{"version":"1.0","provider_name":"In Plainspeak","provider_url":"https:\/\/www.tarshi.net\/inplainspeak","author_name":"Siddharth Narrain","author_url":"https:\/\/www.tarshi.net\/inplainspeak\/author\/siddharth-narrain\/","title":"Choice and Sexuality in Cyberspace","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6cd02JwW0p\"><a href=\"https:\/\/www.tarshi.net\/inplainspeak\/cyberspace-choice-sexuality\/\">Choice and Sexuality in Cyberspace<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tarshi.net\/inplainspeak\/cyberspace-choice-sexuality\/embed\/#?secret=6cd02JwW0p\" width=\"600\" height=\"338\" title=\"&#8220;Choice and Sexuality in Cyberspace&#8221; &#8212; In Plainspeak\" data-secret=\"6cd02JwW0p\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tarshi.net\/inplainspeak\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.tarshi.net\/inplainspeak\/wp-content\/uploads\/2019\/03\/1.jpg","thumbnail_width":1500,"thumbnail_height":999,"description":"Consent, however, is not so straightforward in the digital world. With instances where data can be hacked into, and with deep fake technologies making it more difficult to distinguish between what is real and what is fake, where it is difficult to completely anticipate the kinds of risks involved"}