{"version":"1.0","provider_name":"Software Engineering Daily","provider_url":"https:\/\/softwareengineeringdaily.com","author_name":"Ashvin Nihalani","author_url":"https:\/\/softwareengineeringdaily.com\/author\/ashvin\/","title":"Episode Summary: 1inch: The Super Liquider DEX Aggregator - Software Engineering Daily","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"wVZNzhoQag\"><a href=\"https:\/\/softwareengineeringdaily.com\/2021\/09\/23\/episode-summary-1inch-the-super-liquider-dex-aggregator\/\">Episode Summary: 1inch: The Super Liquider DEX Aggregator<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/softwareengineeringdaily.com\/2021\/09\/23\/episode-summary-1inch-the-super-liquider-dex-aggregator\/embed\/#?secret=wVZNzhoQag\" width=\"600\" height=\"338\" title=\"&#8220;Episode Summary: 1inch: The Super Liquider DEX Aggregator&#8221; &#8212; Software Engineering Daily\" data-secret=\"wVZNzhoQag\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/09\/featured-crypto.png?fit=768%2C415&ssl=1","thumbnail_width":768,"thumbnail_height":415,"description":"As Bitcoin and other cryptocurrencies gained value in 2010, exchanges popped up so that people could extract value from these blockchain based currencies. However, the failure of Mt. Gox in 2014 and several other prominent exchanges illustrated the fallacies and weakness of centralized exchanges. The fact that large corporations had custody of individuals&#8217; wallets and"}