<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>SI Digital Magazine</provider_name><provider_url>https://magazine.swissinformatics.org/en/</provider_url><author_name>SI Digital Magazine</author_name><author_url>https://magazine.swissinformatics.org/en/</author_url><title>BlogRoll: Digital Self Defense - SI Digital Magazine</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="dApuApex35"&gt;&lt;a href="https://magazine.swissinformatics.org/en/blogroll-digital-self-defense/"&gt;BlogRoll: Digital Self Defense&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://magazine.swissinformatics.org/en/blogroll-digital-self-defense/embed/#?secret=dApuApex35" width="600" height="338" title="&#x201C;BlogRoll: Digital Self Defense&#x201D; &#x2014; SI Digital Magazine" data-secret="dApuApex35" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://magazine.swissinformatics.org/wp-content/uploads/2016/12/s-i-ch-background.jpg</thumbnail_url><thumbnail_width>1280</thumbnail_width><thumbnail_height>939</thumbnail_height><description>About Digital self-defense is a set of strategies to ensure protection of confidential personal electronic information that can be used to identify, contact, or locate and identify an individual in context. Personal information is often revealed in social networking sites leaving users subject to psychological manipulation that range from divulging confidential information to computer related [&hellip;]</description></oembed>
