
{"id":1247,"date":"2021-04-12T17:46:19","date_gmt":"2021-04-12T15:46:19","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=1247"},"modified":"2021-04-12T17:46:20","modified_gmt":"2021-04-12T15:46:20","slug":"zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/","title":{"rendered":"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1322sT.img?h=512&amp;w=799&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Illustration - Zoom\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>PIRATAGE &#8211;\u00a0Trois importantes failles de s\u00e9curit\u00e9 permettant de prendre le contr\u00f4le d\u2019un PC ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel Zoom<\/strong><\/p>\n\n\n\n<p>Suite \u00e0 leur large diffusion \u00e0 la faveur de l\u2019\u00e9pid\u00e9mie mondiale de coronavirus, les outils de\u00a0visioconf\u00e9rence\u00a0\u00e9taient le nouveau sujet phare du concours de hacking Pwn2Own\u00a02021. Lors de cet \u00e9v\u00e9nement qui s\u2019est d\u00e9roul\u00e9 cette semaine, plusieurs failles importantes de s\u00e9curit\u00e9 ont \u00e9t\u00e9 d\u00e9couvertes \u00e0 l\u2019int\u00e9rieur du logiciel\u00a0Zoom\u00a0et du logiciel Microsoft Teams, rapporte un article de\u00a0<em><a href=\"https:\/\/www.techradar.com\/news\/zoom-security-flaws-could-let-hackers-take-over-your-laptop\" target=\"_blank\" rel=\"noreferrer noopener\">TechRadar<\/a><\/em>rep\u00e9r\u00e9 par\u00a0<em><a href=\"https:\/\/www.phonandroid.com\/zoom-est-victime-dune-serie-de-failles-qui-donnent-aux-pirates-un-acces-total-a-votre-pc.html\" target=\"_blank\" rel=\"noreferrer noopener\">Phonandroid<\/a><\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prendre le contr\u00f4le d\u2019un PC via Zoom<\/h2>\n\n\n\n<p>Des hackeurs \u00e9thiques&nbsp;ont en effet d\u00e9couvert trois failles de s\u00e9curit\u00e9 \u00ab&nbsp;zero-day&nbsp;\u00bb \u00e0 l\u2019int\u00e9rieur du logiciel Zoom. En les combinant, ils&nbsp;ont pu d\u00e9montrer qu\u2019ils pouvaient prendre le contr\u00f4le d\u2019un PC \u00e0 distance sans que l\u2019utilisateur n\u2019ait rien \u00e0 faire.&nbsp;L\u2019\u00e9quipe a ainsi pu avoir acc\u00e8s \u00e0 la webcam et au microphone du PC, \u00e0 l\u2019ensemble des fichiers de l\u2019ordinateur et a pu t\u00e9l\u00e9charger l\u2019historique du navigateur Web.<\/p>\n\n\n\n<p>Suite \u00e0 leur d\u00e9couverte, le duo a re\u00e7u un prix de 200.000 dollars. Comme le veut la r\u00e8gle du concours, l\u2019entreprise en charge de Zoom a d\u00e9sormais 90 jours pour produire un correctif, d\u00e9j\u00e0 annonc\u00e9 par la firme.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft Teams aussi<\/h2>\n\n\n\n<p>Au cours de ce Pwn2Own 2021, des failles de s\u00e9curit\u00e9 ont \u00e9galement \u00e9t\u00e9 d\u00e9couvertes sur un autre logiciel de visioconf\u00e9rence&nbsp;:&nbsp;Microsoft Teams. En les combinant, elles permettent \u00e0 un hackeur d\u2019ex\u00e9cuter du code arbitraire sur le PC de la victime.<\/p>\n\n\n\n<p>L\u00e0 aussi, cette d\u00e9couverte a \u00e9t\u00e9 r\u00e9compens\u00e9e par une somme de 200.000 dollars et Microsoft a annonc\u00e9 produire un correctif \u00e0 ces failles dans les prochains jours.<\/p>\n\n\n\n<p>20Minutes<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PIRATAGE &#8211;\u00a0Trois importantes failles de s\u00e9curit\u00e9 permettant de prendre le contr\u00f4le d\u2019un PC ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel Zoom Suite \u00e0 leur large diffusion \u00e0 la faveur de l\u2019\u00e9pid\u00e9mie [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1248,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11,10,12],"tags":[],"class_list":["post-1247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","category-data-stockage","category-logiciels"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"PIRATAGE &#8211;\u00a0Trois importantes failles de s\u00e9curit\u00e9 permettant de prendre le contr\u00f4le d\u2019un PC ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel Zoom Suite \u00e0 leur large diffusion \u00e0 la faveur de l\u2019\u00e9pid\u00e9mie [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-12T15:46:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T15:46:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur\",\"datePublished\":\"2021-04-12T15:46:19+00:00\",\"dateModified\":\"2021-04-12T15:46:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/\"},\"wordCount\":323,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-15.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\",\"Data &amp; Stockage\",\"Logiciels\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/\",\"name\":\"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-15.jpg\",\"datePublished\":\"2021-04-12T15:46:19+00:00\",\"dateModified\":\"2021-04-12T15:46:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-15.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-15.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/12\\\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/","og_locale":"fr_FR","og_type":"article","og_title":"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur - Parlons Techs - Store","og_description":"PIRATAGE &#8211;\u00a0Trois importantes failles de s\u00e9curit\u00e9 permettant de prendre le contr\u00f4le d\u2019un PC ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel Zoom Suite \u00e0 leur large diffusion \u00e0 la faveur de l\u2019\u00e9pid\u00e9mie [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-04-12T15:46:19+00:00","article_modified_time":"2021-04-12T15:46:20+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-15.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur","datePublished":"2021-04-12T15:46:19+00:00","dateModified":"2021-04-12T15:46:20+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/"},"wordCount":323,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-15.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9","Data &amp; Stockage","Logiciels"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/","url":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/","name":"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-15.jpg","datePublished":"2021-04-12T15:46:19+00:00","dateModified":"2021-04-12T15:46:20+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-15.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-15.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/12\/zoom-des-failles-permettent-a-des-hackers-de-prendre-le-controle-de-votre-ordinateur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Zoom : Des failles permettent \u00e0 des hackers de prendre le contr\u00f4le de votre ordinateur"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=1247"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1247\/revisions"}],"predecessor-version":[{"id":1249,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1247\/revisions\/1249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/1248"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=1247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=1247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=1247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}