{"id":10929,"date":"2013-06-06T19:20:19","date_gmt":"2013-06-06T12:20:19","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2013\/06\/06\/movie-review-we-steal-secrets-the-story-of-wikileaks-minneapolis-star-tribune\/"},"modified":"2013-06-06T19:20:19","modified_gmt":"2013-06-06T12:20:19","slug":"movie-review-we-steal-secrets-the-story-of-wikileaks-minneapolis-star-tribune","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2013\/06\/movie-review-we-steal-secrets-the-story-of-wikileaks-minneapolis-star-tribune\/","title":{"rendered":"Movie review: &quot;We Steal Secrets: The Story of WikiLeaks\u201d &#8211; Minneapolis Star Tribune"},"content":{"rendered":"<p> Movie review: &#8220;We Steal Secrets: The Story of WikiLeaks \u201d Minneapolis Star Tribune So when one plummets as spectacularly as did WikiLeaks founder Julian Assange, we want to know why. In the long but concise \u201cWe Steal Secrets: The Story of WikiLeaks ,\u201d Oscar-winning documentarian Alex Gibney avoids pat judgments while expertly ..<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/stmedia.startribune.com\/designimages\/btn_close.png\" \/><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;usg=AFQjCNFZAYlQBZnTaiBsG52Zo2uq9EcszA&amp;url=http:\/\/www.startribune.com\/entertainment\/movies\/210450831.html\" title=\"Movie review: &quot;We Steal Secrets: The Story of WikiLeaks\u201d - Minneapolis Star Tribune\">Movie review: &quot;We Steal Secrets: The Story of WikiLeaks\u201d &#8211; Minneapolis Star Tribune<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Movie review: &#8220;We Steal Secrets: The Story of WikiLeaks \u201d Minneapolis Star Tribune So when one plummets as spectacularly as did WikiLeaks founder Julian Assange, we want to know why. In the long but concise \u201cWe Steal Secrets: The Story of WikiLeaks ,\u201d Oscar-winning documentarian Alex Gibney avoids pat judgments while expertly ..<\/p>\n","protected":false},"author":439,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[162,6,260],"tags":[39,209],"class_list":["post-10929","post","type-post","status-publish","format-standard","hentry","category-ddos-security","category-m","category-wikileak-security","tag-hacker","tag-wikileak"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-2Qh","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/10929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=10929"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/10929\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=10929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=10929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=10929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}