{"version":"1.0","provider_name":"Anonimowi uzale\u017cnieni od Internetu i technologii","provider_url":"https:\/\/internetaddictsanonymous.org\/pl","author_name":"thk","author_url":"https:\/\/internetaddictsanonymous.org\/pl\/author\/tomashk\/","title":"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"awZd4K4z9b\"><a href=\"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/\">Wytyczne dotycz\u0105ce bezpiecze\u0144stwa dla gospodarzy spotka\u0144 ITAA<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/internetaddictsanonymous.org\/pl\/security-guidelines-for-itaa-meeting-hosts\/embed\/#?secret=awZd4K4z9b\" width=\"600\" height=\"338\" title=\"&#8222;Security guidelines for ITAA meeting hosts&#8221; &#8212; Internet and Technology Addicts Anonymous\" data-secret=\"awZd4K4z9b\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/internetaddictsanonymous.org\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","description":"ITAA meetings may be targeted by disruptive trolls. Below are some suggestions that can help you keep your Zoom meeting safe and secure. Meetings are encouraged to hold group consciences and discuss plans for how to prevent and respond to disruption. A video demo of the suggestions below can be found here. Please note that &hellip; Continue reading"}