{"id":11634,"date":"2022-11-01T17:05:14","date_gmt":"2022-11-01T17:05:14","guid":{"rendered":"https:\/\/movielabs.com\/?p=11634"},"modified":"2023-06-14T05:01:18","modified_gmt":"2023-06-14T05:01:18","slug":"can-i-trust-you","status":"publish","type":"post","link":"https:\/\/movielabs.com\/can-i-trust-you\/","title":{"rendered":"Can I Trust You?"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.11.4″ _module_preset=”default” custom_margin=”||||false|false” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.11.4″ _module_preset=”default” custom_margin=”||||false|false” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.11.4″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_text ul_item_indent=”50px” ol_position=”outside” ol_item_indent=”50px” _builder_version=”4.11.4″ _module_preset=”default” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||||false|false” custom_padding=”||||false|false” global_colors_info=”{}”]<\/p>\n

Trust<\/h1>\n

CSAP (the Common Security Architecture for Production<\/a>) is a Zero Trust architecture but to understand zero-trust, we must first have a common understanding of what \u201ctrust\u201d means. OK, so if we take the phrase \u201czero-trust\u201d and stop there, we don\u2019t need to understand what trust means because we don\u2019t even have it – but that approach doesn\u2019t get us anywhere. \u201cZero-trust security\u201d means not trusting anything until it has been verified as something trustable and that seems like a better place to start.<\/p>\n

Mayer, Davis, and Schoorman (1995) define trust as \u201cthe willingness of a party to be vulnerable to the actions of another party based on the expectation that the other party will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party.\u201d This is an excellent definition for our purposes because it hints at the consequences of trusting something that is not trustworthy.<\/p>\n

In a debate on a security forum recently, one contributor was claiming that zero-trust is a paradox. The argument being you can\u2019t know with absolute certainty that you can trust something. That\u2019s true but then again, quantum mechanics says you can\u2019t know with absolute certainty what state matter is in, but we don\u2019t need to let either get in our way, unless we are planning to feed Schr\u00f6dinger’s cat.<\/p>\n

[\/et_pb_text][et_pb_text ul_item_indent=”50px” ol_position=”outside” ol_item_indent=”50px” _builder_version=”4.11.4″ _module_preset=”default” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||||false|false” custom_padding=”||||false|false” global_colors_info=”{}”]<\/p>\n

\u00a0Building Trust Relationships<\/h1>\n

To trust something, we need a trust relationship. There are two factors in creating a trust relationship.<\/p>\n

    \n
  1. Determining whether something can be trusted<\/li>\n
  2. Determining whether something claiming to be a trusted entity is indeed that entity and not an impostor<\/li>\n<\/ol>\n

    The first of these is a decision, and decision may not be the right word because ideally it should be reassessed continuously, based on factors that vary from one person to another, from one organization to another, from one situation to another, and it all comes down to risk assessment. As in Meyer, et al., the definition of trust is in the eye of the beholder.<\/p>\n

    Whether formally or unconsciously, risk assessment happens all the time. A threshold is set, factors evaluated, and a decision is made whether it\u2019s above or below the threshold. That doesn\u2019t mean it has to be done with a spreadsheet \u2014 we do it in the first second when we meet someone for the first time and whenever we get in our cars, we are subconsciously making a risk assessments like \u201cit was fine last time I drove it.\u201d<\/p>\n

    Determining whether an entity can be trusted is outside of the scope of CSAP<\/a>, but the determination must be made. In cybersecurity, we need to be more formal. We decide to trust a server because of its endpoint security and the knowledge that all CVEs have been patched. We do that regardless of the security model.<\/p>\n

    The second of the two factors is the fundamental role of identity management. It is the thing that makes zero-trust work, and zero-trust means eschewing implicit trust. For example, implicit trust means trusting a device because of the network port or the VPN it is connected through. Explicit trust means not trusting a trusted user\u2019s device unless it has been authenticated as the trusted device it purports to be.<\/p>\n

    Since trust is central to any zero-trust architecture, including CSAP, robust identity management is a prerequisite.<\/p>\n

