{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Isha Takoor","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/ishatakoor\/","title":"Introduction to Magnet Verify - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"rfQgFKkSl4\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/introduction-to-magnet-verify\/\">Introduction to Magnet Verify<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/introduction-to-magnet-verify\/embed\/#?secret=rfQgFKkSl4\" width=\"600\" height=\"338\" title=\"&#8220;Introduction to Magnet Verify&#8221; &#8212; Magnet Forensics\" data-secret=\"rfQgFKkSl4\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2024\/12\/MF_Magnet_Verify_LandingPageGraphics_600x341_webinar_resourceALT.png","thumbnail_width":600,"thumbnail_height":341,"description":"Join us for a webinar introducing Magnet Verify\u2014a patented technology designed for reliable media authentication. In this session, you\u2019ll learn how Verify can be used to authenticate images and videos, detect manipulations and deepfakes, and trace media provenance for courtroom-admissible evidence. Discover how Magnet Verify,\u00a0unlike any other solution, uncovers critical insights beyond standard metadata, with deterministic results that empowers efficient analysis, and supports legal proceedings with unparalleled reliability."}