa a svoju hlasov\u00fa \u010di in\u00fa komunik\u00e1ciu nijako explicitne ne\u0161ifruj\u00fa.<br \/>\nV\u00e1gna interpret\u00e1cia defin\u00edcie ITP m\u00f4\u017ee tie\u017e vies\u0165 ku kriminaliz\u00e1cii be\u017en\u00fdch \u010dinnost\u00ed s\u00fakromn\u00fdch spolo\u010dnost\u00ed a \u013eud\u00ed, nako\u013eko (ako som uviedol vy\u0161\u0161ie) existuje mno\u017estvo situ\u00e1ci\u00ed, kedy po obojstrannej dohode doch\u00e1dza k legit\u00edmnemu pou\u017eitiu odpo\u010d\u00favac\u00edch technol\u00f3gi\u00ed v s\u00fakromnej sf\u00e9re.<\/p>\n<p>Pr\u00edpad Internetovej sie\u0165ovej bezpe\u010dnosti ukazuje, \u017ee \u013eahk\u00e1 dostupnos\u0165 a pou\u017eite\u013enos\u0165 sie\u0165ov\u00fdch \u0161pehovac\u00edch n\u00e1strojov automaticky viedla k tomu, \u017ee Internetov\u00e1 komunita za\u010dala vyu\u017e\u00edva\u0165 \u0161ifrovan\u00fa komunik\u00e1ciu a dnes si napr\u00edklad bez \u0161ifrovania HTTP protokolu (HTTPS) nevieme predstavi\u0165 ak\u00e9ko\u013evek prehliadanie, kde je potrebn\u00fd vy\u0161\u0161\u00ed stupe\u0148 zabezpe\u010denia.<\/p>\n<p>Poklad\u00e1m preto za ve\u013emi ne\u0161\u0165astn\u00e9, \u017ee nov\u00e1 legislat\u00edva na Slovensku d\u00e1va \u0161t\u00e1tu ve\u013emi siln\u00e9 zbrane a v\u0161etk\u00fdm ostatn\u00fdm ich berie.<\/p>\n<p>A je paradox, \u017ee z\u00e1kon proti odpo\u010d\u00favaniu ohrozuje s\u00fakromie n\u00e1s v\u0161etk\u00fdch.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Koncom augusta 2015 slovensk\u00e1 vl\u00e1da schv\u00e1lila noveliz\u00e1ciu z\u00e1kona o ochrane pred odpo\u010d\u00favan\u00edm (166\/2003). Hne\u010f na za\u010diatku by som r\u00e1d vysvetlil, \u010do je ITP (informa\u010dn\u00fd technick\u00fd prostriedok). V princ\u00edpe ide o ak\u00fdko\u013evek n\u00e1stroj alebo odpo\u010d\u00favac\u00ed prostriedok, ktor\u00fd m\u00f4\u017ee pou\u017e\u00edva\u0165 \u00fazka skupina \u013eud\u00ed (konkr\u00e9tne Slovensk\u00e1 informa\u010dn\u00e1 slu\u017eba, Vojensk\u00e9 spravodajstvo, Policajn\u00fd zbor, \u017delezni\u010dn\u00e1 pol\u00edcia, Zbor v\u00e4zenskej a justi\u010dnej str\u00e1\u017ee, Coln\u00e1 spr\u00e1va \u2013 odstavec 2, paragrafu 2) na &#8222;leg\u00e1lne odpo\u010d\u00favanie&#8220;. Pou\u017eitie alebo vlastnenie ITP v\u0161etk\u00fdmi ostatn\u00fdmi &#8211; fyzick\u00fdmi alebo pr\u00e1vnickymi osobami je kriminalizovan\u00e9.<\/p>\n","protected":false},"author":2,"featured_media":952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[38,37,34,36],"class_list":["post-667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-sk","tag-0-day-exploit","tag-imsi-catcher","tag-it-security","tag-itp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Koncom augusta 2015 slovensk\u00e1 vl\u00e1da schv\u00e1lila noveliz\u00e1ciu z\u00e1kona o ochrane pred odpo\u010d\u00favan\u00edm (166\/2003). Hne\u010f na za\u010diatku by som r\u00e1d vysvetlil, \u010do je ITP (informa\u010dn\u00fd technick\u00fd prostriedok). V princ\u00edpe ide o ak\u00fdko\u013evek n\u00e1stroj alebo odpo\u010d\u00favac\u00ed prostriedok, ktor\u00fd m\u00f4\u017ee pou\u017e\u00edva\u0165 \u00fazka skupina \u013eud\u00ed (konkr\u00e9tne Slovensk\u00e1 informa\u010dn\u00e1 slu\u017eba, Vojensk\u00e9 spravodajstvo, Policajn\u00fd zbor, \u017delezni\u010dn\u00e1 pol\u00edcia, Zbor v\u00e4zenskej a justi\u010dnej str\u00e1\u017ee, Coln\u00e1 spr\u00e1va \u2013 odstavec 2, paragrafu 2) na &quot;leg\u00e1lne odpo\u010d\u00favanie&quot;. Pou\u017eitie alebo vlastnenie ITP v\u0161etk\u00fdmi ostatn\u00fdmi - fyzick\u00fdmi alebo pr\u00e1vnickymi osobami je kriminalizovan\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-09T08:57:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-01-20T13:33:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"886\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov\",\"datePublished\":\"2015-11-09T08:57:53+00:00\",\"dateModified\":\"2016-01-20T13:33:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\"},\"wordCount\":2422,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg\",\"keywords\":[\"0-day exploit\",\"IMSI Catcher\",\"IT security\",\"ITP\"],\"articleSection\":[\"Uncategorized @sk\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\",\"url\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\",\"name\":\"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov - Nethemba\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg\",\"datePublished\":\"2015-11-09T08:57:53+00:00\",\"dateModified\":\"2016-01-20T13:33:33+00:00\",\"author\":{\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage\",\"url\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg\",\"contentUrl\":\"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg\",\"width\":886,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nethemba.com\/sk\/domov\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nethemba.com\/de\/#website\",\"url\":\"https:\/\/nethemba.com\/de\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nethemba.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\/\/www.nethemba.com\/\"],\"url\":\"https:\/\/nethemba.com\/sk\/author\/nethemba-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov - Nethemba","og_description":"Koncom augusta 2015 slovensk\u00e1 vl\u00e1da schv\u00e1lila noveliz\u00e1ciu z\u00e1kona o ochrane pred odpo\u010d\u00favan\u00edm (166\/2003). Hne\u010f na za\u010diatku by som r\u00e1d vysvetlil, \u010do je ITP (informa\u010dn\u00fd technick\u00fd prostriedok). V princ\u00edpe ide o ak\u00fdko\u013evek n\u00e1stroj alebo odpo\u010d\u00favac\u00ed prostriedok, ktor\u00fd m\u00f4\u017ee pou\u017e\u00edva\u0165 \u00fazka skupina \u013eud\u00ed (konkr\u00e9tne Slovensk\u00e1 informa\u010dn\u00e1 slu\u017eba, Vojensk\u00e9 spravodajstvo, Policajn\u00fd zbor, \u017delezni\u010dn\u00e1 pol\u00edcia, Zbor v\u00e4zenskej a justi\u010dnej str\u00e1\u017ee, Coln\u00e1 spr\u00e1va \u2013 odstavec 2, paragrafu 2) na \"leg\u00e1lne odpo\u010d\u00favanie\". Pou\u017eitie alebo vlastnenie ITP v\u0161etk\u00fdmi ostatn\u00fdmi - fyzick\u00fdmi alebo pr\u00e1vnickymi osobami je kriminalizovan\u00e9.","og_url":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2015-11-09T08:57:53+00:00","article_modified_time":"2016-01-20T13:33:33+00:00","og_image":[{"width":886,"height":500,"url":"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg","type":"image\/jpeg"}],"author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Autor":"Pavol Lupt\u00e1k","Predpokladan\u00fd \u010das \u010d\u00edtania":"12 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov","datePublished":"2015-11-09T08:57:53+00:00","dateModified":"2016-01-20T13:33:33+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/"},"wordCount":2422,"commentCount":0,"image":{"@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage"},"thumbnailUrl":"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg","keywords":["0-day exploit","IMSI Catcher","IT security","ITP"],"articleSection":["Uncategorized @sk"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/","url":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/","name":"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage"},"image":{"@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage"},"thumbnailUrl":"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg","datePublished":"2015-11-09T08:57:53+00:00","dateModified":"2016-01-20T13:33:33+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#primaryimage","url":"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg","contentUrl":"https:\/\/nethemba.com\/wp-content\/uploads\/2015\/10\/blog-e1464607960840.jpg","width":886,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/sk\/sk-verzia-pre-zakon-o\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/sk\/domov\/"},{"@type":"ListItem","position":2,"name":"Ako z\u00e1kon o ochrane pred odpo\u010d\u00favan\u00edm ohrozuje s\u00fakromie v\u0161etk\u00fdch ob\u010danov"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/sk\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/comments?post=667"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media\/952"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media?parent=667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/categories?post=667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/tags?post=667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}