{"version":"1.0","provider_name":"Kvinno- och tjejjouren Ada","provider_url":"https:\/\/www.kvinnojouren-ada.nu\/en\/","title":"Threats and abuse using technology - Kvinno- och tjejjouren Ada","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Fh8OXabXN6\"><a href=\"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/\">Threats and abuse using technology<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/embed\/#?secret=Fh8OXabXN6\" width=\"600\" height=\"338\" title=\"&#8220;Threats and abuse using technology&#8221; &#8212; Kvinno- och tjejjouren Ada\" data-secret=\"Fh8OXabXN6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.kvinnojouren-ada.nu\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"As technology develops, it creates new ways to control, intimidate and abuse. With the help of modern technology, your abuser can not only monitor and find you but also sabotage you in different ways. If you suspect that your abuser has had access to your computer, mobile phone, etc. and knows how to use such [&hellip;]"}