{"id":62295,"date":"2025-10-10T14:35:02","date_gmt":"2025-10-10T12:35:02","guid":{"rendered":"https:\/\/www.uccronline.it\/eng\/?p=62295"},"modified":"2025-10-10T14:35:02","modified_gmt":"2025-10-10T12:35:02","slug":"the-good-hackers-of-the-vatican-how-they-protect-the-church","status":"publish","type":"post","link":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/","title":{"rendered":"The Good Hackers of the Vatican: How They Protect the Church"},"content":{"rendered":"<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-129904\" src=\"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp\" alt=\"vatican hackers\" width=\"604\" height=\"317\" \/><\/p>\n<p style=\"text-align: justify;\"><i>The cyber-security expert <strong>Joseph Shenouda<\/strong> tells us about the Vatican Cyber Volunteers. A group of <strong>&#8220;good hackers&#8221;<\/strong> who voluntarily defend the Vatican every day.<\/i><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The <strong>digital Swiss Guards<\/strong> defending the Vatican.<\/p>\n<p style=\"text-align: justify;\">This is how one could define the Vatican&#8217;s <strong>&#8220;good hackers&#8221;<\/strong> who, day and night, stand watch to protect the Holy See on the web.<\/p>\n<p style=\"text-align: justify;\">The group is called <b><mark>Vatican Cyber Volunteers<\/b><\/mark> and has been active since 2022. The name alone makes one thing clear: they are <strong>volunteers<\/strong>.<\/p>\n<p style=\"text-align: justify;\">This is what struck us most when speaking with <mark><strong>Joseph Shenouda<\/strong><\/mark>, a cyber-security expert, founder and coordinator of the Vatican Cyber Volunteers.<\/p\n\n\n\n<p style=\"text-align: justify;\">The Vatican <strong>is the only State in the world<\/strong> protected by hundreds of hackers who act out of faith, shared values, and the importance of the Church in their lives (not all of them are Catholic).<\/p>\n<p>&nbsp;<\/p>\n<h2>The interview with the Vatican Cyber Volunteers<\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <i><b>Dr. Shenouda, the Vatican has already collaborated in the past with ethical hackers; your work, however, has been ongoing since 2022. Can you tell us something about it?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; Yes, in the past the <strong>Vatican<\/strong> had these collaborations which provided a &#8220;point-in-time&#8221; security assessment, valuable but limited.<\/p>\n<p style=\"text-align: justify;\">A test photographs the state of security at that precise moment but <strong>the threat landscape<\/strong> is dynamic and constantly changing.<\/p>\n<p style=\"text-align: justify;\">And the Vatican needs <strong>continuous monitoring<\/strong> across all its digital assets to detect and respond to threats as soon as they emerge.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>Is this what you do then?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; Through a global network of volunteers we provide the equivalent of an <strong>active video surveillance 24 hours a day<\/strong>, 7 days a week. More precisely, we manage a global network of <strong>intelligence<\/strong> for cyber-defense.<\/p>\n<p style=\"text-align: justify;\">In practice we monitor <strong>the entire digital spectrum<\/strong> related to the Vatican: from its public assets and network vulnerabilities, to discussions on the <strong>dark web<\/strong>, darknet forums and the sale of compromised credentials. This constant vigilance is crucial for proactive defense.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>What tools do you use?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; We use <strong>threat intelligence<\/strong> at governmental and international levels, tactics used by groups of <strong>sophisticated hackers<\/strong> that allow us to perform &#8220;threat hunting&#8221;, that is a proactive hunt for threats, looking for <strong>signs of compromise<\/strong> based on the latest information about attackers.<\/p>\n<p>&nbsp;<\/p>\n<h2>The Vatican hackers: all volunteers<\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>You mentioned a network of volunteers<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; We work with <strong>110 volunteers from around the world<\/strong>, all professional experts in the field of cybersecurity, employed by various leading companies in the sector.<\/p>\n<p style=\"text-align: justify;\"><strong>They donate their time<\/strong> and expertise to detect security alerts and potential threats related to the Vatican&#8217;s digital presence.<\/p>\n<p style=\"text-align: justify;\">I act as the <strong>central coordinator<\/strong>, collecting all incoming reports, verifying each finding to ensure its accuracy, and then compiling a detailed report for the Vatican&#8217;s internal IT department.