[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-what-is-privacy-by-design":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":95,"popular_news":162,"categories":232},{"title":72,"description":73,"meta_title":72,"meta_description":73,"meta_keywords":74,"text":75,"slug":76,"created_at":77,"publish_at":78,"formatted_created_at":79,"category_id":50,"links":80,"view_type":84,"video_url":82,"views":85,"likes":86,"lang":87,"comments_count":88,"category":89},"What is Privacy by Design?","The goal is to build inherently privacy-friendly products and protect individuals’ rights.","Privacy by Design, security","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>\u003Ca href=\"https://quasa.io/media/privacy-ecommerce-trends-to-watch-for-in-the-coming-decade\">\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttt-15.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"149\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttt-15.jpeg\" width=\"300\" / alt=\"What is Privacy by Design?\" loading=\"lazy\">\u003C/picture>Privacy\u003C/a> is a fundamental human right, but with the ever-increasing amount of data being collected and processed by organizations, ensuring that privacy is built into every aspect of product design and development is more important than ever. This is where the concept of&nbsp;data privacy and security tools&nbsp;comes in.\u003C/p>\n\n\u003Cp>Privacy by Design is an approach to designing products, services, and systems that prioritize privacy as a core principle. It ensures that privacy is considered at every stage of the design process, from the initial concept to the final product.\u003C/p>\n\n\u003Cp>The goal is to build inherently privacy-friendly products and protect individuals&rsquo; rights.\u003C/p>\n\n\u003Ch3>The Privacy by Design Framework Seven Foundational Principles\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttt-16.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttt-16.jpeg\" width=\"300\" / alt=\"What is Privacy by Design?\" loading=\"lazy\">\u003C/picture>At its core, Privacy by Design is built on seven foundational principles. These&nbsp;\u003Ca href=\"https://en.wikipedia.org/wiki/Privacy_by_design#History_and_background\">principles were first outlined by Dr. Ann Cavoukian\u003C/a>, the former Information and Privacy Commissioner of Ontario, and have since been widely adopted as the standard for Privacy by Design.\u003C/p>\n\n\u003Ch3>1. Proactive, not Reactive\u003C/h3>\n\n\u003Cp>The first principle of Privacy by Design is that privacy should be built into products from the very beginning. This means that privacy should not be an afterthought or something added as an after-the-fact measure. Instead, it should be part of the initial design process and should be considered in every decision.\u003C/p>\n\n\u003Ch3>2. Privacy as the Default Setting\u003C/h3>\n\n\u003Cp>The second principle is that privacy should be the default setting for products and services. This means that, by default, products should be designed to protect privacy, and users should not have to take any additional steps to protect their privacy. This could include things like automatically anonymizing data,&nbsp;limiting data&nbsp;collection to only what is necessary, and giving users control over their data.\u003C/p>\n\n\u003Ch3>3. Privacy Embedded into Design\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttt-17.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"117\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttt-17.jpeg\" width=\"300\" / alt=\"What is Privacy by Design?\" loading=\"lazy\">\u003C/picture>The third principle is that privacy should be embedded into the design of products and services. This means that privacy should not be a separate feature or add-on but should be an integral part of the design process. This could include things like using strong encryption, limiting access to data, and building privacy-enhancing technologies.\u003C/p>\n\n\u003Ch3>4. Positive-Sum\u003C/h3>\n\n\u003Cp>The fourth principle is that privacy should not come at the expense of functionality. Products should be designed in a way that both protects privacy and provides full functionality to users. This means that privacy should not be seen as a trade-off but rather as a positive-sum game where both privacy and functionality can be maximized.