<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Temple iLIT</provider_name><provider_url>https://law.temple.edu/ilit</provider_url><title>Shaping Digital Identity Standards - Temple iLIT</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="IUQDNdIbOU"&gt;&lt;a href="https://law.temple.edu/ilit/shaping-digital-identity-standards/"&gt;Shaping Digital Identity Standards&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://law.temple.edu/ilit/shaping-digital-identity-standards/embed/#?secret=IUQDNdIbOU" width="600" height="338" title="&#x201C;Shaping Digital Identity Standards&#x201D; &#x2014; Temple iLIT" data-secret="IUQDNdIbOU" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://law.temple.edu/ilit/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://law.temple.edu/ilit/wp-content/uploads/sites/4/2024/12/comp.jpg</thumbnail_url><thumbnail_width>519</thumbnail_width><thumbnail_height>484</thumbnail_height><description>An Explainer and Recommendations on Technical Standard-Setting for Digital Identity Systems. In April 2023, we submitted comments to the United States National Institute of Standards and Technology (NIST), to contribute to its Guidelines on Digital Identity. Given that the NIST guidelines are very technical &#x2014; the Guidelines are written for a specialist audience &#x2014; we...</description></oembed>
