{"id":23531,"date":"2014-05-30T21:43:40","date_gmt":"2014-05-31T01:43:40","guid":{"rendered":"http:\/\/www.opensource.im\/?p=23531"},"modified":"2014-05-30T21:43:40","modified_gmt":"2014-05-31T01:43:40","slug":"how-edward-snowden-breached-nsa-security-and-an-open-invitation-to-correct-us-video","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/how-edward-snowden-breached-nsa-security-and-an-open-invitation-to-correct-us-video.php","title":{"rendered":"How Edward Snowden breached NSA security and an open invitation to correct us &#8211; Video"},"content":{"rendered":"<p><br \/>How Edward Snowden breached NSA security and an open invitation to correct us<br \/><span>As experts in securing and protecting keys and certificates, Venafi understands how Snowden accomplished this breach. Here we describe how Venafi solved this puzzle and explain why Snowden #39;s...<\/span><span><\/p>\n<p>By: <\/span>CTOBuddy<span style=\"color: #666666; font-size: 11px;\"<br \/><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.youtube.com\/watch?v=u2hSTGCHm48\" title=\"How Edward Snowden breached NSA security and an open invitation to correct us - Video\">How Edward Snowden breached NSA security and an open invitation to correct us - Video<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> How Edward Snowden breached NSA security and an open invitation to correct us As experts in securing and protecting keys and certificates, Venafi understands how Snowden accomplished this breach. Here we describe how Venafi solved this puzzle and explain why Snowden&#39;s..<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-23531","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23531"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=23531"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23531\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=23531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=23531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=23531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}