{"version":"1.0","type":"video","provider_name":"media.ccc.de","provider_url":"https://media.ccc.de","width":640,"height":360,"title":"PoC: Implementing evil maid attack on encrypted /boot","author":"kmille","thumbnail_url":"https://static.media.ccc.de/media/events/gpn/gpn20/32-ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f.jpg","html":"\u003ciframe src=\"https://media.ccc.de/v/gpn20-32-poc-implementing-evil-maid-attack-on-encrypted-boot/oembed\" width=\"640\" height=\"360\" frameborder=\"0\" title=\"PoC: Implementing evil maid attack on encrypted /boot\" allowfullscreen scrolling=\"no\"\u003e\u003c/iframe\u003e\n"}