{"version":3,"file":"hgM0I9XNB.Duj7IfEH.mjs","names":[],"sources":["https:/framerusercontent.com/modules/GIfqg2NijgGZrvf4htaz/CoWz2vo6BuEGe1VLsRbp/hgM0I9XNB.js"],"sourcesContent":["// Generated by Framer (a4aa1f7)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"8oqq16\",mediaQuery:\"(min-width: 1440px)\"},{hash:\"1bpjva6\",mediaQuery:\"(min-width: 1000px) and (max-width: 1439px)\"},{hash:\"uu1jo4\",mediaQuery:\"(min-width: 810px) and (max-width: 999px)\"},{hash:\"1wylyt1\",mediaQuery:\"(max-width: 809px)\"}],customHTMLHeadEnd:'<script type=\"application/ld+json\">\\n[\\n  {\\n    \"@context\": \"https://schema.org\",\\n    \"@type\": \"Blog\",\\n    \"@id\": \"https://www.netcraft.com/resources/blog\",\\n    \"url\": \"https://www.netcraft.com/resources/blog\",\\n    \"name\": \"Netcraft Blog\"\\n  }\\n]\\n</script>',description:\"Explore thought leadership, industry insights, and other resources related to cybercrime detection, disruption, and takedowns.\",elements:{L1lvCuO37:\"trigger\"},framerSearch:{index:true},robots:\"max-image-preview:large\",serializationId:\"framer-gp8Mh\",title:\"Resources – Netcraft\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],"mappings":"2DACA,SAAwB,EAAS,EAAO,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,SAAS,WAAW,sBAAsB,CAAC,CAAC,KAAK,UAAU,WAAW,8CAA8C,CAAC,CAAC,KAAK,SAAS,WAAW,4CAA4C,CAAC,CAAC,KAAK,UAAU,WAAW,qBAAqB,CAAC,CAAC,kBAAkB;;;;;;;;;;YAAyQ,YAAY,iIAAiI,SAAS,CAAC,UAAU,UAAU,CAAC,aAAa,CAAC,MAAM,GAAK,CAAC,OAAO,0BAA0B,gBAAgB,eAAe,MAAM,uBAAuB,SAAS,qBAAqB,AAAE,mBAAa,EAAgB,EAC56B,EAAqB,CAAC,QAAU,CAAC,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,IAAI,CAAC,CAAC,mBAAqB,CAAC,KAAO,WAAW,CAAC,CAAC"}