{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/CcJ144X7KcR57fiAEYFq/MACJ9GZtjzve2CBSWnCV/zqtRwSy12.js"],
  "sourcesContent": ["// Generated by Framer (cf4c6d7)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"1aqdplt\",mediaQuery:\"(min-width: 1200px)\"},{hash:\"19492ng\",mediaQuery:\"(min-width: 810px) and (max-width: 1199px)\"},{hash:\"1w08q3w\",mediaQuery:\"(max-width: 809px)\"}],description:\"The latest news, announcements, and other content, where we discuss Twingate, Zero Trust Network Access, and the future of network security.\",elements:{},robots:\"max-image-preview:large\",serializationId:\"framer-yQKGj\",title:\"Blog (Tutorials) | Twingate\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,UAAU,WAAW,qBAAqB,EAAE,CAAC,KAAK,UAAU,WAAW,4CAA4C,EAAE,CAAC,KAAK,UAAU,WAAW,oBAAoB,CAAC,EAAE,YAAY,+IAA+I,SAAS,CAAC,EAAE,OAAO,0BAA0B,gBAAgB,eAAe,MAAM,8BAA8B,SAAS,oBAAoB,CAAE,CAAQ,IAAMC,EAAgB,EACljBC,EAAqB,CAAC,QAAU,CAAC,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["metadata", "params", "activeLocale", "metadataVersion", "__FramerMetadata__"]
}
