{"version":"1.0","provider_name":"HIIG","provider_url":"https:\/\/www.hiig.de\/en\/","title":"Der Einsatz von Staatstrojanern und die IT-Sicherheit &#8211; HIIG","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"J6BVfAkIiW\"><a href=\"https:\/\/www.hiig.de\/en\/publication\/der-einsatz-von-staatstrojanern-und-die-it-sicherheit\/\">Der Einsatz von Staatstrojanern und die IT-Sicherheit<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.hiig.de\/en\/publication\/der-einsatz-von-staatstrojanern-und-die-it-sicherheit\/embed\/#?secret=J6BVfAkIiW\" width=\"600\" height=\"338\" title=\"&#8220;Der Einsatz von Staatstrojanern und die IT-Sicherheit&#8221; &#8212; HIIG\" data-secret=\"J6BVfAkIiW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.hiig.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"It is a widely held belief that freedom and security are antagonisms. This blog post addresses an issue where freedom and security are on the same side: IT security, especially with respect to State hacking as well as the retention of information about security vulnerabilities in ICT systems by the State. This post looks at what positions German political parties have formulated in their programs for the upcoming federal election."}