{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups\" title=\"Security &amp; Cryptography I: Modes of Operation\" src=\"https://dud-video.inf.tu-dresden.de/videos/embed/0eb11cbc-cfdc-411a-89ed-b9ad4e2b269e\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Security & Cryptography I: Modes of Operation","author_name":"Security & Cryptography I","author_url":"https://dud-video.inf.tu-dresden.de/video-channels/saci","provider_name":"PeerTube","provider_url":"https://dud-video.inf.tu-dresden.de","thumbnail_url":"https://dud-video.inf.tu-dresden.de/lazy-static/previews/0eb11cbc-cfdc-411a-89ed-b9ad4e2b269e.jpg","thumbnail_width":850,"thumbnail_height":480}