I did some deeper digging.
This site uses a magento plugin made by a security team in the Netherlands that heavily obfuscates their javascript
The code that streams the video is here:
<div+id=‘07b02207602203a02205003607004307406804c04a03007503803002207d’+style=‘height:450px;width:720px’>
</div>
<script+data-cfasync=‘false’+src=‘data:text/javascript;base64,dmFyIHBhID0gZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgnc2NyaXB0Jyk7IAp2YXIgcyA9IGRvY3VtZW50LmdldEVsZW1lbnRzQnlUYWdOYW1lKCdzY3JpcHQnKVswXTsgCiAgICBwYS5zcmMgPSAnaHR0cHM6Ly9zdG9yYWdlLmdvb2dsZWFwaXMuY29tL2xvYWRlcm1haW4uYXBwc3BvdC5jb20vbWFpbi5qcyc7CiAgICBzLnBhcmVudE5vZGUuaW5zZXJ0QmVmb3JlKHBhLCBzKTs=’>
var pa = document.createElement(‘script’);
var s = document.getElementsByTagName(‘script’)[0];
pa.src = ‘https://storage.googleapis.com/loadermain.appspot.com/main.js’;
s.parentNode.insertBefore(pa, s);
The code in that google link is completely obfuscated. It can be reversed mostly. But it’s clear they decided to screw performance in favor of security.
It likely possible to get the video, but it’s frankly easier to just record the screen at this point.