    [\/et_pb_text][et_pb_text ul_item_indent=”50px” ol_position=”outside” ol_item_indent=”50px” _builder_version=”4.11.4″ _module_preset=”default” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||||false|false” custom_padding=”||||false|false” global_colors_info=”{}”]<\/p>\n

    Trust and Authorization<\/h1>\n

    If I say I trust you, I probably don\u2019t mean I trust you to do everything. I might trust a cardiac surgeon to perform heart surgery (and would want to before they picked up a scalpel in my vicinity), but that doesn\u2019t mean I\u2019m going to trust them to do brain surgery on me. Trust has boundaries.[\/et_pb_text][et_pb_divider show_divider=”off” _builder_version=”4.11.4″ _module_preset=”default” locked=”off” global_colors_info=”{}”][\/et_pb_divider][et_pb_image src=”https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/trust_boundary.png” alt=”trust boundary” title_text=”trust boundary” align=”center” _builder_version=”4.11.4″ _module_preset=”default” locked=”off” global_colors_info=”{}”][\/et_pb_image][et_pb_text ul_item_indent=”50px” ol_position=”outside” ol_item_indent=”50px” _builder_version=”4.11.4″ _module_preset=”default” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||||false|false” custom_padding=”||||false|false” global_colors_info=”{}”]<\/p>\n

    A trust boundary<\/em><\/p>\n

    [\/et_pb_text][et_pb_divider show_divider=”off” _builder_version=”4.11.4″ _module_preset=”default” locked=”off” global_colors_info=”{}”][\/et_pb_divider][et_pb_text ul_item_indent=”50px” ol_position=”outside” ol_item_indent=”50px” _builder_version=”4.11.4″ _module_preset=”default” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||||false|false” custom_padding=”||||false|false” global_colors_info=”{}”]<\/p>\n

    In CSAP, trust boundaries are set by authorization. I verify you are the cardiac surgeon you claim to be (authentication) and I\u2019m going to let you do my heart surgery (authorization). Brain surgery falls under deny by default.<\/p>\n

    So, we now have three factors:<\/p>\n

      \n
    1. Determining whether something can be trusted<\/li>\n
    2. Determining whether something claiming to be a trusted entity is indeed that entity and not an impostor<\/li>\n
    3. Determining whether the trusted entity is permitted to do what it\u2019s just asked to do.<\/li>\n<\/ol>\n

      In CSAP terms, the first factor is part of the determination of whether something is to be included in workflows. Can a user contribute something to the workflow and have references been checked before they were hired?<\/p>\n

      When it comes to systems, it is the role of the same security tools we use today. For example, endpoint security is installed on a server, have all relevant CVEs been patched, etc.<\/p>\n

      The second factor is the role of the CSAP authentication<\/em> service which uses some combination of identity management and certificate authorities.<\/p>\n

      The third factor is the role of the CSAP authorization<\/em> service. Here, the question that must be answered is: how does the authorization service know what to authorize? After all, CSAP is deny-by-default and nothing useful is going to get done unless something is authorized. CSAP supports a wide range of options. At its simplest, authorization is created manually, isn\u2019t very granular and lasts for a long time.<\/p>\n

      But CSAP is workflow-driven security, and its authorization rules can be created in response to requests from the workflow management. After all, what thing better knows what should be authorized in a part of the workflow than the entity that is determining what should be done in that part of the workflow? CSAP\u2019s authorization rules can be as granular and specific as is required and can be supported by the implementation of workflow management and CSAP components. Trust me.<\/p>\n

