[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"layout":3,"i-tabler:language":300,"i-tabler:chevron-down":304,"i-tabler:moon":306,"i-material-symbols-light:arrow-forward":308,"i-material-symbols-light:menu":310,"i-tabler:radar":312,"i-tabler:hand-stop":314,"i-tabler:scale":316,"i-tabler:world":318,"i-tabler:radar-2":320,"i-tabler:book-2":322,"i-tabler:lifebuoy":324,"i-tabler:arrow-up-right":326,"i-tabler:settings":328,"i-tabler:shield-check":330,"blog-how-do-proxy-technologies-enhance-security-privacy":332,"blog-sidebar-taxonomy":445,"blog-list-p1-l5-call-tall-xhow-do-proxy-technologies-enhance-security-privacy":487,"i-tabler:category-2":597,"i-tabler:user":599,"i-tabler:calendar":601,"i-tabler:tags":603,"i-tabler:arrow-left":605,"i-tabler:brand-openai":607,"i-tabler:atom":609,"i-tabler:bolt":611,"i-tabler:rosette-discount-check":613,"i-tabler:brand-google":615,"i-tabler:folder":617,"i-tabler:check":619,"i-tabler:article":621,"i-tabler:calendar-event":623,"i-tabler:chevron-right":625},{"settings":4,"headerNav":13,"footerNav":197,"socialLinks":281,"hasResources":11,"latestWhitepaper":288},{"id":5,"site_name":6,"default_seo_title_template":7,"default_meta_description":8,"default_social_image":9,"footer_text":9,"default_contact_email":10,"default_phone":9,"default_linkedin":9,"default_youtube":9,"search_enabled":11,"search_empty_state_copy":9,"consent_banner_enabled":12,"consent_banner_copy":9,"gpc_message_copy":9},"site-config","Lokker","{{title}} | Lokker","Precision control over consumer data collection and sharing, built for privacy-first organizations.",null,"info@lokker.com",true,false,[14,22,28,34,40,46,52,58,64,69,75,81,87,93,99,105,111,116,122,128,134,140,145,151,157,163,169,174,180,185,191],{"id":15,"status":16,"sort":17,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":19,"url":20,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":21},"nav-products","published",20,"","Products","/products","monitor",{"id":23,"status":16,"sort":24,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":25,"url":26,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":27},"nuxt-who-we-help",25,"Who We Help","/who-we-help","user-shield",{"id":29,"status":16,"sort":30,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":31,"url":32,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":33},"nuxt-who-privacy-teams",26,"Privacy Teams","/who-we-help/privacy-teams","privacy-officer",{"id":35,"status":16,"sort":36,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":37,"url":38,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":39},"nuxt-who-legal-compliance",27,"Legal & Compliance","/who-we-help/legal-compliance","scale",{"id":41,"status":16,"sort":42,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":43,"url":44,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":45},"nuxt-who-insurance",28,"Insurance & Risk","/who-we-help/insurance","shield-dollar",{"id":47,"status":16,"sort":48,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":49,"url":50,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":51},"nuxt-who-agencies",29,"Agencies","/who-we-help/agencies","building-store",{"id":53,"status":16,"sort":54,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":55,"url":56,"parent_item":23,"featured":12,"open_in_new_tab":12,"icon_key":57},"nuxt-who-it-security-leader",30,"IT & Security Leaders","/who-we-help/it-security-leader","shield",{"id":59,"status":16,"sort":60,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":61,"url":62,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":63},"nuxt-solutions",31,"Solutions","/solutions","puzzle",{"id":65,"status":16,"sort":66,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":67,"url":68,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":39},"nuxt-sol-litigation-discovery",32,"Litigation & discovery","/solutions/litigation-discovery",{"id":70,"status":16,"sort":71,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":72,"url":73,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":74},"nuxt-sol-ma-due-diligence",33,"M&A due diligence","/solutions/ma-due-diligence","case-study",{"id":76,"status":16,"sort":77,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":78,"url":79,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":80},"nuxt-sol-board-risk-reporting",34,"Board & risk reporting","/solutions/board-risk-reporting","report",{"id":82,"status":16,"sort":83,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":84,"url":85,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":86},"nuxt-sol-portfolio-monitoring",35,"Portfolio monitoring","/solutions/portfolio-monitoring","dashboard",{"id":88,"status":16,"sort":89,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":90,"url":91,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":92},"nuxt-sol-healthcare",36,"Healthcare","/solutions/healthcare","healthcare",{"id":94,"status":16,"sort":95,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":96,"url":97,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":98},"nuxt-sol-consent-audit",37,"Consent