<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>HIIG</provider_name><provider_url>https://www.hiig.de/en/</provider_url><title>Progress through (surveillance-) technology? &#x2013; Digital Society Blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Z9I3OPLAkF"&gt;&lt;a href="https://www.hiig.de/en/progress-through-surveillance-technology/"&gt;Progress through (surveillance-) technology?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.hiig.de/en/progress-through-surveillance-technology/embed/#?secret=Z9I3OPLAkF" width="600" height="338" title="&#x201C;Progress through (surveillance-) technology?&#x201D; &#x2014; HIIG" data-secret="Z9I3OPLAkF" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.hiig.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.hiig.de/wp-content/uploads/2020/10/thisisengineering-raeng-GckgQqyHoa4-unsplash-1200x673.jpg</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>673</thumbnail_height><description>With the help of this information, a complete profile of the driver can be created, but there is still little transparency and awareness of the issue. What happens if hackers access this data, and how far could they go?</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 133/244 objects using Memcached
Page Caching using Memcached (Requested URI contains query) 
Minified using Memcached

Served from: www.hiig.de @ 2026-04-19 16:25:55 by W3 Total Cache
-->