{"version":"1.0","provider_name":"Programa FRIDA","provider_url":"https:\/\/programafrida.net\/en","author_name":"Jose Teneb","author_url":"https:\/\/programafrida.net\/en\/archivos\/author\/administrador","title":"Programa FRIDA | Protecting the TOR Network against Malicious Traffic","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6Ss4Cs57xr\"><a href=\"https:\/\/programafrida.net\/en\/archivos\/project\/proteccion-de-tor-contra-el-trafico-malicioso\">Protecting the TOR Network against Malicious Traffic<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/programafrida.net\/en\/archivos\/project\/proteccion-de-tor-contra-el-trafico-malicioso\/embed#?secret=6Ss4Cs57xr\" width=\"600\" height=\"338\" title=\"&#8220;Protecting the TOR Network against Malicious Traffic&#8221; &#8212; Programa FRIDA\" data-secret=\"6Ss4Cs57xr\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/programafrida.net\/wp-content\/uploads\/2016\/06\/3c567e_Rede-Tor-Prova.png","thumbnail_width":1300,"thumbnail_height":652,"description":"Tor is an overlay network that enables anonymous communication between applications that communicate over TCP. This network serves hundreds of thousands of users, allowing them to decide when they wish to be identified, thus keeping their online data from being tracked and protecting the privacy of their activities against third party tracking attempts. Despite being [&hellip;]"}