Audit","/solutions/consent-audit","shield-check",{"id":100,"status":16,"sort":101,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":102,"url":103,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":104},"nuxt-sol-third-party-script-governance",38,"Script Governance","/solutions/third-party-script-governance","code",{"id":106,"status":16,"sort":107,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":108,"url":109,"parent_item":59,"featured":12,"open_in_new_tab":12,"icon_key":110},"nuxt-svc-consent-tag-orchestration",39,"CMP & tag orchestration","/services/consent-tag-orchestration","tag-manager",{"id":112,"status":16,"sort":107,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":113,"url":114,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":115},"nav-resources","Resources","/resources","guide",{"id":117,"status":16,"sort":118,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":119,"url":120,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":121},"nav-res-docs",40,"Documentation","/docs","book",{"id":123,"status":16,"sort":124,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":125,"url":126,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":127},"nav-res-whitepapers",41,"Whitepapers","/resources?type=whitepapers","whitepaper",{"id":129,"status":16,"sort":130,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":131,"url":132,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":133},"nav-res-quarterly-reports",41.5,"Quarterly Reports","/resources?type=quarterly_reports","chart-bar",{"id":135,"status":16,"sort":136,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":137,"url":138,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":139},"nav-res-blog",42,"Blog","/blog","blog",{"id":141,"status":16,"sort":142,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":143,"url":114,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":144},"nav-res-downloads",43,"Downloads & Checklists","checklist",{"id":146,"status":16,"sort":147,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":148,"url":149,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":150},"nav-res-press",44,"Press & News","/press","press",{"id":152,"status":16,"sort":153,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":154,"url":155,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":156},"nav-res-events",44.5,"Industry Events","/events","calendar-event",{"id":158,"status":16,"sort":159,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":160,"url":161,"parent_item":112,"featured":12,"open_in_new_tab":12,"icon_key":162},"nav-res-glossary",44.8,"Privacy Glossary","/glossary","book-2",{"id":164,"status":16,"sort":165,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":166,"url":167,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":168},"nav-training",45,"Training","/training","training",{"id":170,"status":16,"sort":171,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":172,"url":167,"parent_item":164,"featured":12,"open_in_new_tab":12,"icon_key":173},"nav-training-academy",46,"Privacy Academy","school",{"id":175,"status":16,"sort":176,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":177,"url":178,"parent_item":9,"featured":12,"open_in_new_tab":12,"icon_key":179},"nav-company",50,"Company","/about","building",{"id":181,"status":16,"sort":182,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":183,"url":178,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":184},"nav-about",51,"About","team",{"id":186,"status":16,"sort":187,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":188,"url":189,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":190},"nav-careers",52,"Careers","/careers","briefcase",{"id":192,"status":16,"sort":193,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"navigation_label":194,"url":195,"parent_item":175,"featured":12,"open_in_new_tab":12,"icon_key":196},"nav-contact",53,"Contact","/contact","email",[198,201,204,207,210,213,216,219,222,225,228,231,234,237,240,243,245,248,251,254,257,260,263,266,271,276],{"id":199,"status":16,"sort":200,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":25,"url":26,"open_in_new_tab":12},"nuxt-f-who-we-help",1,{"id":202,"status":16,"sort":203,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":31,"url":32,"open_in_new_tab":12},"nuxt-f-privacy-teams",2,{"id":205,"status":16,"sort":206,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":37,"url":38,"open_in_new_tab":12},"nuxt-f-legal-compliance",3,{"id":208,"status":16,"sort":209,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":43,"url":44,"open_in_new_tab":12},"nuxt-f-insurance",4,{"id":211,"status":16,"sort":212,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":49,"url":50,"open_in_new_tab":12},"nuxt-f-agencies",5,{"id":214,"status":16,"sort":215,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":25,"navigation_label":55,"url":56,"open_in_new_tab":12},"nuxt-f-it-security-leader",6,{"id":217,"status":16,"sort":218,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":61,"url":62,"open_in_new_tab":12},"nuxt-f-solutions",7,{"id":220,"status":16,"sort":221,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":67,"url":68,"open_in_new_tab":12},"nuxt-f-sol-litigation-discovery",8,{"id":223,"