{"version":"1.0","provider_name":"ACM CHI Conference on Human Factors in Computing Systems","provider_url":"https:\/\/chi2022.acm.org\/sandbox","author_name":"John Wenskovitch","author_url":"https:\/\/chi2022.acm.org\/sandbox\/author\/johnwenskovitch\/","title":"Fake blog 2 - ACM CHI Conference on Human Factors in Computing Systems","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"oTB4aPgwxQ\"><a href=\"https:\/\/chi2022.acm.org\/sandbox\/2021\/05\/11\/fake-blog-2\/\">Fake blog 2<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/chi2022.acm.org\/sandbox\/2021\/05\/11\/fake-blog-2\/embed\/#?secret=oTB4aPgwxQ\" width=\"600\" height=\"338\" title=\"&#8220;Fake blog 2&#8221; &#8212; ACM CHI Conference on Human Factors in Computing Systems\" data-secret=\"oTB4aPgwxQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/chi2022.acm.org\/sandbox\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Fake blog 2 Title This blog is much longer. content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content content [&hellip;]"}