{"name":"HACKLIDO | CYBERSECURITY","description":"#1 - Cybersecurity blogging and publishing community curating knowledge from insightful infosec writers \ud83d\ude80","start_url":"/","scope":"/","dir":"auto","theme_color":"#00aaff","display":"standalone","icons":[{"src":"https://hacklido.com/assets/pwa-icon-48x48-o7c3qdd1.png","sizes":"48x48","type":"image/png"},{"src":"https://hacklido.com/assets/pwa-icon-72x72-ox973hm0.png","sizes":"72x72","type":"image/png"},{"src":"https://hacklido.com/assets/pwa-icon-96x96-ad3ohj05.png","sizes":"96x96","type":"image/png"},{"src":"https://hacklido.com/assets/pwa-icon-144x144-xn57wqrk.png","sizes":"144x144","type":"image/png"},{"src":"https://hacklido.com/assets/pwa-icon-196x196-wegn748v.png","sizes":"196x196","type":"image/png"},{"src":"https://hacklido.com/assets/pwa-icon-256x256-x6w0v7mt.png","sizes":"256x256","type":"image/png"},{"src":"https://hacklido.com/assets/pwa-icon-512x512-o3rteluc.png","sizes":"512x512","type":"image/png"}],"background_color":"#000000","orientation":"portrait","short_name":"HACKLIDO"}