status":16,"sort":224,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":72,"url":73,"open_in_new_tab":12},"nuxt-f-sol-ma-due-diligence",9,{"id":226,"status":16,"sort":227,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":78,"url":79,"open_in_new_tab":12},"nuxt-f-sol-board-risk-reporting",10,{"id":229,"status":16,"sort":230,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":84,"url":85,"open_in_new_tab":12},"nuxt-f-sol-portfolio-monitoring",11,{"id":232,"status":16,"sort":233,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":90,"url":91,"open_in_new_tab":12},"nuxt-f-sol-healthcare",12,{"id":235,"status":16,"sort":236,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":96,"url":97,"open_in_new_tab":12},"nuxt-f-sol-consent-audit",13,{"id":238,"status":16,"sort":239,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":102,"url":103,"open_in_new_tab":12},"nuxt-f-sol-third-party-script-governance",14,{"id":241,"status":16,"sort":242,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":61,"navigation_label":108,"url":109,"open_in_new_tab":12},"nuxt-f-svc-consent-tag-orchestration",15,{"id":244,"status":16,"sort":242,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":183,"url":178,"open_in_new_tab":12},"nav-f-about",{"id":246,"status":16,"sort":247,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":188,"url":189,"open_in_new_tab":12},"nav-f-careers",16,{"id":249,"status":16,"sort":250,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":194,"url":195,"open_in_new_tab":12},"nav-f-contact",17,{"id":252,"status":16,"sort":253,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":148,"url":149,"open_in_new_tab":12},"nav-f-press",18,{"id":255,"status":16,"sort":256,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":131,"url":132,"open_in_new_tab":12},"nav-f-quarterly-reports",18.5,{"id":258,"status":16,"sort":259,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":166,"url":167,"open_in_new_tab":12},"nav-f-training",19,{"id":261,"status":16,"sort":262,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":154,"url":155,"open_in_new_tab":12},"nav-f-events",19.5,{"id":264,"status":16,"sort":265,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":177,"navigation_label":160,"url":161,"open_in_new_tab":12},"nav-f-glossary",19.8,{"id":267,"status":16,"sort":17,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":269,"url":270,"open_in_new_tab":12},"nav-f-privacy","Legal","Privacy Policy","/privacy-policy",{"id":272,"status":16,"sort":273,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":274,"url":275,"open_in_new_tab":12},"nav-f-terms",21,"Terms of Use","/terms-of-use",{"id":277,"status":16,"sort":278,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"section_label":268,"navigation_label":279,"url":280,"open_in_new_tab":12},"nav-f-security",22,"Security","/security",[282],{"status":16,"sort":200,"date_created":18,"date_updated":9,"user_created":18,"user_updated":9,"show_in_header":12,"show_in_footer":11,"audience_visibility":9,"id":283,"platform":284,"label":285,"url":286,"icon_key":287},"social-linkedin","linkedin","LinkedIn","https://www.linkedin.com/company/lokker","brand-linkedin",{"id":289,"title":290,"slug":291,"publish_date":292,"summary":293,"featured":12,"gated":12,"hero_image":294,"stock_image":9,"categories":299},"6fb13ba4-76d7-4855-bbf0-195c9e4ce8c8","Research Report: Website Privacy and Compliance Challenges","website-privacy-and-compliance-challenges","2024-09-03T09:11:28","By publishing this report, we aim to inform website owners about privacy concerns, potential repercussions, and mitigation strategies. We also strive to underscore the necessity for increased governance within companies, and tools that extend beyond typical consent management to ensure a safer and more transparent online experience for users.",{"id":295,"title":296,"width":297,"height":298},"f614e065-a4a1-44ea-9637-4eeff646cd25","Remediation Workflow",1080,720,[],{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":303},0,24,"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M9 6.371C9 10.789 6.761 13 4 13m0-6.629h7\"/>\u003Cpath d=\"M5 9c0 2.144 2.252 3.908 6 4m1 7l4-9l4 9m-.9-2h-6.2M6.694 3l.793.582\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":305},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m6 9l6 6l6-6\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":307},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M12 3h.393a7.5 7.5 0 0 0 7.92 12.446A9 9 0 1 1 12 2.992z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":309},"\u003Cpath fill=\"currentColor\" d=\"M17.079 12.5H5v-1h12.079l-5.792-5.792L12 5l7 7l-7 7l-.713-.708z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":311},"\u003Cpath fill=\"currentColor\" d=\"M4 17.27v-1h16v1zm0-4.77v-1h16v1zm0-4.77v-1h16v1z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":313},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M21 12h-8a1 1 0 1 0-1 1v8a9 9 0 0 0 9-9\"/>\u003Cpath d=\"M16 9a5 5 0 1 0-7 7\"/>\u003Cpath d=\"M20.486 9A9 9 0 1 0 9.004 20.495\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":315},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M8 