      [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

      Building Trust in Secure Systems<\/p>\n","protected":false},"author":13,"featured_media":11635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section fb_built=\"1\" _builder_version=\"4.11.4\" _module_preset=\"default\" da_disable_devices=\"off|off|off\" global_colors_info=\"{}\" da_is_popup=\"off\" da_exit_intent=\"off\" da_has_close=\"on\" da_alt_close=\"off\" da_dark_close=\"off\" da_not_modal=\"on\" da_is_singular=\"off\" da_with_loader=\"off\" da_has_shadow=\"on\"][et_pb_row _builder_version=\"4.11.4\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.11.4\" _module_preset=\"default\" pac_dcm_carousel_specific_module_num=\"0\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.11.4\" _module_preset=\"default\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" global_colors_info=\"{}\"]Clear communication is critical to the content creation process. And while today\u2019s productions somehow manage to compensate for inefficient communication mechanisms, there is a growing and urgent need to streamline the way we communicate and exchange information as we continue to scale up to meet the increasing demand for content. \u00a0In our blog \"Cloud. Work. Flows\"<\/a>, we identified some missing components that are required to enable software defined workflows. We highlighted that a more efficient messaging system will be critical to improve communication between participants (which could be people or machines) in a complex workflow system.\u00a0 We\u2019ve addressed communication elements in the Ontology for Media Creation<\/a> which covers some aspects on what<\/em> needs to be communicated. Recently we\u2019ve been turning our attention to the how<\/em>\u00a0to express that communication in the most efficient manner.\u00a0 For example, in the 2030 Vision<\/a> our first principle states that content goes straight to the cloud and does not need to be moved. Once ingestion to the cloud has completed, the first participants in the chain will need to be notified that the content is now in the cloud and ready to be worked on and ideally including a location for that content.\u00a0 A similar workflow notification message is required when a task has been finished and the work is ready for review by another team member.\u00a0 In this post we\u2019ll discuss the benefits of a common approach to communicating these repeating types of workflow messages. In a subsequent post we\u2019ll get into the technicalities of how we think such a system could be built including considerations to enable it to span cloud infrastructures and tools.\r\n\r\n

      The Art of the Message<\/h2>\r\n\r\nWe need to deal with both simple messages, in near real-time, between two participants, like this:[\/et_pb_text][et_pb_image src=\"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/05\/messaging_system.gif\" alt=\"Simple Message System\" title_text=\"Simple Message System\" _builder_version=\"4.11.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.11.4\" _module_preset=\"default\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" global_colors_info=\"{}\"]

      Synchronous Real-Time Messages between two known participants.<\/em><\/p>\r\n

      And more complex messages, especially as we move to more automated systems, where the participants may not know who will pick up the messages and may not receive replies for hours or even days. Take for an example:<\/p>[\/et_pb_text][et_pb_image src=\"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/05\/render.gif\" alt=\"Render\" title_text=\"Render\" _builder_version=\"4.11.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.11.4\" _module_preset=\"default\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" global_colors_info=\"{}\"]

      Asynchronous Messages between one sender and multiple potential recipients.<\/em><\/p>\r\nIn this example the Render Manager (the message sender) doesn\u2019t know which nodes may respond or when they may respond. There are thousands of such nuanced examples in production workflows that we need to consider when thinking about the sorts of messages that could be sent between systems. We need a messaging approach that can accommodate all of these message types, and also the complexity of multi-cloud infrastructure when messages may be flowing between systems that are not all owned\/leased or operated by the same organization and on the same infrastructure.\r\n

