{"id":"/@cryptography-tech/","name":"cryptography-tech","short_name":"cryptography-tech","description":"Technical exploration of cryptographic primitives, zero-knowledge proofs, and privacy technologies","start_url":"/@cryptography-tech/","scope":"/@cryptography-tech/","icons":[{"src":"https://storage.googleapis.com/papyrus_images/05a9100291b55b8cc94d048d76032a8e8192c7e5130eebd9876c67f6b52cf358.jpg"},{"src":"/web-app-manifest-192x192.png","sizes":"192x192","type":"image/png","purpose":"maskable"},{"src":"/web-app-manifest-512x512.png","sizes":"512x512","type":"image/png","purpose":"maskable"}],"theme_color":"#ffffff","background_color":"#ffffff","display":"standalone"}