{"version":"1.0","provider_name":"Prof Yarik Kryvoi | Blog on Law, Policy and Reforms","provider_url":"http:\/\/kryvoi.net\/blog","author_name":"admin","author_url":"http:\/\/kryvoi.net\/blog\/author\/admin\/","title":"Cybersecurity, international law and geopolitical divisions - Prof Yarik Kryvoi | Blog on Law, Policy and Reforms","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nB69c4AnLe\"><a href=\"http:\/\/kryvoi.net\/blog\/cybersecurity-international-law-and-geopolitical-divisions\/\">Cybersecurity, international law and geopolitical divisions<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/kryvoi.net\/blog\/cybersecurity-international-law-and-geopolitical-divisions\/embed\/#?secret=nB69c4AnLe\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity, international law and geopolitical divisions&#8221; &#8212; Prof Yarik Kryvoi | Blog on Law, Policy and Reforms\" data-secret=\"nB69c4AnLe\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/kryvoi.net\/blog\/wp-content\/uploads\/2023\/06\/cybersecurity.png","thumbnail_width":716,"thumbnail_height":445,"description":"Last week cyberattacks against British Airways, BBC and Swiss government agencies made it to the top of headlines around the world. These attacks show that greater connectivity has increased vulnerabilities in the absence of global regulatory responses. On 26 May 2023, we convened in Tokyo Symposium on &#8216;Public and Private Governance of Cybersecurity: Challenges and&hellip; Read"}