13V5.5a1.5 1.5 0 0 1 3 0V12m0-6.5v-2a1.5 1.5 0 1 1 3 0V12m0-6.5a1.5 1.5 0 0 1 3 0V12\"/>\u003Cpath d=\"M17 7.5a1.5 1.5 0 0 1 3 0V16a6 6 0 0 1-6 6h-2h.208a6 6 0 0 1-5.012-2.7L7 19q-.468-.718-3.286-5.728a1.5 1.5 0 0 1 .536-2.022a1.87 1.87 0 0 1 2.28.28L8 13\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":317},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M7 20h10M6 6l6-1l6 1m-6-3v17m-3-8L6 6l-3 6a3 3 0 0 0 6 0m12 0l-3-6l-3 6a3 3 0 0 0 6 0\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":319},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M3 12a9 9 0 1 0 18 0a9 9 0 0 0-18 0m.6-3h16.8M3.6 15h16.8\"/>\u003Cpath d=\"M11.5 3a17 17 0 0 0 0 18m1-18a17 17 0 0 1 0 18\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":321},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M11 12a1 1 0 1 0 2 0a1 1 0 1 0-2 0\"/>\u003Cpath d=\"M15.51 15.56A5 5 0 1 0 12 17\"/>\u003Cpath d=\"M18.832 17.86A9 9 0 1 0 12 21m0-9v9\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":323},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M19 4v16H7a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2z\"/>\u003Cpath d=\"M19 16H7a2 2 0 0 0-2 2M9 8h6\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":325},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M8 12a4 4 0 1 0 8 0a4 4 0 1 0-8 0\"/>\u003Cpath d=\"M3 12a9 9 0 1 0 18 0a9 9 0 1 0-18 0m12 3l3.35 3.35M9 15l-3.35 3.35m0-12.7L9 9m9.35-3.35L15 9\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":327},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M17 7L7 17M8 7h9v9\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":329},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M10.325 4.317c.426-1.756 2.924-1.756 3.35 0a1.724 1.724 0 0 0 2.573 1.066c1.543-.94 3.31.826 2.37 2.37a1.724 1.724 0 0 0 1.065 2.572c1.756.426 1.756 2.924 0 3.35a1.724 1.724 0 0 0-1.066 2.573c.94 1.543-.826 3.31-2.37 2.37a1.724 1.724 0 0 0-2.572 1.065c-.426 1.756-2.924 1.756-3.35 0a1.724 1.724 0 0 0-2.573-1.066c-1.543.94-3.31-.826-2.37-2.37a1.724 1.724 0 0 0-1.065-2.572c-1.756-.426-1.756-2.924 0-3.35a1.724 1.724 0 0 0 1.066-2.573c-.94-1.543.826-3.31 2.37-2.37c1 .608 2.296.07 2.572-1.065\"/>\u003Cpath d=\"M9 12a3 3 0 1 0 6 0a3 3 0 0 0-6 0\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":331},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M11.46 20.846A12 12 0 0 1 3.5 6A12 12 0 0 0 12 3a12 12 0 0 0 8.5 3a12 12 0 0 1-.09 7.06M15 19l2 2l4-4\"/>",{"id":333,"status":16,"sort":9,"date_created":334,"date_updated":335,"user_created":336,"user_updated":336,"title":337,"slug":338,"publish_date":339,"summary":340,"body":341,"reading_time_override":9,"featured":12,"seo_title":9,"seo_description":9,"seo_canonical_url":9,"seo_noindex":12,"seo_nofollow":12,"search_boost":9,"search_exclude":12,"hero_image_attribution":342,"hero_image_photographer_url":343,"categories":344,"tags":414,"hero_image":425,"stock_image":9,"seo_social_image":9,"author":440},"b8db39fc-8cad-4e8b-a5e0-20439aa6aa58","2026-03-15T21:46:16.858Z","2026-03-21T00:41:54.669Z","d01e7b0b-322c-4e0e-852b-bf7d13527c96","How Do Proxy Technologies Enhance Security  Privacy?","how-do-proxy-technologies-enhance-security-privacy","2020-07-06T14:56:00","On the internet, proxy servers act as filters, passing requests from one server to another while making modifications to the communications more or less transparently. The basic principle of a proxy server is that it lets you interact with the internet while avoiding some of the risks or lightening the load because it’s standing between you and the rest of the world and looking out for you.","\u003Ch2>Use of Proxy Servers\u003C/h2>\n\n\u003Cp>On the internet, proxy servers act as filters, passing requests from one server to another while making modifications to the communications more or less transparently. The basic principle of a proxy server is that it lets you interact with the internet while avoiding some of the risks or lightening the load because it’s standing between you and the rest of the world and looking out for you.\u003C/p>\n\n\u003Cp>If you’re using a proxy, your internet requests go to the proxy server, which then passes them on (possibly modified) to the server you’re attempting to access. The same thing happens in reverse with inbound requests and communication.\u003C/p>\n\n\u003Cp>There’s a certain amount of concern out there about the downsides of proxies. First, anything you insert into your communications stream is an additional potential point of failure – and an extra possible attack surface. Second, there can be compatibility issues between proxy servers and some services, which require effort to resolve. And finally, for some users, proxy servers seem kind of disreputable(and a subset of them are).\u003C/p>\n\n\u003Cp>But here’s the thing: if you’re accessing the web from a corporate network or doing stuff on big websites, the chances are that you’re already doing a lot through proxies without even realizing it because they’re everywhere. And with respect to the concerns about additional points of failure and attack surfaces: if you work with a reputable proxy server provider, they have substantial resources and a focus on uptime, and they’re likely more resilient and more resistant to attack than your infrastructure is.