{"version":"1.0","provider_name":"","provider_url":"https:\/\/www.retrocube.com\/blog","title":"Basic practices of security in mobile applications -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"tnBp7rWci4\"><a href=\"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/\">Basic practices of security in mobile applications<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.retrocube.com\/blog\/basic-practices-of-security-in-mobile-applications\/embed\/#?secret=tnBp7rWci4\" width=\"600\" height=\"338\" title=\"&#8220;Basic practices of security in mobile applications&#8221; &#8212; \" data-secret=\"tnBp7rWci4\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.retrocube.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.retrocube.com\/blog\/wp-content\/uploads\/2020\/01\/security-in-mobile-applications.jpg","thumbnail_width":1210,"thumbnail_height":555,"description":"Smartphones have changed the way we communicate and connect with the world. The smartphone, which has been in the market for ten years, has had such growth and modernization that sometimes we wondered how we could live without it before. More and more are the elements of our daily life that pass through the mobile, [&hellip;]"}