{"type":"rich","version":"1.0","author_name":"CyberSecurity Verbund LSA","author_url":"https://sparrow.cs.uni-magdeburg.de/@CySecVerbund","provider_name":"sparrow.cs.uni-magdeburg.de","provider_url":"https://sparrow.cs.uni-magdeburg.de/","cache_age":86400,"html":"\u003ciframe src=\"https://sparrow.cs.uni-magdeburg.de/@CySecVerbund/115248536316220466/embed\" class=\"mastodon-embed\" style=\"max-width: 100%; border: 0\" width=\"400\" allowfullscreen=\"allowfullscreen\"\u003e\u003c/iframe\u003e\u003cscript src=\"https://sparrow.cs.uni-magdeburg.de/embed.js\" async=\"async\"\u003e\u003c/script\u003e","width":400,"height":null}