[{"data":1,"prerenderedAt":207},["ShallowReactive",2],{"2gYLDtF_LqyBjqM7Wa2B5cNg36yB78EOGjS-4v-Jv1o":3,"_apollo:default":156},{"page":4,"blog":5},null,{"__typename":6,"title":7,"_seoMetaTags":8,"_allSlugLocales":73,"_firstPublishedAt":80,"author":81,"categories":97,"editor":108,"image":112,"relatedPosts":114},"BlogRecord","4 Tipps, um Ihr E-Mail Postfach vor Cyberkriminellen zu schützen",[9,13,17,20,24,27,30,34,38,42,45,49,53,57,61,65,69],{"__typename":10,"tag":11,"attributes":4,"content":12},"Tag","title","StartMail - 4 Tipps zum Schutz Ihrer E-Mails vor einem Hack",{"__typename":10,"tag":14,"attributes":15,"content":4},"meta",{"property":16,"content":12},"og:title",{"__typename":10,"tag":14,"attributes":18,"content":4},{"name":19,"content":12},"twitter:title",{"__typename":10,"tag":14,"attributes":21,"content":4},{"name":22,"content":23},"description","E-Mails sind für über 90% aller Cyberangriffe verantwortlich. Mit diesen 4 Tipps können Sie das Risiko eines Hacks minimieren.",{"__typename":10,"tag":14,"attributes":25,"content":4},{"property":26,"content":23},"og:description",{"__typename":10,"tag":14,"attributes":28,"content":4},{"name":29,"content":23},"twitter:description",{"__typename":10,"tag":14,"attributes":31,"content":4},{"property":32,"content":33},"og:image","https://www.datocms-assets.com/47413/1661364319-blogheader-prevent-email-hack.jpg?auto=format&fit=max&w=1200",{"__typename":10,"tag":14,"attributes":35,"content":4},{"property":36,"content":37},"og:image:width","1200",{"__typename":10,"tag":14,"attributes":39,"content":4},{"property":40,"content":41},"og:image:height","701",{"__typename":10,"tag":14,"attributes":43,"content":4},{"name":44,"content":33},"twitter:image",{"__typename":10,"tag":14,"attributes":46,"content":4},{"property":47,"content":48},"og:locale","de",{"__typename":10,"tag":14,"attributes":50,"content":4},{"property":51,"content":52},"og:type","article",{"__typename":10,"tag":14,"attributes":54,"content":4},{"property":55,"content":56},"og:site_name","StartMail",{"__typename":10,"tag":14,"attributes":58,"content":4},{"property":59,"content":60},"article:modified_time","2025-06-11T12:49:53Z",{"__typename":10,"tag":14,"attributes":62,"content":4},{"property":63,"content":64},"article:publisher","https://www.facebook.com/startmail/",{"__typename":10,"tag":14,"attributes":66,"content":4},{"name":67,"content":68},"twitter:card","summary_large_image",{"__typename":10,"tag":14,"attributes":70,"content":4},{"name":71,"content":72},"twitter:site","@MyStartMail",[74,77],{"__typename":75,"locale":48,"value":76},"StringNonNullMultiLocaleField","tipps-email-vor-cyberkriminellen-schutzen",{"__typename":75,"locale":78,"value":79},"en","steps-to-prevent-email-hack","2022-08-25T10:22:54+02:00",{"__typename":82,"function":83,"image":84,"name":96},"EmployeeRecord","Support Lead",{"__typename":85,"responsiveImage":86,"format":93,"url":94,"width":95,"height":95},"FileField",{"__typename":87,"srcSet":88,"sizes":89,"src":90,"aspectRatio":91,"width":92,"height":92},"ResponsiveImage","https://www.datocms-assets.com/47413/1636541100-jamie.png?auto=compress%2Cformat&fit=crop&h=50&w=50 50w,https://www.datocms-assets.com/47413/1636541100-jamie.png?auto=compress%2Cformat&dpr=1.5&fit=crop&h=50&w=50 75w,https://www.datocms-assets.com/47413/1636541100-jamie.png?auto=compress%2Cformat&dpr=2&fit=crop&h=50&w=50 100w,https://www.datocms-assets.com/47413/1636541100-jamie.png?auto=compress%2Cformat&dpr=3&fit=crop&h=50&w=50 150w,https://www.datocms-assets.com/47413/1636541100-jamie.png?auto=compress%2Cformat&dpr=4&fit=crop&h=50&w=50 