{"version":"1.0","provider_name":"HIIG","provider_url":"https:\/\/www.hiig.de\/en\/","title":"Backdoor: How a metaphor turns into a weapon &#8211; HIIG","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xf7u1WdnbK\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/backdoor-how-a-metaphor-turns-into-a-weapon\/\">Backdoor: How a metaphor turns into a weapon<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.hiig.de\/en\/publication\/backdoor-how-a-metaphor-turns-into-a-weapon\/embed\/#?secret=xf7u1WdnbK\" width=\"600\" height=\"338\" title=\"&#8220;Backdoor: How a metaphor turns into a weapon&#8221; &#8212; HIIG\" data-secret=\"xf7u1WdnbK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.hiig.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Governments want special access to encrypted data while IT specialists and privacy advocates oppose these demands. What is the role of the \u201cbackdoor\u201d metaphor within these conflicts, often coined as \u201cCrypto Wars\u201d? Leontine Jenner takes a closer look at the metaphor\u2019s many layers."}