{"version":"1.0","provider_name":"SHARE Fondacija","provider_url":"https:\/\/sharefoundation.info\/en\/","author_name":"b p","author_url":"https:\/\/sharefoundation.info\/en\/author\/bojanperkovsharedefense-org\/","title":"Citizens\u2019 Nightmare: A Manual for Understanding Spyware - SHARE Fondacija","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"f7Q9zvgtDf\"><a href=\"https:\/\/sharefoundation.info\/en\/citizens-nightmare-a-manual-for-understanding-spyware\/\">Citizens\u2019 Nightmare: A Manual for Understanding Spyware<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/sharefoundation.info\/en\/citizens-nightmare-a-manual-for-understanding-spyware\/embed\/#?secret=f7Q9zvgtDf\" width=\"600\" height=\"338\" title=\"&#8220;Citizens\u2019 Nightmare: A Manual for Understanding Spyware&#8221; &#8212; SHARE Fondacija\" data-secret=\"f7Q9zvgtDf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/sharefoundation.info\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/09\/A-privacy-nightmare-cover-FB.png","thumbnail_width":1200,"thumbnail_height":630,"description":"In recent years, spyware has emerged as one of the gravest threats to human rights and a central instrument of repression and social control. Intrusive by design, it operates silently in the background, stripping away what should be every person\u2019s safest sanctuary \u2013 privacy. At first glance, its use can appear justified \u2013 safeguarding national [&hellip;]"}