{"version":"1.0","provider_name":"Podfeet Podcasts","provider_url":"https:\/\/www.podfeet.com\/blog","author_name":"Bart Busschots","author_url":"https:\/\/www.podfeet.com\/blog\/author\/bart\/","title":"Security Bits \u2013 26 November 2017 - FaceID Isn't Broken, USB Bugs in Linux Kernel, Vulnerability in Intel Chips - Podfeet Podcasts","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lZHwJL1E0J\"><a href=\"https:\/\/www.podfeet.com\/blog\/2017\/11\/sb-12-26-2017\/\">Security Bits \u2013 26 November 2017 &#8211; FaceID Isn&#8217;t Broken, USB Bugs in Linux Kernel, Vulnerability in Intel Chips<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.podfeet.com\/blog\/2017\/11\/sb-12-26-2017\/embed\/#?secret=lZHwJL1E0J\" width=\"600\" height=\"338\" title=\"&#8220;Security Bits \u2013 26 November 2017 &#8211; FaceID Isn&#8217;t Broken, USB Bugs in Linux Kernel, Vulnerability in Intel Chips&#8221; &#8212; Podfeet Podcasts\" data-secret=\"lZHwJL1E0J\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.podfeet.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2017\/10\/security_bits_logo_300px.png","thumbnail_width":300,"thumbnail_height":199,"description":"Security Medium 1 \u2014 No, FaceID isn&#8217;t Broken, but it Does Have Limits A snazzy demo to the press had headlines all over the press screaming about how FaceID had been broken. But as is so often the case with stories like this, the devil is very much in the detail. What the hackers really [&hellip;]"}