{"version":"1.0","provider_name":"Deutsches Spionagemuseum","provider_url":"https:\/\/www.deutsches-spionagemuseum.de\/en","author_name":"Florian Schimikowski","author_url":"https:\/\/www.deutsches-spionagemuseum.de\/en\/author\/fschimikowski","title":"Cyber War - Deutsches Spionagemuseum","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lu9QGd0Tw8\"><a href=\"https:\/\/www.deutsches-spionagemuseum.de\/en\/event\/cyper-war\">Cyber War<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.deutsches-spionagemuseum.de\/en\/event\/cyper-war\/embed#?secret=lu9QGd0Tw8\" width=\"600\" height=\"338\" title=\"&#8220;Cyber War&#8221; &#8212; Deutsches Spionagemuseum\" data-secret=\"lu9QGd0Tw8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.deutsches-spionagemuseum.de\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.deutsches-spionagemuseum.de\/wp-content\/uploads\/2019\/03\/va_190528.jpg","thumbnail_width":595,"thumbnail_height":800,"description":"Panel diskussion  Hacker attacks repeatedly shake and endanger the republic. How does Germany deal with the dangers in cyberspace? How can data security be guaranteed? And should German authorities give permission for \"hack-back\"?"}