\u003C/p>\n\n\u003Ch3>5. End-to-End Lifecycle Protection\u003C/h3>\n\n\u003Cp>The fifth principle is that privacy and security should be built throughout the entire lifecycle of a product or service. This includes things like secure data storage, secure data transfer, and secure data destruction. The goal is to ensure that privacy is protected at every stage of the product life cycle.\u003C/p>\n\n\u003Ch3>6. Visibility and Transparency\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttt-18.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"158\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttt-18.jpeg\" width=\"300\" / alt=\"What is Privacy by Design?\" loading=\"lazy\">\u003C/picture>The sixth principle is that privacy should be transparent and visible to users. This means that users should be informed about how their data is being collected, used, and shared and should have control over their data. This could include things like providing clear privacy policies, giving users the ability to opt in or opt out of data collection, and providing users with access to their data.\u003C/p>\n\n\u003Ch3>7. User-Centric\u003C/h3>\n\n\u003Cp>The seventh and final principle is that products should be designed with respect for user privacy. This means that products should be designed with the user in mind and should prioritize the protection of their privacy. This could include things like minimizing data collection, providing users with the ability to delete their data, and ensuring that data is only used for the purposes for which it was collected.\u003C/p>\n\n\u003Ch3>Why is Privacy by Design Important?\u003C/h3>\n\n\u003Cp>Here are reasons why it&rsquo;s important to directly embed privacy by design best practices into your organization:Compliance with regulations\u003C/p>\n\n\u003Cp>Privacy regulations such as&nbsp;\u003Ca href=\"https://gdpr-info.eu/\">GDPR\u003C/a>, CCPA, and HIPAA require organizations to implement privacy by design principles. By embedding privacy-by-design best practices into your organization, you can ensure that you comply with these regulations, avoid costly fines, and protect your company&rsquo;s reputation.\u003C/p>\n\n\u003Ch3>Improved Customer Trust\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttt-20.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"156\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttt-20.png\" width=\"300\" / alt=\"What is Privacy by Design?\" loading=\"lazy\">\u003C/picture>Privacy by design principles emphasizes transparency, consent, and control. By incorporating these principles into your organization, you demonstrate to your customers that you value their privacy and are committed to protecting their personal data. This can lead to increased customer trust, loyalty, and business growth.\u003C/p>\n\n\u003Ch3>Reduced Risk of Data Breaches\u003C/h3>\n\n\u003Cp>It emphasizes data minimization, meaning that only the necessary data is collected, processed, and stored. This reduces the risk of a data breach and limits the potential harm caused by a breach. By embedding privacy by-design best practices into your organization, you can help to mitigate the risk of a data breach and protect your company&rsquo;s valuable data assets.\u003C/p>\n\n\u003Ch3>Cost Savings\u003C/h3>\n\n\u003Cp>Embedding privacy by design into your organization can actually save you money in the long run. By implementing data protection measures from the outset, you can avoid costly data breaches, fines, and legal fees. Additionally, by minimizing data collection, you can reduce the costs associated with data storage and maintenance.\u003C/p>\n\n\u003Ch3>Competitive Advantage\u003C/h3>\n\n\u003Cp>Finally, embedding privacy by design best practices into your organization can give you a competitive advantage. As privacy concerns continue to grow, customers are becoming more discerning about which companies they trust with their personal data. By prioritizing privacy, you can differentiate yourself from competitors and attract customers who value privacy and data protection.\u003C/p>\n\n\u003Ch3>Conclusion\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-19/ttttttt-22.webp\" type=\"image/webp\">\u003Cimg class=\"image-align-left\" height=\"157\" src=\"https://cdn.quasa.io/photos/foto-19/ttttttt-22.png\" width=\"300\" / alt=\"What is Privacy by Design?