{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet\" src=\"https://video.typesafe.org/videos/embed/x3xpAShbm9RVwJfWfTjQav\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet","author_name":"DEF CON","author_url":"https://video.typesafe.org/video-channels/defcon","provider_name":"PeerTube","provider_url":"https://video.typesafe.org","thumbnail_url":"https://video.typesafe.org/lazy-static/previews/14b014c7-aac7-493f-b421-ec9040736c7c.jpg","thumbnail_width":850,"thumbnail_height":480}