\u003C/p>\n\n\u003Cp>The issue is worth thinking about, but the fact is that a good proxy provider will make you more resistant to attacks, not less. The situation with incompatibility is similar: a good provider will work with you to resolve it, and you can have those issues even without a proxy. The truth is, you’re always safer going through a robust proxy server than not.\u003C/p>\n\n\u003Ch2>Forward Proxies &amp; Reverse Proxies\u003C/h2>\n\n\u003Cp>A forward proxy is also known as a proxy server or web proxy. Typically, forward proxies sit in front of a group of client machines and intercept requests by those machines to the internet. They serve as a middle man to communicate to web servers on behalf of the client.\u003C/p>\n\n\u003Cp>Reverse proxies, by comparison, sit in front of one or more web servers to intercept requests from clients. Client requests are intercepted at the network edge so that no client request ever communicates directly with the origin server. For more information on the reverse proxies, see this \u003Ca href=\"https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/\" target=\"_blank\" rel=\"noopener noreferrer\" referrerpolicy=\"no-referrer\">reverse proxy resource page\u003C/a> from Cloudflare.\u003C/p>\n\n\u003Ch2>Benefits of Proxies\u003C/h2>\n\n\u003Cp>There are a number of important benefits proxies and reverse proxy technologies can provide. Here are just some of the functions a proxy can provide (in some cases, a single proxy server can do multiple things on this list for you):\u003C/p>\n\n\u003Ch3>Anonymizing\u003C/h3>\n\n\u003Cp>Let’s get this category out of the way first because it’s the one where some sketchy things are happening. An anonymizing proxy allows you to use sites on the web without identifying who you are, where you are, or any other facts about yourself you don’t want to share.\u003C/p>\n\n\u003Cp>Maintaining strict privacy can save lives if you live in a country with an authoritarian government that closely monitors its people and may persecute those engaging in restricted activities. It’s even helpful in less dangerous situations, though you have to balance the inconvenience against the benefits.\u003C/p>\n\n\u003Cp>Here’s where the potential sketchiness comes in: while the site you’re going to via the proxy doesn’t see your personal information, the people operating the proxy see \u003Cem>everything\u003C/em>, so you’d better be able to trust them.\u003C/p>\n\n\u003Cp>There are some well-known and reliable anonymous proxies out there, like the TOR Network, but you should avoid using ones where you don’t know who’s behind them. Also, make sure you use one where everything you send or receive is encrypted in transit, or the protection is completely illusionary.\u003C/p>\n\n\u003Ch3>Filtering\u003C/h3>\n\n\u003Cp>Another common type of proxy you can encounter is a content filter. These often exist between corporate networks and the internet and prevent users from accessing websites the company doesn’t want employees accessing from work.\u003C/p>\n\n\u003Cp>Some of these sites are banned because the content may be inappropriate. Still, others are forbidden because they present a risk of malware or because corporate security policies bar access to certain outside services from within the work environment.\u003C/p>\n\n\u003Cp>You’ll also find these in schools (where the focus is generally on “inappropriate content,” which can sometimes be defined in controversial ways) and occasionally implemented as parental controls on home internet use. These are primarily transparent, passing content unmodified in both directions, except that they will block access to a list of unapproved sites (or, in extreme cases, only allow access to a list of approved sites). Ironically, you may be able to get around one by using an anonymizing proxy if they don’t block them.\u003C/p>\n\n\u003Cp>A filtering proxy can also be designed to recognize text that includes specific patterns (like nine-digit numbers, which could be US social security numbers, medical diagnoses, or names, or code) to flag and/or block the movement of certain types of information outside an environment. In this case, the function is called “Digital Loss Prevention,” or DLP.\u003C/p>\n\n\u003Ch3>Caching\u003C/h3>\n\n\u003Cp>If you’re familiar with content delivery networks (CDNs) such as Akamai, they’re an example use of proxy technology. They hold cached copies of your web content in multiple locations near your users (in internet terms), so users who want to access it get it faster and without disruption.\u003C/p>\n\n\u003Cp>CDNs also provide capacity and load balancing to deliver your content through their servers to a vast number of users simultaneously. This use of proxy technology improves your site’s speed and leverages your bandwidth. Often, these providers will do some of the other things listed here, too, especially the security functions.