{"version":"1.0","type":"video","provider_name":"media.ccc.de","provider_url":"https://media.ccc.de","width":640,"height":360,"title":"How Roaming Agreements Enable 5G MitM Attacks","author":"Swantje Lange","thumbnail_url":"https://static.media.ccc.de/media/congress/2024/863-2658199b-303a-5fe8-a7c4-17152071eab1.jpg","html":"\u003ciframe src=\"https://media.ccc.de/v/38c3-how-roaming-agreements-enable-5g-mitm-attacks/oembed\" width=\"640\" height=\"360\" frameborder=\"0\" title=\"How Roaming Agreements Enable 5G MitM Attacks\" allowfullscreen scrolling=\"no\"\u003e\u003c/iframe\u003e\n"}