200w","(max-width: 50px) 100vw, 50px","https://www.datocms-assets.com/47413/1636541100-jamie.png?auto=compress%2Cformat&fit=crop&h=50&w=50",1,50,"png","https://www.datocms-assets.com/47413/1636541100-jamie.png",512,"Jamie P.",[98,104],{"__typename":99,"id":100,"slug":101,"title":102,"name":103},"CategoryRecord","72029074","datenschutztipps","Datenschutz-Tipps","",{"__typename":99,"id":105,"slug":106,"title":107,"name":103},"72029080","artikel","Artikel",[109],{"__typename":110,"requiredBody":111},"SimpleTextSectionRecord","\u003Ch1>\u003Cstrong>4 Tipps, um Ihr E-Mail Postfach vor Cyberkriminellen zu sch&uuml;tzen\u003C/strong>\u003C/h1>\n\u003Cp>Alle 39 Sekunden gibt es irgendwo im Internet \u003Ca href=\"https://techjury.net/blog/how-many-cyber-attacks-per-day/\" target=\"_blank\" rel=\"noopener\">einen neuen Cyberangriff\u003C/a>. J&uuml;ngsten Statistiken zufolge sind E-Mails f&uuml;r &uuml;ber 90% davon verantwortlich. Wie kann man sich und seine Konten also am besten vor Cyberkriminellen sch&uuml;tzen? Mit diesen 4 Tipps k&ouml;nnen Sie das Risiko eines Hacks minimieren.\u003Cspan style=\"text-decoration: line-through;\">\u003C/span>\u003C/p>\n\u003Ch3>\u003Cstrong>Wie kann ich feststellen, ob mein E-Mail-Konto gehackt wurde?\u003C/strong>\u003C/h3>\n\u003Cp>Wenn Sie sich nun fragen, ob Ihr E-Mail-Konto bereits kompromittiert oder gehackt wurde, hier einige Indikatoren:\u003C/p>\n\u003Col>\n  \u003Cli>Sie bekommen eine Benachrichtigung, dass Ihr Passwort falsch ist.\u003C/li>\n  \u003Cli>Sie bemerken seltsame E-Mails in Ihrem Gesendet-Ordner.\u003C/li>\n  \u003Cli>Sie erhalten unangeforderte E-Mails zum Zur&uuml;cksetzen Ihres Passworts.\u003C/li>\n  \u003Cli>Sie bemerken, dass von ungew&ouml;hnlichen Ger&auml;ten, Browsern oder IP-Adressen auf Ihr Konto zugegriffen wurde.\u003C/li>\n\u003C/ol>\n\u003Cp>Sie haben keine ungew&ouml;hnlichen Aktivit&auml;ten bemerkt? Herzlichen Gl&uuml;ckwunsch! Damit das auch so bleibt, haben wir 4 Tipps, um Ihre E-Mail-Konten auch in Zukunft vor Angriffen zu sch&uuml;tzen.\u003C/p>\n\u003Ch3>\u003Cstrong>Tipp 1: Verwenden Sie ein sicheres Passwort \u003C/strong>\u003C/h3>\n\u003Cp>E-Mail-Hacking ist eine wahre Goldgrube f&uuml;r Cyberkriminelle. Denken Sie an all die sensiblen Daten, die Sie per E-Mail teilen: Ihre Bank- oder Kreditkartendaten, Anmeldedaten f&uuml;r andere Konten, pers&ouml;nliche Gespr&auml;che, Ihre Kontakte, Konten in den sozialen Medien und viele andere Informationen, die niemanden etwas angehen.\u003C/p>\n\u003Cp>Die Verwendung eines sicheren Passworts ist das A und O. Sie k&ouml;nnen einen Passwortgenerator verwenden, um sichere, lange Passw&ouml;rter mit zuf&auml;lligen Zeichen zu erstellen. Um diese komplizierten Passw&ouml;rter nicht zu vergessen, k&ouml;nnen Sie sie in einem Passwortmanager speichern. Wir empfehlen au&szlig;erdem die \u003Ca href=\"https://support.startmail.com/hc/de/articles/360006682158-Zwei-Faktor-Authentifizierung-2FA-\" target=\"_blank\" rel=\"noopener\">Einrichtung der Zwei-Faktor-Authentifizierung\u003C/a>, wenn m&ouml;glich, um Ihr Konto zus&auml;tzlich abzusichern.&nbsp;\u003C/p>\n\u003Ch3>\u003Cstrong>Tipp 2: Teilen Sie so wenige pers&ouml;nliche Daten wie m&ouml;glich\u003C/strong>\u003C/h3>\n\u003Cp>Jedes Mal, wenn wir uns im Internet bewegen, produzieren wir neue Daten. Sei es durch die Nutzung mobiler Gadgets, Social Media oder Suchanfragen in einer Suchmaschine. All diese Daten k&ouml;nnen f&uuml;r Unternehmen interessant sein. Stellen Sie sich &ouml;fter die Frage, welche Informationen Sie wirklich teilen m&ouml;chten. Ben&ouml;tigen Unternehmen wirklich all Ihre pers&ouml;nlichen Informationen, um ihre Dienste anzubieten? Im Zweifelsfall sollten Sie gef&auml;lschte Daten verwenden, ein Pseudonym nutzen oder das Konto gar nicht erst anlegen. Au&szlig;erdem empfehlen wir, die Datenschutzeinstellungen Ihrer Konten und Ger&auml;te mindestens einmal im Jahr zu &uuml;berpr&uuml;fen und zur&uuml;ckzusetzen.