{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"Data Interception Environment Part 2: Analysis\" src=\"https://media.privacyinternational.org/videos/embed/d14b20bb-e04c-42f5-965d-f27b37c59d03\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Data Interception Environment Part 2: Analysis","author_name":"Main channel","author_url":"https://media.privacyinternational.org/video-channels/privacyint_channel","provider_name":"PeerTube","provider_url":"https://media.privacyinternational.org","thumbnail_url":"https://media.privacyinternational.org/lazy-static/previews/c727cb32-5b8c-443a-9075-6c22235e3a90.jpg","thumbnail_width":850,"thumbnail_height":480}