\u003C/p>\n\n\u003Ch3>Security\u003C/h3>\n\n\u003Cp>Proxy servers can fulfill several security functions. Filtering (such as blocking of malicious sites) and anonymity (to protect your actual IP addresses), both discussed above, also fall under this category. So does malware scanning and detection and blocking of hostile activity directed at your site, like distributed denial of service (DDOS) attacks which could overwhelm your servers. You can also use a proxy server with a VPN, ensuring that employees only connect to your resources via a secure, encrypted channel.\u003C/p>\n\n\u003Ch3>Privacy\u003C/h3>\n\n\u003Cp>We have written at length on this blog about the acceleration of data and privacy breaches due to the growing use of third-party applications that control the key functionality of websites today.\u003C/p>\n\n\u003Cp>The use of a proxy server for enhancing and protecting privacy also overlaps with some of the use cases mentioned above. Anonymity, for example, provides obvious privacy benefits. But a privacy reverse proxy like Lokker’s provides an additional service: it can identify and replace specific elements of personal information with dummy data to pseudonymize or anonymized. This is a more sophisticated and flexible version of data loss prevention (DLP), which will alert or stop transmission but won’t transform the data in real-time.\u003C/p>\n\n\u003Cp>The Lokker reverse proxy also continuously maps data flows in and out of your environment and will alert you to changes in the third-party codebase, which directs the data or even steps in to stop any unauthorized dataflow. The Lokker privacy automation platform can enforce geographical restrictions on dataflows, such as not allowing personal data to travel to servers outside the EU if you serve visitors protected under GDPR privacy regulations.\u003C/p>\n\n\u003Ch2>Proven technology solving big problems\u003C/h2>\n\n\u003Cp>Many critical proxy technologies are being used continuously for cybersecurity, information security, privacy, and personal ID protection. The latest proxy tools help defend the most significant attack surface on the internet, namely client-side, third-party data app management.\u003C/p>\n\n\u003Cp>We at Lokker seek to advance these technologies so that the internet can remain a vital resource for good. We trust in privacy and believe companies who work to protect our privacy through technology will learn that doing the right thing is also very good for business.\u003C/p>","Photo by Brett Jordan on Unsplash","https://unsplash.com/@brett_jordan",[345],{"categories_id":346},{"id":347,"status":16,"sort":9,"date_created":348,"date_updated":9,"user_created":336,"user_updated":9,"name":137,"slug":139,"description":9,"category_type":139,"parent_category":9,"blog_posts":349,"whitepapers":413},"6414d638-0f20-4ac4-a09c-aebb86f309e5","2026-03-15T21:46:15.475Z",[212,218,224,230,236,242,250,253,259,17,273,278,350,302,24,30,36,42,48,54,60,66,71,77,83,89,95,101,107,118,124,142,165,171,351,352,353,176,182,187,193,354,355,356,357,358,359,360,361,362,363,364,365,366,367,368,369,370,371,372,373,374,375,376,377,378,379,380,381,382,383,384,385,386,387,388,389,390,391,392,393,394,395,396,397,398,399,400,401,402,403,404,405,406,407,408,409,410,411,412],23,47,48,49,54,57,58,59,60,63,64,65,66,67,68,69,70,73,74,75,76,77,78,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,118,120,122,124,125,126,127,128,129,130,131,132,133,134,135,136,138,139,140,141,142,144,145,147,[],[415],{"tags_id":416},{"id":417,"status":16,"sort":239,"date_created":418,"date_updated":9,"user_created":336,"user_updated":9,"name":419,"slug":420,"description":9,"blog_posts":421},"59367562-8f64-43ff-a913-c3f714802a96","2026-03-15T21:46:15.828Z","Web and Cloud Architecture","web-and-cloud-architecture",[422,423,424],99,100,169,{"id":426,"storage":427,"filename_disk":428,"filename_download":429,"title":430,"type":431,"folder":432,"uploaded_by":336,"created_on":433,"modified_by":434,"modified_on":435,"charset":9,"filesize":436,"width":297,"height":437,"duration":9,"embed":9,"description":9,"location":9,"tags":9,"metadata":438,"focal_point_x":9,"focal_point_y":9,"tus_id":9,"tus_data":9,"uploaded_on":439},"328b5f6a-2114-4f3a-8e2b-cd62af0bf154","local","328b5f6a-2114-4f3a-8e2b-cd62af0bf154.jpg","secure-data-storage.jpg","Secure Data Storage","image/jpeg","b4c82ed5-9523-40e8-9496-69840a2524a3","2026-03-21T00:41:26.689Z","35bfe58e-4c3f-41fa-b3dd-7000fe249faf","2026-04-16T20:24:15.739Z","141527",810,{},"2026-03-21T00:41:26.708Z",{"id":441,"status":16,"sort":9,"date_created":442,"date_updated":9,"user_created":336,"user_updated":9,"name":443,"slug":444,"job_title":9,"bio_short":9,"bio_full":9,"email_public":9,"linkedin_url":9,"x_url":9,"youtube_url":9,"website_url":9,"featured":12,"about_section":9,"headshot":9},"23a86091-4092-4ac8-922d-7c8d75f94194","2026-03-15T21:46:15.374Z","Kaitlyn Fisher","kaitlyn",{"categories":446,"tags":457},[447,448,451,454],{"slug":139,"name":137,"count":118},{"slug":449,"name":450,"count":200},"infographic","Infographic",{"slug":452,"name":453,"count":203},"latest-news","Latest News",{"slug":455,"name":456,"count":218},"video","Video",[458,461,464,467,470,472,475,476,479,481,484,485],{"slug":459,"name":460,"count":209},"consent-management","Consent