\u003C/p>\n\u003Ch3>\u003Cstrong>Tipp 3: Verwenden Sie Alias-Adressen, wann immer m&ouml;glich\u003C/strong>\u003C/h3>\n\u003Cp>Hand aufs Herz: Wissen Sie, wieviele Newsletter Sie abonniert haben oder wie oft Sie Ihre E-Mail-Adresse angegeben haben, um ein Dokument herunterzuladen oder einen Tisch in einem Restaurant zu reservieren? Auch Jahre sp&auml;ter erhalten Sie noch immer E-Mails, weil Sie Ihre E-Mail-Adresse einmal angegeben haben. Das bedeutet, dass Ihre E-Mail-Adresse einem erh&ouml;hten Risiko ausgesetzt ist, verkauft zu werden oder bei einem Datenleck in die falschen H&auml;nde zu geraten. Sie k&ouml;nnen sich sch&uuml;tzen, indem Sie f&uuml;r solche Zwecke \u003Ca href=\"https://support.startmail.com/hc/de/articles/360007297457-Alias-Adressen\" target=\"_blank\" rel=\"noopener\">eine Alias-E-Mail-Adresse \u003C/a>verwenden &ndash; eine alternative E-Mail-Adresse, die mit Ihrer Haupt-E-Mail-Adresse verkn&uuml;pft ist.\u003C/p>\n\u003Cp>Mit einem StartMail-Konten k&ouml;nnen Sie eine unbegrenzte Anzahl von Alias-Adressen erstellen, so dass Sie f&uuml;r jeden Service, bei dem Sie Ihre E-Mail-Adresse angeben m&uuml;ssen, eine neue Adresse erstellen k&ouml;nnen &ndash; zum Beispiel beim Online-Shopping oder der Anmeldung f&uuml;r einen Newsletter. Wenn eine Alias-Adresse Spam- oder Phishing-Nachrichten erh&auml;lt, k&ouml;nnen Sie diese mit nur wenigen Klicks deaktivieren oder l&ouml;schen.\u003C/p>\n\u003Ch3>\u003Cstrong>Tipp 4: Nutzen Sie E-Mail-Verschl&uuml;sselung \u003C/strong>\u003C/h3>\n\u003Cp>In einer Zeit, in der Cyberkriminelle, Identit&auml;tsdiebe und sogar die Regierung unsere Kommunikation mitlesen k&ouml;nnen, ist der Schutz Ihrer Nachrichten vor neugierigen Blicken wichtiger denn je. Das Versenden normaler (unverschl&uuml;sselter) E-Mails ist mit dem Versenden einer Postkarte vergleichbar: Es ist ganz einfach mitzulesen. Bei der Nutzung von E-Mail-Verschl&uuml;sselung wird Ihre Klartextnachricht vor dem Versand in einen unlesbaren Mix aus Zahlen und Buchstaben umgewandelt, der nur durch den Empf&auml;nger entschl&uuml;sselt werden kann. Verschl&uuml;sselung bietet einen zus&auml;tzlichen Schutz f&uuml;r die Informationen und Dateien, die Sie weitergeben.\u003C/p>\n\u003Cp>Hier erfahren Sie mehr &uuml;ber \u003Ca href=\"https://support.startmail.com/hc/de/articles/360007509378-Kurzanleitung-f%C3%BCr-Verschl%C3%BCsselung\" target=\"_blank\" rel=\"noopener\">E-Mail-Verschl&uuml;sselung\u003C/a> und \u003Ca href=\"https://support.startmail.com/hc/de/articles/360006695898-Passwortgesch%C3%BCtzte-E-Mail\" target=\"_blank\" rel=\"noopener\">Passwortgesch&uuml;tzte Emails\u003C/a> bei StartMail.\u003C/p>\n\u003Ch3>\u003Cstrong>Fangen Sie noch heute an, Ihre E-Mails zu sch&uuml;tzen!\u003C/strong>\u003C/h3>\n\u003Cp>W&auml;hrend Sie diesen Artikel gelesen haben, ist irgendwo auf der Welt jemand einem E-Mail-Hack zum Opfer gefallen. Damit es Ihnen nicht auch so ergeht, sollten Sie unbedingt die oben genannten Tipps befolgen.\u003C/p>\n\u003Cp>M&ouml;chten Sie zu einem sicheren E-Mail-Anbieter wechseln oder haben Sie weitere Fragen zum Schutz Ihrer Online-Privatsph&auml;re und Ihrer E-Mail-Kommunikation? \u003Ca href=\"/de/preise/\" target=\"_blank\" rel=\"noopener\">Testen Sie StartMail 7 Tage lang kostenlos\u003C/a> oder kontaktieren Sie unser Support-Team &uuml;ber support@startmail.com!