﻿<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Is anybody listening?</provider_name><provider_url>https://wpmu.mau.se/nmict23group5</provider_url><title>Africa&#x2019;s Contested Cyber Environment - Is anybody listening?</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="98Ftk0OwQM"&gt;&lt;a href="https://wpmu.mau.se/nmict23group5/2023/10/15/africas-contested-cyber-environment/"&gt;Africa&#x2019;s Contested Cyber Environment&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://wpmu.mau.se/nmict23group5/2023/10/15/africas-contested-cyber-environment/embed/#?secret=98Ftk0OwQM" width="600" height="338" title="&#x201C;Africa&#x2019;s Contested Cyber Environment&#x201D; &#x2014; Is anybody listening?" data-secret="98Ftk0OwQM" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://wpmu.mau.se/nmict23group5/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>http://wpmu.mau.se/nmict23group5/wp-content/uploads/sites/89/2023/10/Cyber-Environment-Africa.jpg</thumbnail_url><thumbnail_width>1000</thumbnail_width><thumbnail_height>667</thumbnail_height><description>African governments are good students of history as they still recall and do not underplay the role of online media in empowering the masses. They still remember how online conversations mobilised large parts of the population in Tunisia. Today, African governments have resorted to digital suppression to silence their nationals in times of protests and civil resistance.</description></oembed>
