{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"Scheme 5: Quotation\" src=\"https://video.infosec.exchange/videos/embed/v4QdQGqeyMcPSX1tTwBibC\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"Scheme 5: Quotation","author_name":"Andy Balaam's programming lectures","author_url":"https://video.infosec.exchange/video-channels/andybalaam_lectures","provider_name":"PeerTube","provider_url":"https://video.infosec.exchange","thumbnail_url":"https://video.infosec.exchange/lazy-static/thumbnails/3e95c37c-971e-4318-a897-f32f40e5a4fd.jpg","thumbnail_width":850,"thumbnail_height":480}