<\/p>\n<p style=\"text-align: justify;\">Our reports include <strong>clear and actionable instructions<\/strong> on how to resolve the identified issue.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>So there is an active collaboration with the Vatican&#8217;s digital security professionals<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; Yes, we consider ourselves <strong>a collaborative partner<\/strong> and a force multiplier for the Vatican&#8217;s internal teams. We provide an external and realistic view of security seen from the perspective of a <strong>potential attacker<\/strong>.<\/p>\n<p style=\"text-align: justify;\">When we started the Vatican&#8217;s infrastructure was <strong>in a difficult state<\/strong>. Thanks to close collaboration, the security issues reported by our volunteers have been continuously addressed and resolved by the internal teams.<\/p>\n<p style=\"text-align: justify;\">The operating model is that of an <strong>external consultancy<\/strong> group.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>Are you all volunteers or does anyone have a contractual arrangement with the Vatican?<\/i><\/b><i><\/i><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; It is on a voluntary basis, <strong>there is no formal contract<\/strong>.<\/p>\n<p style=\"text-align: justify;\">We work remotely and whenever one of our cybersecurity professionals discovers <strong>a security alert<\/strong>, they share it with our group. We then verify, check and report.<\/p>\n<p style=\"text-align: justify;\">With so many volunteers using a wide range of professional tools and threat intelligence platforms, we obtain <strong>a much broader<\/strong> and more complete coverage than a single internal team could manage alone.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>How are volunteers recruited? What criteria do you use to avoid sharing sensitive information about the Vatican&#8217;s digital security?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; We predominantly use <strong>LinkedIn<\/strong>, our page serves as the main hub to attract cybersecurity professionals.<\/p>\n<p style=\"text-align: justify;\">Candidate verification is a fundamental part and I use my background in <strong>threat intelligence<\/strong>. However, the most important security measure is the operational structure itself: the information flow is designed to be <strong>one-way<\/strong>, thus minimizing risks.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>Which channels do you use to communicate among yourselves?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; Individual reports occur through a secure end-to-end encrypted channel like <strong>Signal<\/strong>. After it has been verified and used, <strong>the chat is deleted<\/strong> and we produce a complete report that we deliver to the Vatican&#8217;s IT department.<\/p>\n<p style=\"text-align: justify;\">This compartmentalized approach, based on the principle of <strong>&#8220;need-to-know&#8221;<\/strong> (access limited to strictly necessary information), ensures that no volunteer has <strong>a comprehensive view<\/strong> of the Vatican&#8217;s security status and that sensitive information is never shared with the group.<\/p>\n<p style=\"text-align: justify;\">They provide raw data and we provide <strong>processed intelligence<\/strong> to the Vatican.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>Are the volunteers all Catholic hackers?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; It is a <strong>heterogeneous<\/strong> group. Although some volunteers are Catholic, about half of our members come from <strong>other Christian denominations<\/strong> or different faiths.<\/p>\n<p style=\"text-align: justify;\">The unifying factor is not a specific religion, but the shared desire to contribute their skills <strong>for a good cause<\/strong> and to protect an institution of historical importance.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-129904\" src=\"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/Vatican-Cyber-Volunteers.webp\" alt=\"hacker vaticano\" width=\"604\" height=\"317\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>What Attacks Does the Vatican Face<\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>Can you give a concrete example of a cyberattack against the Vatican that you have handled?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; Recently, we discovered and reported a computer on a network affiliated with the Vatican configured as an <strong>&#8220;open proxy&#8221;<\/strong>. Anyone on the Internet could use it to hide their online activity for illicit purposes, making it appear as if the traffic was coming from the Vatican.