{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups\" title=\"Conferenza Privacy &amp; Sicurezza 2014 - Seconda giornata: CryptoMythbusters\" src=\"https://video.poul.org/videos/embed/d64b1755-cd2a-4f51-9e17-e0e849668ac7\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Conferenza Privacy & Sicurezza 2014 - Seconda giornata: CryptoMythbusters","author_name":"Politecnico Open unix Labs","author_url":"https://video.poul.org/video-channels/politecnico_open_unix_labs","provider_name":"PeerTube","provider_url":"https://video.poul.org","thumbnail_url":"https://video.poul.org/lazy-static/previews/417f45f5-abc4-43b5-9c36-b60bce81962b.jpg","thumbnail_width":850,"thumbnail_height":480}