{"type":"video","version":"1.0","title":"Les BASES du Protocole UDP (+ Analyse avec WIRESHARK)","author_name":"Hafnium - Sécurité informatique","author_url":"https://odysee.com/@Hafnium:c","provider_name":"Odysee","provider_url":"https://odysee.com","thumbnail_url":"https://thumbnails.odycdn.com/card/s:1280:720/quality:85/plain/https://thumbnails.lbry.com/pzgyc2BuxWs","thumbnail_width":"390","thumbnail_height":"220","html":"<iframe id=\"odysee-iframe\" style=\"width:100%; aspect-ratio:16 / 9;\" src=\"https://odysee.com/%24/embed/%40Hafnium%3Ac%2Fles-bases-du-protocole-udp-%28%2B-analyse%3A6?autoplay=true\" allowfullscreen></iframe>","width":560,"height":315}