\" loading=\"lazy\">\u003C/picture>In today&rsquo;s digital age, data privacy has become an increasingly important concern for individuals,&nbsp;businesses, and governments alike. As organizations collect and process more personal data than ever before, the need for privacy by design best practices has never been greater. By embedding these practices directly into your organization, you can help ensure that data privacy is considered from the very beginning of any project or initiative rather than being an afterthought. This can help you avoid costly data breaches, maintain customer trust, and stay compliant with regulations such as the GDPR and CCPA.\u003C/p>\n\n\u003Cp>Additionally, incorporating privacy by design can demonstrate your commitment to data protection, which can be a competitive advantage in today&rsquo;s market. Embedding privacy by design best practices is essential for any organization that wants to build a strong reputation for data security and privacy while delivering value to its customers and stakeholders.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social media!\u003Cbr />\nSee you!\u003C/p>","what-is-privacy-by-design","2024-01-13T10:11:54.000000Z","2024-01-13T11:00:00.000000Z","13.01.2024",{"image":81,"image_webp":82,"thumb":83,"thumb_webp":83},"https://cdn.quasa.io/images/news/i6aQdA8WTDqDjg8eBkdGvdd8ukuHU0wdlGQlTttW.webp",null,"https://cdn.quasa.io/thumbs/news-thumb/images/news/i6aQdA8WTDqDjg8eBkdGvdd8ukuHU0wdlGQlTttW.webp","large",2606,5,"en",0,{"id":50,"title":51,"slug":52,"meta_title":90,"meta_description":91,"meta_keywords":92,"deleted_at":82,"created_at":93,"updated_at":94,"lang":87},"Quasa media blog on growth hacking in Security and Protection","Trends and forecasts. Facts and incredible life hacks in Quasa Media about security and protection.","Security and protection, hacker, hackers, hacking, technology, cybersecurity","2022-04-17T21:18:28.000000Z","2024-08-25T15:38:18.000000Z",[96,112,125,138,150],{"title":97,"description":98,"slug":99,"created_at":100,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":82,"views":110,"likes":88,"lang":87,"comments_count":88,"is_pinned":111},"Twitter Dev Builds “Stukach-Claw” — An AI Snitch Bot That’s Already Reported 4,250 People to the IRS for Tax Jokes","A crypto trader and developer known as @camolNFT has gone viral after revealing he built an autonomous AI agent called OpenClaw (affectionately dubbed Stukach-Claw by Russian-speaking users) that actively hunts for “jokes” about tax evasion on social media and automatically files whistleblower reports with the IRS.","twitter-dev-builds-stukach-claw-an-ai-snitch-bot-that-s-already-reported-4-250-people-to-the-irs-for-tax-jokes","2026-04-17T12:09:57.000000Z","2026-04-20T06:06:00.000000Z","20.04.2026",{"title":19,"slug":20},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.jpg","https://cdn.quasa.io/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Bknfo3h65dH5eqJ5coCdgVsAxMYJsDIOPyZplmaX.webp","small",12,false,{"title":113,"description":114,"slug":115,"created_at":116,"publish_at":117,"formatted_created_at":102,"category":118,"links":119,"view_type":109,"video_url":82,"views":124,"likes":88,"lang":87,"comments_count":88,"is_pinned":111},"Baidu Drops ERNIE-Image: A Compact 8B Open-Source Text-to-Image Model That Tops the Charts","Baidu has just released ERNIE-Image — a new open-weight text-to-image generator that is already turning heads in the AI community.","baidu-drops-ernie-image-a-compact-8b-open-source-text-to-image-model-that-tops-the-charts","2026-04-17T11:57:35.000000Z","2026-04-20T03:44:00.000000Z",{"title":47,"slug":48},{"image":120,"image_webp":121,"thumb":122,"thumb_webp":123},"https://cdn.quasa.io/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.jpg","https://cdn.quasa.io/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/1QiOJcmqi34aQvnRfCwi97GmGUD4JPEukbjf4csU.webp",25,{"title":126,"description":127,"slug":128,"created_at":129,"publish_at":129,"formatted_created_at":130,"category":131,"links":132,"view_type":109,"video_url":82,"views":137,"likes":88,"lang":87,"comments_count":88,"is_pinned":111},"Cloudflare Just Made Email a First-Class