<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>LACNIC Blog</provider_name><provider_url>https://blog.lacnic.net/en/</provider_url><title>LACNIC Blog | Importance of RPKI Validators</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="RsPVpyNhdI"&gt;&lt;a href="https://blog.lacnic.net/en/importance-of-rpki-validators/"&gt;Importance of RPKI Validators&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://blog.lacnic.net/en/importance-of-rpki-validators/embed/#?secret=RsPVpyNhdI" width="600" height="338" title="&#x201C;Importance of RPKI Validators&#x201D; &#x2014; LACNIC Blog" data-secret="RsPVpyNhdI" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://blog.lacnic.net/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://blog.lacnic.net/wp-content/uploads/2020/07/rpki-julio-2020.png</thumbnail_url><thumbnail_width>680</thumbnail_width><thumbnail_height>330</thumbnail_height><description>By Jorge Cano, Senior Software Architect at LACNIC The Internet has become an essential tool in our daily life. We use the Internet to work, for entertainment, to plan our holidays, and for many other activities. But something that we should have learned early on in matters of security is that we should not blindly [&hellip;]</description></oembed>