Management",{"slug":462,"name":463,"count":242},"consumer-privacy","Consumer Privacy",{"slug":465,"name":466,"count":206},"emerging-risks","Emerging Risks",{"slug":468,"name":469,"count":203},"featured","Featured",{"slug":471,"name":471,"count":200},"GPC",{"slug":473,"name":474,"count":200},"health-care","Health Care",{"slug":92,"name":90,"count":203},{"slug":477,"name":478,"count":218},"marketing-and-ad-tech","Marketing and Ad Tech",{"slug":480,"name":480,"count":200},"Privacy Compliance",{"slug":482,"name":483,"count":259},"privacy-regulations","Privacy Regulations",{"slug":420,"name":419,"count":200},{"slug":486,"name":486,"count":200},"Web Governance",[488,516,542,563,576],{"id":489,"title":490,"slug":491,"publish_date":492,"summary":493,"featured":12,"hero_image":494,"stock_image":9,"author":499,"categories":504,"tags":507},"8bda2a57-2372-4e94-903b-bb22c79c5b4d","Is Your Website Ignoring the Digital Handshake?","gpc-compliance-digital-handshake","2026-04-17T12:00:00","Global Privacy Control (GPC) has evolved from a niche browser setting into a critical legal mandate that regulators now enforce through \"outside-in\" technical audits. It is no longer enough to have a compliant privacy policy; organizations must ensure their website’s code actually honors these automated opt-out signals at the network layer to avoid costly settlements and misrepresentation charges. Lokker bridges this gap by providing real-time, network-layer enforcement that blocks unauthorized data flows and generates the technical evidence required to prove that a company’s privacy promises match its actual website behavior.",{"id":495,"title":496,"width":497,"height":498},"95607546-9002-4cae-b495-ea212aecd93f","Premium Photo 1676618539992 21c7d3b6df0f",3132,1762,{"name":500,"slug":501,"headshot":502},"Jocelyne De La Cruz","jocelyne-de-la-cruz",{"id":503},"b5c8b5c5-5579-49f3-a3c3-0e9c89873aa4",[505],{"categories_id":506},{"name":137,"slug":139},[508,510,512,514],{"tags_id":509},{"name":480,"slug":480},{"tags_id":511},{"name":486,"slug":486},{"tags_id":513},{"name":471,"slug":471},{"tags_id":515},{"name":463,"slug":462},{"id":517,"title":518,"slug":519,"publish_date":492,"summary":520,"featured":12,"hero_image":521,"stock_image":525,"author":527,"categories":532,"tags":535},"3db571af-cdd7-4dfc-a43a-a2fc3a0414e9","You Still Can’t See or Control Your Website","you-still-cant-see-or-control-your-website","Companies believe they have control over data collection through policies, consent tools, and governance, but in practice, they lack visibility into what actually executes in the browser. Modern websites are dynamic and constantly changing, creating a growing gap between intended behavior and real data flows. Without continuous, real-time insight and control at the point of collection and execution, organizations are operating on assumptions, leaving them exposed to unseen risk and liability.",{"id":522,"title":523,"width":297,"height":524},"6f25951e-b8a8-4eab-86a2-824c6dc5d838","Privacy Notice Disclosure",443,{"image":526},{"id":522},{"name":528,"slug":529,"headshot":530},"Ian Cohen","ian-cohen",{"id":531},"3551c919-254a-4669-8d25-e37e9a0f2f73",[533],{"categories_id":534},{"name":137,"slug":139},[536,538,540],{"tags_id":537},{"name":463,"slug":462},{"tags_id":539},{"name":460,"slug":459},{"tags_id":541},{"name":483,"slug":482},{"id":543,"title":544,"slug":545,"publish_date":546,"summary":547,"featured":12,"hero_image":548,"stock_image":9,"author":552,"categories":555,"tags":560},"7137075f-e0eb-4ff3-a895-3632d36e0166","Check out Marsh’s latest webinar featuring Troutman Pepper and LOKKER!","check-out-marshs-latest-webinar-featuring-troutman-pepper-and-lokker","2025-10-22T12:27:05","We were proud to join our partners at Marsh and Troutman Pepper for an in-depth discussion on evolving privacy regulations and the growing risks surrounding website tracking technologies. Hear from our CEO, Ian Cohen, alongside leading experts in privacy law and cyber-risk, as they discuss practical strategies organizations can take today to mitigate regulatory exposure […]",{"id":549,"title":550,"width":297,"height":551},"3a9e781e-c5a6-42f7-9e50-71dea6b58fe8","Opt in Opt out Toggle",850,{"name":553,"slug":554,"headshot":9},"Sebastian Crumpacker","sebastianlokker-com",[556,558],{"categories_id":557},{"name":453,"slug":452},{"categories_id":559},{"name":456,"slug":455},[561],{"tags_id":562},{"name":463,"slug":462},{"id":564,"title":31,"slug":565,"publish_date":566,"summary":567,"featured":12,"hero_image":568,"stock_image":9,"author":571,"categories":574,"tags":575},"a60ed511-7d31-49c6-91ea-da176d1096d1","privacy-teams","2025-05-06T12:00:00","Cross-Functional Issues with Data Privacy As privacy regulations rapidly evolve and enforcement intensifies, organizations are discovering that managing data privacy cannot be confined to the legal department alone. Cross-functional collaboration—between legal, engineering/IT, marketing, and privacy teams—is no longer optional. This outlines the key challenges, misalignments, and practical strategies organizations can adopt to build aligned, effective […]",{"id":569,"title":570,"width":297,"height":298},"35fe4bc2-e15b-411c-bb31-e1ad7018ecdb","Litigation Risk Exposure",{"name":572,"slug":573,"headshot":9},"Randy Peterson","randy",[],[],{"id":577,"title":578,"slug":579,"publish_date":580,"summary":581,"featured":12,"hero_image":582,"stock_image":9,"author":586,"categories":587,"tags":592},"5dea87b3-6ae4-4181-9ed0-b7d2000b3a1d","Understanding VPPA Privacy Risks","understanding-vppa-privacy-risks","2025-04-15T12:22:26","Background In 1988, while being confirmed as a Supreme Court justice, Robert Bork’s video rental records were published by the Washington City Papers. Soon after, Congress passed the Video Privacy Protection Act of 1988. This is a U.S. federal law meant to protect the privacy of consumers' video rental history. It prohibits video service providers […]",{"id":583,"title":584,"width":297,"height":585},"b5693d55-2128-41bc-9cfe-4d1ff41dd882","Firewall Protection",608,{"name":572,"slug":573,"headshot":9},[588,590],{"categories_id":589},{"name":137,"slug":139},{"categories_id":591},{"name":456,"slug":455},[593,595],{"tags_id":594},{"name":463,"slug":462},{"tags_id":596},{"name":483,"slug":482},{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":598},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M14 4h6v6h-6zM4 14h6v6H4zm10 3a3 3 0 1 0 6 0a3 3 0 1 0-6 0M4 7a3 3 0 1 0 6 0a3 3 0 1 0-6 0\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":600},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 7a4 4 0 1 0 8 0a4 4 0 0 0-8 0M6 21v-2a4 4 0 0 1 4-4h4a4 4 0 0 1 4 4v2\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":602},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M4 7a2 2 0 0 1 2-2h12a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H6a2 2 0 0 1-2-2zm12-4v4M8 3v4m-4 4h16m-9 4h1m0 0v3\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":604},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M3 8v4.172a2 2 0 0 0 .586 1.414l5.71 5.71a2.41 2.41 0 0 0 3.408 0l3.592-3.592a2.41 2.41 0 0 0 0-3.408l-5.71-5.71A2 2 0 0 0 9.172 6H5a2 2 0 0 0-2 2\"/>\u003Cpath d=\"m18 19l1.592-1.592a4.82 4.82 0 0 0 0-6.816L15 6m-8 4h-.01\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":606},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 12h14M5 12l6 6m-6-6l6-6\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":608},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M11.217 19.384A3.501 3.501 0 0 0 18 18.167V13l-6-3.35\"/>\u003Cpath d=\"M5.214 15.014A3.501 3.501 0 0 0 9.66 20.28L14 17.746V10.8\"/>\u003Cpath d=\"M6 7.63c-1.391-.236-2.787.395-3.534 1.689a3.474 3.474 0 0 0 1.271 4.745L8 16.578l6-3.348\"/>\u003Cpath d=\"M12.783 4.616A3.501 3.501 0 0 0 6 5.833V10.9l6 3.45\"/>\u003Cpath d=\"M18.786 8.986A3.501 3.501 0 0 0 14.34 3.72L10 6.254V13.2\"/>\u003Cpath d=\"M18 16.302c1.391.236 2.787-.395 3.534-1.689a3.474 3.474 0 0 0-1.271-4.745l-4.308-2.514L10 10.774\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":610},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M12 12v.01m7.071-7.081c-1.562-1.562-6 .337-9.9 4.243c-3.905 3.905-5.804 8.337-4.242 9.9c1.562 1.561 6-.338 9.9-4.244c3.905-3.905 5.804-8.337 4.242-9.9\"/>\u003Cpath d=\"M4.929 4.929c-1.562 1.562.337 6 4.243 9.9c3.905 3.905 8.337 5.804 9.9 4.242c1.561-1.562-.338-6-4.244-9.9c-3.905-3.905-8.337-5.804-9.9-4.242\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":612},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M13 3v7h6l-8 11v-7H5z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":614},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M5 7.2A2.2 2.2 0 0 1 7.2 5h1a2.2 2.2 0 0 0 1.55-.64l.7-.7a2.2 2.2 0 0 1 3.12 0l.7.7c.412.41.97.64 1.55.64h1a2.2 2.2 0 0 1 2.2 2.2v1c0 .58.23 1.138.64 1.55l.7.7a2.2 2.2 0 0 1 0 3.12l-.7.7a2.2 2.2 0 0 0-.64 1.55v1a2.2 2.2 0 0 1-2.2 2.2h-1a2.2 2.2 0 0 0-1.55.64l-.7.7a2.2 2.2 0 0 1-3.12 0l-.7-.7a2.2 2.2 0 0 0-1.55-.64h-1a2.2 2.2 0 0 1-2.2-2.2v-1a2.2 2.2 0 0 0-.64-1.55l-.7-.7a2.2 2.2 0 0 1 0-3.12l.7-.7A2.2 2.2 0 0 0 5 8.2z\"/>\u003Cpath d=\"m9 12l2 2l4-4\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":616},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M20.945 11a9 9 0 1 1-3.284-5.997l-2.655 2.392A5.5 5.5 0 1 0 17.125 14H13v-3z\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":618},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 4h4l3 3h7a2 2 0 0 1 2 2v8a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":620},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m5 12l5 5L20 7\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":622},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M3 6a2 2 0 0 1 2-2h14a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2zm4 2h10M7 12h10M7 16h10\"/>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":624},"\u003Cg fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\">\u003Cpath d=\"M4 7a2 2 0 0 1 2-2h12a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H6a2 2 0 0 1-2-2zm12-4v4M8 3v4m-4 4h16\"/>\u003Cpath d=\"M8 15h2v2H8z\"/>\u003C/g>",{"left":301,"top":301,"width":302,"height":302,"rotate":301,"vFlip":12,"hFlip":12,"body":626},"\u003Cpath fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"m9 6l6 6l-6 6\"/>"]