Citizen for AI Agents — And Traditional Email Services Are Feeling It","On April 17, 2026, Cloudflare quietly turned a long-standing dream into reality: it moved Email Service into public beta and added full Email Sending alongside the years-old Email Routing.","cloudflare-just-made-email-a-first-class-citizen-for-ai-agents-and-traditional-email-services-are-feeling-it","2026-04-19T18:41:05.000000Z","19.04.2026",{"title":43,"slug":44},{"image":133,"image_webp":134,"thumb":135,"thumb_webp":136},"https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/BL8rqDdPh380Xfk5TP00aXBFWdOVXI5BUQ1TuSaC.webp",75,{"title":139,"description":140,"slug":141,"created_at":142,"publish_at":142,"formatted_created_at":130,"category":143,"links":144,"view_type":109,"video_url":82,"views":149,"likes":88,"lang":87,"comments_count":88,"is_pinned":111},"Mozilla Nails It: Thunderbolt Brings “ChatGPT at Home” to the Enterprise — Without Vendor Lock-In","While OpenAI and Anthropic race to sell their proprietary AI platforms to big corporations, Mozilla’s subsidiary MZLA Technologies has taken a very different route.","mozilla-nails-it-thunderbolt-brings-chatgpt-at-home-to-the-enterprise-without-vendor-lock-in","2026-04-19T15:37:27.000000Z",{"title":58,"slug":63},{"image":145,"image_webp":146,"thumb":147,"thumb_webp":148},"https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/qaAODXSpJy6qpJc0eO9DQ2Y6ccJR1tlL5i3mN0kV.webp",91,{"title":151,"description":152,"slug":153,"created_at":154,"publish_at":154,"formatted_created_at":130,"category":155,"links":156,"view_type":109,"video_url":82,"views":161,"likes":88,"lang":87,"comments_count":88,"is_pinned":111},"X Is Finally Cracking Down on Unlabeled Ads — And It’s Personal","For years, X (formerly Twitter) has been a playground for undisclosed promotions, coordinated spam networks, and “native” advertising that masquerades as organic content.","x-is-finally-cracking-down-on-unlabeled-ads-and-it-s-personal","2026-04-19T15:07:48.000000Z",{"title":65,"slug":66},{"image":157,"image_webp":158,"thumb":159,"thumb_webp":160},"https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/CQJ1gdssFGyJpfhfmRU2X4WT5fk5Boc8APXsjWX6.webp",92,[163,176,191,203,218],{"title":164,"description":165,"slug":166,"created_at":167,"publish_at":168,"formatted_created_at":169,"category":170,"links":171,"view_type":109,"video_url":82,"views":174,"likes":175,"lang":87,"comments_count":88,"is_pinned":111},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":172,"image_webp":82,"thumb":173,"thumb_webp":173},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70889,2,{"title":177,"description":178,"slug":179,"created_at":180,"publish_at":181,"formatted_created_at":182,"category":183,"links":184,"view_type":84,"video_url":82,"views":189,"likes":190,"lang":87,"comments_count":88,"is_pinned":111},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":185,"image_webp":186,"thumb":187,"thumb_webp":188},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70654,4,{"title":192,"description":193,"slug":194,"created_at":195,"publish_at":196,"formatted_created_at":197,"category":198,"links":199,"view_type":109,"video_url":82,"views":202,"likes":190,"lang":87,"comments_count":88,"is_pinned":111},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":200,"image_webp":82,"thumb":201,"thumb_webp":201},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68284,{"title":204,"description":205,"slug":206,"created_at":207,"publish_at":208,"formatted_created_at":209,"category":210,"links":211,"view_type":109,"video_url":82,"views":216,"likes":175,"lang":87,"comments_count":217,"is_pinned":111},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":212,"image_webp":213,"thumb":214,"thumb_webp":215},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42255,1,{"title":219,"description":220,"slug":221,"created_at":222,"publish_at":223,"formatted_created_at":224,"category":225,"links":226,"view_type":84,"video_url":82,"views":231,"likes":175,"lang":87,"comments_count":88,"is_pinned":111},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":227,"image_webp":228,"thumb":229,"thumb_webp":230},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41349,[233,234,235,236,237,238,239,240,241,242,243,244,245],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]