      Software Messaging Systems<\/h2>\r\nAt MovieLabs we\u2019ve been thinking about approaches to these messaging problems. One approach is using point-to-point API calls between all these disparate systems and while appropriate for many use cases we don\u2019t believe this will scale to whole productions or studios \u2013 there would simply be too many custom integrations to get all the possible components of a workflow to work together.[1]<\/a> We see the best way to manage the highly asynchronous delivery of information to multiple (potentially unknown to the sender) destinations is to decouple the mechanics of the communication \u2013 the what<\/em> from the how<\/em>.\u00a0 In software systems this can be managed in a more automated way using Message Queues.[2]<\/a> A message queue allows a message to be sent blindly (the sender does not need to specifically know who will read it). Specific queues are typically associated with a particular topic, any other participant with an interest in that topic can then subscribe to the queue and receive its messages whenever they\u2019re ready.\r\n\r\nMessage queues \u2013 or, more broadly, message systems \u2013 are a natural fit for software-defined workflows: their raison d'\u00eatre<\/em> is to provide a communication mechanism where senders and receivers can operate without knowing anything about each other beyond how to communicate (the message queue) and some expectations about the contents of the communication (the messages.) This separation allows applications to run independently and, just as importantly, be developed independently.\r\n\r\nAs long as the sending and receiving applications can both access the message queue, it doesn\u2019t matter where the applications are running; they can be in the same cloud, in different clouds, on a workstation in a cloud, or even in two organizations. Agreeing on commonality of some aspects of message headers and message contents can enable interoperability especially in that cross-organizational use case. For example, if a message from an editorial department to a VFX house includes a commonly agreed upon place to put shot and sequence identifiers, a workflow management system at the VFX house can route that message to the appropriate recipients internally.\r\n\r\nThe use of messaging systems rather than point-to-point integrations also makes it easier to gather together operational data for logging, dashboards, and detecting\/acting on exceptions and errors.\r\n

      Benefits<\/h2>\r\nAs we look to the 10 Principles of the 2030 Vision, we can see that messaging is key to enabling the \"publish\" function (where access to files is pushed through a workflow, as tasks are created) and enabling participants to \u201csubscribe\u201d to those files, tasks, or changes. Principles 1 and 2 of the 2030 Vision state that assets go to the cloud and do not need to move, which means sharing the location of those files<\/a> becomes a key message that will also need to be shared between systems. By enabling a robust multi-cloud ecosystem with broadly distributed and understandable messages, we hope to unlock the true flexibility of software-defined workflows But we do not need to wait for the entirety of the 2030 Vision ecosystem to be built before we can take advantage of messaging systems \u2013 there are many use cases that can be deployed now to enable a more interoperable and flexible workflow in 2022 and beyond.\r\n

