<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>Cyber, Sovereignty, and North Korea&#x2013;And the Risk of Inaction - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="ZXzMV98sRV"&gt;&lt;a href="https://www.justsecurity.org/46531/cyber-sovereignty-north-korea-risk-inaction/"&gt;Cyber, Sovereignty, and North Korea&#x2013;And the Risk of Inaction&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/46531/cyber-sovereignty-north-korea-risk-inaction/embed/#?secret=ZXzMV98sRV" width="600" height="338" title="&#x201C;Cyber, Sovereignty, and North Korea&#x2013;And the Risk of Inaction&#x201D; &#x2014; Just Security" data-secret="ZXzMV98sRV" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2017/10/GettyImages-854913822.jpg?fit=5244%2C3496&amp;ssl=1</thumbnail_url><thumbnail_width>5244</thumbnail_width><thumbnail_height>3496</thumbnail_height><description>Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who are intent on exploiting those vulnerabilities. And Americans and others are beginning to appreciate the potential for harm that could result &#x2013; harm to public safety, harm to the economy, [&hellip;]</description></oembed>
