[{"@context":"https:\/\/schema.org\/","@type":"TechArticle","@id":"https:\/\/www.protondata.com\/proton-data-security-degaussers\/#TechArticle","mainEntityOfPage":"https:\/\/www.protondata.com\/proton-data-security-degaussers\/","headline":"Proton Data Security","name":"Proton Data Security","description":"&nbsp;","datePublished":"2019-08-19","dateModified":"2020-03-05","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/protonsiteadmin\/#Person","name":"ProtonSiteAdmin","url":"https:\/\/www.protondata.com\/blog\/author\/protonsiteadmin\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/f892abcc032eee14738cab0f8a79f5116d70bcb647eb5e2655f162d4f14aba64?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f892abcc032eee14738cab0f8a79f5116d70bcb647eb5e2655f162d4f14aba64?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/proton_Logomark-01_large.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/proton_Logomark-01_large.png","width":480,"height":480},"url":"https:\/\/www.protondata.com\/proton-data-security-degaussers\/"},{"@context":"https:\/\/schema.org","@type":"BreadcrumbList","@id":"https:\/\/www.protondata.com\/proton-data-security-degaussers\/#BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Proton Data Security","item":"https:\/\/www.protondata.com\/proton-data-security-degaussers\/#breadcrumbitem"}]}]