\u003C/p>",{"__typename":85,"url":113},"https://www.datocms-assets.com/47413/1661364319-blogheader-prevent-email-hack.jpg",[115,130,140,148],{"__typename":6,"image":116,"slug":128,"requiredTitle":129},{"__typename":85,"responsiveImage":117,"format":124,"url":125,"width":126,"height":127},{"__typename":87,"srcSet":118,"sizes":119,"src":120,"aspectRatio":121,"width":122,"height":123},"https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w,https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&dpr=3&fit=crop&h=346&w=580 1740w","(max-width: 580px) 100vw, 580px","https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580",1.676300578034682,580,346,"jpg","https://www.datocms-assets.com/47413/1685460519-blogpost_what-makes-startmail-different-from-other-privacy-email-providers.jpg",2096,1224,"was-unterscheidet-startmail","Was unterscheidet StartMail von anderen sicheren E-Mail-Anbietern?",{"__typename":6,"image":131,"slug":138,"requiredTitle":139},{"__typename":85,"responsiveImage":132,"format":124,"url":135,"width":136,"height":137},{"__typename":87,"srcSet":133,"sizes":119,"src":134,"aspectRatio":121,"width":122,"height":123},"https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w","https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580","https://www.datocms-assets.com/47413/1682671489-make-the-switch-migrating-to-a-secure-email-provider-for-privacy.jpg",1572,918,"so-migrieren-sie-zu-einem-sicheren-email-anbieter","Zeit für einen Tapetenwechsel: So migrieren Sie zu einem sicheren E-Mail Anbieter",{"__typename":6,"image":141,"slug":146,"requiredTitle":147},{"__typename":85,"responsiveImage":142,"format":124,"url":145,"width":136,"height":137},{"__typename":87,"srcSet":143,"sizes":119,"src":144,"aspectRatio":121,"width":122,"height":123},"https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w","https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg?auto=compress%2Cformat&fit=crop&h=346&w=580","https://www.datocms-assets.com/47413/1636617680-blogposthow-scammers-get-your-private-email-address-and-what-you-can-do-about-it.jpg","wie-betruger-an-ihre-e-mail-adresse-kommen-und-was-sie-dagegen-tun-konnen","Wie Betrüger an Ihre E-Mail-Adresse kommen (und was Sie dagegen tun können)",{"__typename":6,"image":149,"slug":154,"requiredTitle":155},{"__typename":85,"responsiveImage":150,"format":93,"url":153,"width":136,"height":137},{"__typename":87,"srcSet":151,"sizes":119,"src":152,"aspectRatio":121,"width":122,"height":123},"https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&dpr=0.25&fit=crop&h=346&w=580 145w,https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&dpr=0.5&fit=crop&h=346&w=580 290w,https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&dpr=0.75&fit=crop&h=346&w=580 435w,https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&fit=crop&h=346&w=580 580w,https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&dpr=1.5&fit=crop&h=346&w=580 870w,https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&dpr=2&fit=crop&h=346&w=580 1160w","https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png?auto=compress%2Cformat&fit=crop&h=346&w=580","https://www.datocms-assets.com/47413/1712238283-10-times-you-should-use-a-burner-email-address-instead-of-your-real-one-7.png","10-situationen-fuer-eine-wegwerf-email-adresse","10 Situationen, in denen Sie eine Wegwerf-E-Mail-Adresse anstelle Ihrer echten verwenden