<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Anonimowi uzale&#x17C;nieni od Internetu i technologii</provider_name><provider_url>https://internetaddictsanonymous.org/pl</provider_url><author_name>thk</author_name><author_url>https://internetaddictsanonymous.org/pl/author/tomashk/</author_url><title>Security guidelines for ITAA meeting hosts &#x2013; Internet and Technology Addicts Anonymous</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="bwcO9oADP1"&gt;&lt;a href="https://internetaddictsanonymous.org/pl/security-guidelines-for-itaa-meeting-hosts/"&gt;Wytyczne dotycz&#x105;ce bezpiecze&#x144;stwa dla gospodarzy spotka&#x144; ITAA&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://internetaddictsanonymous.org/pl/security-guidelines-for-itaa-meeting-hosts/embed/#?secret=bwcO9oADP1" width="600" height="338" title="&#x201E;Wytyczne bezpiecze&#x144;stwa dla organizator&#xF3;w spotka&#x144; ITAA&#x201D; &#x2014; Anonimowi Uzale&#x17C;nieni od Internetu i Technologii" data-secret="bwcO9oADP1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://internetaddictsanonymous.org/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;</html><description>ITAA meetings may be targeted by disruptive trolls. Below are some suggestions that can help you keep your Zoom meeting safe and secure. Meetings are encouraged to hold group consciences and discuss plans for how to prevent and respond to disruption. A video demo of the suggestions below can be found here. Please note that &hellip; Continue reading</description></oembed>