{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/5bd9bf318842405e8133d44c83c300ca\" frameborder=\"0\" width=\"1366\" height=\"1024\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1024,"width":1366,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1024,"thumbnail_width":1366,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/5bd9bf318842405e8133d44c83c300ca-00001.gif","duration":613,"title":"Lecture 26.1: Public key cryptography"}