{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups\" title=\"Security &amp; Cryptography I: Attacker Model\" src=\"https://dud-video.inf.tu-dresden.de/videos/embed/9c66e556-23d7-43cd-9b32-3b032057c369\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Security & Cryptography I: Attacker Model","author_name":"Security & Cryptography I","author_url":"https://dud-video.inf.tu-dresden.de/video-channels/saci","provider_name":"PeerTube","provider_url":"https://dud-video.inf.tu-dresden.de","thumbnail_url":"https://dud-video.inf.tu-dresden.de/lazy-static/previews/9c66e556-23d7-43cd-9b32-3b032057c369.jpg","thumbnail_width":850,"thumbnail_height":480}