sollten",{"CategoryRecord:72029074":157,"CategoryRecord:72029080":158,"ROOT_QUERY":159},["null","__typename",99,"id",100,"slug",101,"title",102,"name",103],["null","__typename",99,"id",105,"slug",106,"title",107,"name",103],["null","__typename",160,"page({\"filter\":{\"slug\":{\"eq\":\"tipps-email-vor-cyberkriminellen-schutzen\"}},\"locale\":\"de\"})",4,"blog({\"filter\":{\"slug\":{\"eq\":\"tipps-email-vor-cyberkriminellen-schutzen\"}},\"locale\":\"de\"})",161],"Query",["null","__typename",6,"title",7,"_seoMetaTags",162,"_allSlugLocales",180,"_firstPublishedAt",80,"author",183,"categories",186,"editor",191,"image",193,"relatedPosts",194],[163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179],["null","__typename",10,"tag",11,"attributes",4,"content",12],["null","__typename",10,"tag",14,"attributes",15,"content",4],["null","__typename",10,"tag",14,"attributes",18,"content",4],["null","__typename",10,"tag",14,"attributes",21,"content",4],["null","__typename",10,"tag",14,"attributes",25,"content",4],["null","__typename",10,"tag",14,"attributes",28,"content",4],["null","__typename",10,"tag",14,"attributes",31,"content",4],["null","__typename",10,"tag",14,"attributes",35,"content",4],["null","__typename",10,"tag",14,"attributes",39,"content",4],["null","__typename",10,"tag",14,"attributes",43,"content",4],["null","__typename",10,"tag",14,"attributes",46,"content",4],["null","__typename",10,"tag",14,"attributes",50,"content",4],["null","__typename",10,"tag",14,"attributes",54,"content",4],["null","__typename",10,"tag",14,"attributes",58,"content",4],["null","__typename",10,"tag",14,"attributes",62,"content",4],["null","__typename",10,"tag",14,"attributes",66,"content",4],["null","__typename",10,"tag",14,"attributes",70,"content",4],[181,182],["null","__typename",75,"locale",48,"value",76],["null","__typename",75,"locale",78,"value",79],["null","__typename",82,"function",83,"image",184,"name",96],["null","__typename",85,"format",93,"url",94,"width",95,"height",95,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":50,\"w\":50}})",185],["null","__typename",87,"srcSet",88,"sizes",89,"src",90,"aspectRatio",91,"width",92,"height",92],[187,189],{"__ref":188},"CategoryRecord:72029074",{"__ref":190},"CategoryRecord:72029080",[192],["null","__typename",110,"body",111],["null","__typename",85,"url",113],[195,198,201,204],["null","__typename",6,"image",196,"slug",128,"title",129],["null","__typename",85,"format",124,"url",125,"width",126,"height",127,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",197],["null","__typename",87,"srcSet",118,"sizes",119,"src",120,"aspectRatio",121,"width",122,"height",123],["null","__typename",6,"image",199,"slug",138,"title",139],["null","__typename",85,"format",124,"url",135,"width",136,"height",137,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",200],["null","__typename",87,"srcSet",133,"sizes",119,"src",134,"aspectRatio",121,"width",122,"height",123],["null","__typename",6,"image",202,"slug",146,"title",147],["null","__typename",85,"format",124,"url",145,"width",136,"height",137,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",203],["null","__typename",87,"srcSet",143,"sizes",119,"src",144,"aspectRatio",121,"width",122,"height",123],["null","__typename",6,"image",205,"slug",154,"title",155],["null","__typename",85,"format",93,"url",153,"width",136,"height",137,"responsiveImage({\"imgixParams\":{\"auto\":[\"compress\",\"format\"],\"fit\":\"crop\",\"h\":346,\"w\":580}})",206],["null","__typename",87,"srcSet",151,"sizes",119,"src",152,"aspectRatio",121,"width",122,"height",123],1775572988677]