{"version":"1.2.0","chapters":[{"startTime":0,"endTime":37.59},{"startTime":37.59,"endTime":48.95},{"startTime":48.95,"endTime":164.712,"title":"Understanding Phone Security Risks"},{"startTime":164.712,"endTime":578.905,"title":"Navigating Phone Security"},{"startTime":578.905,"endTime":795.91,"title":"Understanding Phone Security Risks"},{"startTime":795.91,"endTime":1367.494,"title":"Understanding Cyber Threats: From SMS Attacks to AI Deception"},{"startTime":1367.494,"endTime":1580.46,"title":"Understanding Smartphone Security: The Importance of Awareness"},{"startTime":1580.46,"endTime":1888.762,"title":"Protecting Your Phone: Essential Steps"},{"startTime":1888.762,"endTime":2367.528,"title":"Mobile Security Best Practices"},{"startTime":2367.528,"endTime":2460.222,"title":"Transitioning from Phone Security to Faith and Finance"}]}