<\/p>\n<p style=\"text-align: justify;\">Following recent geopolitical events, we also detected activity from malicious actors presumably <strong>based in Iran<\/strong>, who were planning retaliatory cyberattacks against Western religious organizations.<\/p>\n<p style=\"text-align: justify;\">Another case involved the hacking of the <strong>Augustinian Order\u2019s<\/strong> website, which has ties to the Pope. The attackers had inserted links redirecting visitors to <strong>a pornographic website<\/strong> \u2014 a clear act of reputational damage.<\/p>\n<p style=\"text-align: justify;\">We often discover databases and login credentials related to Vatican entities for sale <strong>on dark web marketplaces<\/strong> and hacker forums. Our timely reporting allows the owners to change their passwords. Every day brings new discoveries.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>What are the most important Vatican assets that have been digitized? Thinking of the Vatican, one might expect a lot of paper and still little digitalization.<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; That\u2019s an excellent question, as it highlights an important distinction in our mission. Our primary focus <strong>is not on the process of digitalization<\/strong> itself, but rather on the <strong>cybersecurity<\/strong> of the Vatican\u2019s existing and future digital infrastructure. These are two distinct, though related, fields.<\/p>\n<p style=\"text-align: justify;\">We protect <strong>the entire digital footprint<\/strong> of the Vatican \u2014 from publicly accessible websites and communication systems to internal networks and data archives \u2014 ensuring confidentiality, integrity, and availability of all currently digitized assets.<\/p>\n<p>&nbsp;<\/p>\n<h2>Why Defend the Vatican for Free?<\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>One last question: this is a job that requires time and professional effort \u2014 why do you do it?<\/i><\/b><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; My motivation stems from <strong>a sense of duty<\/strong> and a proactive desire to help.<\/p>\n<p style=\"text-align: justify;\">In <strong>2022<\/strong>, my professional assessment indicated that the Vatican\u2019s external digital posture had considerable room for improvement. I tried to contact them through official channels to offer my assistance, <strong>but I received no response<\/strong>.<\/p>\n<p style=\"text-align: justify;\">However, action was necessary, so I <strong>took the initiative<\/strong> to create this <strong>&#8220;digital shield&#8221;<\/strong> to proactively identify and report vulnerabilities. Over time, by consistently demonstrating the value and reliability of our work, that initial effort evolved into <strong>a relationship of trust<\/strong> and productive collaboration with the Vatican.<\/p>\n<p style=\"text-align: justify;\">I do this work free of charge because I believe in the mission. It\u2019s a way for me to use my specific expertise to protect <strong>an institution that is important to me<\/strong> and to millions of other people.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">QUESTION &#8211; <b><i>What do you expect from the future of this collaboration?<\/i><\/b><i><\/i><\/p>\n<p style=\"text-align: justify;\">ANSWER &#8211; I will continue this work as long as I can, but my hope is to see the Vatican give <strong>priority to cybersecurity<\/strong> as a central institutional function. This voluntary effort is, I hope, a catalyst toward that long-term goal.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h2><strong>Read<\/strong> all the other <u><em><mark><strong><a href=\"https:\/\/www.uccronline.it\/eng\/the-uccr-interviews\/\" target=\"_blank\" rel=\"noopener\">&#8220;Friday Interviews&#8221;<\/a><\/strong><\/mark><\/em><\/u><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d<\/p>\n","protected":false},"author":1,"featured_media":62296,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":157,"footnotes":""},"categories":[1508,2],"tags":[2027,2029,2026,2025,2028],"class_list":["post-62295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interviews","category-news","tag-joseph-shenouda","tag-vatican-cyber-volunteers","tag-vatican-cybersecurity","tag-vatican-hacker","tag-vatican-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Good Hackers of the Vatican: How They Protect the Church - UCCR<\/title>\n<meta name=\"description\" content=\"Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Good Hackers of the Vatican: How They Protect the Church - UCCR\" \/>\n<meta property=\"og:description\" content=\"Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/\" \/>\n<meta