<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Shoeleather Magazine</provider_name><provider_url>https://shoeleathermagazine.com/2021</provider_url><title>Defense Against a Controlled Cyberspace - Shoeleather Magazine</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="sWrPQVaPEV"&gt;&lt;a href="https://shoeleathermagazine.com/2021/2021/06/08/defense-against-a-controlled-cyberspace/"&gt;Defense Against a Controlled Cyberspace&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://shoeleathermagazine.com/2021/2021/06/08/defense-against-a-controlled-cyberspace/embed/#?secret=sWrPQVaPEV" width="600" height="338" title="&#x201C;Defense Against a Controlled Cyberspace&#x201D; &#x2014; Shoeleather Magazine" data-secret="sWrPQVaPEV" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://shoeleathermagazine.com/2021/wp-content/uploads/2021/06/Resized-Image-Adobe-Stock.jpg</thumbnail_url><thumbnail_width>1563</thumbnail_width><thumbnail_height>1040</thumbnail_height><description>A Study of When Users Turn to the Privacy and Censorship Circumvention Software, Tor &#x2014; During a period of democratic backsliding and increased weaponization of the internet by governments, privacy and censorship circumvention software has become all the more vital in preserving fundamental human rights and protecting vulnerable communities.</description></oembed>