      Next Up...<\/h2>\r\nIn our next post we\u2019ll discuss the software elements of a messaging system, types of messages and the use cases we hope to enable with one.\u00a0 Make sure you stay tuned, so you get the message\u2026[\/et_pb_text][et_pb_divider show_divider=\"off\" _builder_version=\"4.11.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][et_pb_text _builder_version=\"4.11.4\" _module_preset=\"default\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" global_colors_info=\"{}\"][1]<\/a> Not to say that API calls don\u2019t have their place in interoperability. We\u2019re very supportive of applications exposing APIs for system-to-system communication with small amounts of data or messages that need a guaranteed quickish response.\r\n\r\n[2]<\/a> Message queues are a familiar element of software engineering, suited to a wide a variety of inter-process communication problems. Operating systems use them internally, and business and process automation software make heavy use of them.\r\n\r\n[3]<\/a> We define \u201ccloud\u201d in the 2030 Vision as private, public and hybrid infrastructures connected to the internet and therefore envision productions that need to span across all of those.\u00a0 See the multi-cloud blog here [insert link] for more details.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[78,84],"tags":[],"ppma_author":[53],"acf":[],"yoast_head":"\nCan I Trust You? - MovieLabs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/movielabs.com\/can-i-trust-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can I Trust You? - MovieLabs\" \/>\n<meta property=\"og:description\" content=\"Building Trust in Secure Systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/movielabs.com\/can-i-trust-you\/\" \/>\n<meta property=\"og:site_name\" content=\"MovieLabs\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-01T17:05:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T05:01:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1079\" \/>\n\t<meta property=\"og:image:height\" content=\"573\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Spencer Stephens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spencer Stephens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/movielabs.com\/can-i-trust-you\/\",\"url\":\"https:\/\/movielabs.com\/can-i-trust-you\/\",\"name\":\"Can I Trust You? - MovieLabs\",\"isPartOf\":{\"@id\":\"https:\/\/movielabs.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/movielabs.com\/can-i-trust-you\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/movielabs.com\/can-i-trust-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg\",\"datePublished\":\"2022-11-01T17:05:14+00:00\",\"dateModified\":\"2023-06-14T05:01:18+00:00\",\"author\":{\"@id\":\"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/movielabs.com\/can-i-trust-you\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/movielabs.com\/can-i-trust-you\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/movielabs.com\/can-i-trust-you\/#primaryimage\",\"url\":\"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg\",\"contentUrl\":\"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg\",\"width\":1079,\"height\":573},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/movielabs.com\/can-i-trust-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/movielabs.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can I Trust You?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/movielabs.com\/#website\",\"url\":\"https:\/\/movielabs.com\/\",\"name\":\"MovieLabs\",\"description\":\"Driving Innovation in Film and TV Content Creation and Distribution\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/movielabs.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02\",\"name\":\"Spencer Stephens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/movielabs.com\/#\/schema\/person\/image\/dbaadc6be039c0e195c1efccd7340614\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g\",\"caption\":\"Spencer Stephens\"},\"url\":\"https:\/\/movielabs.com\/author\/sstephens\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can I Trust You? - MovieLabs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/movielabs.com\/can-i-trust-you\/","og_locale":"en_US","og_type":"article","og_title":"Can I Trust You? - MovieLabs","og_description":"Building Trust in Secure Systems","og_url":"https:\/\/movielabs.com\/can-i-trust-you\/","og_site_name":"MovieLabs","article_published_time":"2022-11-01T17:05:14+00:00","article_modified_time":"2023-06-14T05:01:18+00:00","og_image":[{"width":1079,"height":573,"url":"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg","type":"image\/jpeg"}],"author":"Spencer Stephens","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spencer Stephens","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/movielabs.com\/can-i-trust-you\/","url":"https:\/\/movielabs.com\/can-i-trust-you\/","name":"Can I Trust You? - MovieLabs","isPartOf":{"@id":"https:\/\/movielabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/movielabs.com\/can-i-trust-you\/#primaryimage"},"image":{"@id":"https:\/\/movielabs.com\/can-i-trust-you\/#primaryimage"},"thumbnailUrl":"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg","datePublished":"2022-11-01T17:05:14+00:00","dateModified":"2023-06-14T05:01:18+00:00","author":{"@id":"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02"},"breadcrumb":{"@id":"https:\/\/movielabs.com\/can-i-trust-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/movielabs.com\/can-i-trust-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/movielabs.com\/can-i-trust-you\/#primaryimage","url":"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg","contentUrl":"https:\/\/movielabs.com\/wp-content\/uploads\/2022\/10\/can_i_trust_you.jpg","width":1079,"height":573},{"@type":"BreadcrumbList","@id":"https:\/\/movielabs.com\/can-i-trust-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/movielabs.com\/"},{"@type":"ListItem","position":2,"name":"Can I Trust You?"}]},{"@type":"WebSite","@id":"https:\/\/movielabs.com\/#website","url":"https:\/\/movielabs.com\/","name":"MovieLabs","description":"Driving Innovation in Film and TV Content Creation and Distribution","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/movielabs.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/movielabs.com\/#\/schema\/person\/201c0b38181a29dd4a6e0b170cf19b02","name":"Spencer Stephens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/movielabs.com\/#\/schema\/person\/image\/dbaadc6be039c0e195c1efccd7340614","url":"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g","caption":"Spencer Stephens"},"url":"https:\/\/movielabs.com\/author\/sstephens\/"}]}},"authors":[{"term_id":53,"user_id":13,"is_guest":0,"slug":"sstephens","display_name":"Spencer Stephens","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/d9e45375a76279e1a942c82625429d2d?s=96&d=mm&r=g","user_url":"","last_name":"Stephens","first_name":"Spencer","job_title":"","description":""}],"_links":{"self":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts\/11634"}],"collection":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/comments?post=11634"}],"version-history":[{"count":1,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts\/11634\/revisions"}],"predecessor-version":[{"id":12604,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/posts\/11634\/revisions\/12604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/media\/11635"}],"wp:attachment":[{"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/media?parent=11634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/categories?post=11634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/tags?post=11634"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/movielabs.com\/wp-json\/wp\/v2\/ppma_author?post=11634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}