property=\"og:site_name\" content=\"UCCR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uccronlineng\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-10T12:35:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/\",\"url\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/\",\"name\":\"The Good Hackers of the Vatican: How They Protect the Church - UCCR\",\"isPartOf\":{\"@id\":\"https:\/\/www.uccronline.it\/eng\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp\",\"datePublished\":\"2025-10-10T12:35:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.uccronline.it\/eng\/#\/schema\/person\/266504740f79258d3ff1428b591e842a\"},\"description\":\"Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#primaryimage\",\"url\":\"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp\",\"contentUrl\":\"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp\",\"width\":1200,\"height\":630,\"caption\":\"vatican hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uccronline.it\/eng\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Good Hackers of the Vatican: How They Protect the Church\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uccronline.it\/eng\/#website\",\"url\":\"https:\/\/www.uccronline.it\/eng\/\",\"name\":\"UCCR\",\"description\":\"Union of Catholic Christian Rationalists\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uccronline.it\/eng\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.uccronline.it\/eng\/#\/schema\/person\/266504740f79258d3ff1428b591e842a\",\"name\":\"webmaster\",\"url\":\"https:\/\/www.uccronline.it\/eng\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Good Hackers of the Vatican: How They Protect the Church - UCCR","description":"Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/","og_locale":"en_US","og_type":"article","og_title":"The Good Hackers of the Vatican: How They Protect the Church - UCCR","og_description":"Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d","og_url":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/","og_site_name":"UCCR","article_publisher":"https:\/\/www.facebook.com\/uccronlineng\/","article_published_time":"2025-10-10T12:35:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp","type":"image\/webp"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/","url":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/","name":"The Good Hackers of the Vatican: How They Protect the Church - UCCR","isPartOf":{"@id":"https:\/\/www.uccronline.it\/eng\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#primaryimage"},"image":{"@id":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp","datePublished":"2025-10-10T12:35:02+00:00","author":{"@id":"https:\/\/www.uccronline.it\/eng\/#\/schema\/person\/266504740f79258d3ff1428b591e842a"},"description":"Interview with Joseph Shenouda, cybersecurity expert and coordinator of the Vatican Cyber Volunteers, the Vatican\u2019s \u201cgood hackers.\u201d","breadcrumb":{"@id":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#primaryimage","url":"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp","contentUrl":"https:\/\/www.uccronline.it\/eng\/wp-content\/uploads\/2025\/10\/hacker_vaticano.webp","width":1200,"height":630,"caption":"vatican hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.uccronline.it\/eng\/2025\/10\/10\/the-good-hackers-of-the-vatican-how-they-protect-the-church\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uccronline.it\/eng\/"},{"@type":"ListItem","position":2,"name":"The Good Hackers of the Vatican: How They Protect the Church"}]},{"@type":"WebSite","@id":"https:\/\/www.uccronline.it\/eng\/#website","url":"https:\/\/www.uccronline.it\/eng\/","name":"UCCR","description":"Union of Catholic Christian Rationalists","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uccronline.it\/eng\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.uccronline.it\/eng\/#\/schema\/person\/266504740f79258d3ff1428b591e842a","name":"webmaster","url":"https:\/\/www.uccronline.it\/eng\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/posts\/62295"}],"collection":[{"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/comments?post=62295"}],"version-history":[{"count":2,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/posts\/62295\/revisions"}],"predecessor-version":[{"id":62299,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/posts\/62295\/revisions\/62299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/media\/62296"}],"wp:attachment":[{"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/media?parent=62295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/categories?post=62295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uccronline.it\/eng\/wp-json\/wp\/v2\/tags?post=62295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}