{"version":"1.0","provider_name":"Cyberagentur","provider_url":"https:\/\/www.cyberagentur.de\/en\/","author_name":"codemacher","author_url":"https:\/\/www.cyberagentur.de\/en\/author\/codemacher\/","title":"Key technologies - Cyberagentur","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MkHxNpS2zd\"><a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\">Key technologies<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/embed\/#?secret=MkHxNpS2zd\" width=\"600\" height=\"338\" title=\"&#8220;Key technologies&#8221; &#8212; Cyberagentur\" data-secret=\"MkHxNpS2zd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberagentur.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"In the next ten to 15 years, new key technologies will fundamentally change cyber security. How well we master these technologies and protect them with our own patents is crucial for Germany&#8217;s technological sovereignty. That is why we are researching disruptive innovations such as new cryptographic processes, quantum technologies, advanced artificial intelligence and unmanned systems."}