{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"Enter the matrix: How to run an encrypted communications platform\" src=\"https://media.privacyinternational.org/videos/embed/c896223b-dcc4-4dbd-929d-814e2d015de0\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Enter the matrix: How to run an encrypted communications platform","author_name":"Podcasts","author_url":"https://media.privacyinternational.org/video-channels/podcast","provider_name":"PeerTube","provider_url":"https://media.privacyinternational.org","thumbnail_url":"https://media.privacyinternational.org/lazy-static/previews/1b5ff247-93c5-4949-b780-f0fe94c98df5.jpg","thumbnail_width":850,"thumbnail_height":480}