{"version":"1.0","provider_name":"Open Mind","provider_url":"https:\/\/www.workshop.ch\/openmind","title":"Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"QRvHcn6jfn\"><a href=\"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/\">Sicherheitsl\u00f6sungen auf Open-Source-Basis<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/embed\/#?secret=QRvHcn6jfn\" width=\"600\" height=\"338\" title=\"&#171;Sicherheitsl\u00f6sungen auf Open-Source-Basis&#187; &#8211; Open Mind\" data-secret=\"QRvHcn6jfn\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.workshop.ch\/openmind\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Macht es Sinn, f\u00fcr sicherheitskritische Anwendungen auf Open Source Software zur\u00fcckzugreifen? Ja, meint das Network Security Journal: &#171;Open source security is like a military general who shows his plans to both his allies and his enemies. On the one hand, his enemies can try to exploit the plan by targeting its weaknesses. But on the ... Read more"}