
{"id":2155,"date":"2021-09-09T03:39:14","date_gmt":"2021-09-09T01:39:14","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=2155"},"modified":"2021-09-09T03:45:24","modified_gmt":"2021-09-09T01:45:24","slug":"les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/","title":{"rendered":"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"450\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/image-4.png\" alt=\"\" class=\"wp-image-2156\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/image-4.png 799w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/image-4-300x169.png 300w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/image-4-768x433.png 768w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>L\u2019ex\u00e9cution d\u2019un malware dans la m\u00e9moire d\u2019un GPU permet de contourner le scan de s\u00e9curit\u00e9 de la RAM du PC. Une technique qui provient, \u00e0 l\u2019origine, de travaux universitaires.<\/strong><\/p>\n\n\n\n<p>Un nouveau genre de malware commence \u00e0 \u00e9merger sur les forums de hackers. Le site Bleeping Computer a d\u00e9tect\u00e9, pour la premi\u00e8re fois, la vente d\u2019une preuve de concept permettant d\u2019ex\u00e9cuter un code malveillant dans la m\u00e9moire d\u2019une carte graphique d\u2019un ordinateur Windows.<\/p>\n\n\n\n<p>Cette fa\u00e7on de faire aurait l\u2019avantage de contourner les outils de s\u00e9curit\u00e9 qui scannent la m\u00e9moire RAM pour d\u00e9tecter des malwares. Pour que \u00e7a marche, il faut toutefois que le syst\u00e8me supporte le framework OpenCL&nbsp;v2 ou sup\u00e9rieur. Le vendeur souligne avoir test\u00e9 avec succ\u00e8s cette technique sur diverss circuits graphiques du commerce dont l&rsquo;Intel UHD 620\/630, la Radeon RX&nbsp;5700 ou la GeForce GTX&nbsp;1650.<\/p>\n\n\n\n<p>La vente aurait \u00e9t\u00e9 effectu\u00e9e le 25&nbsp;ao\u00fbt dernier, un peu plus de deux semaines apr\u00e8s la premi\u00e8re diffusion de l\u2019annonce. Le prix n\u2019a \u00e9videmment pas \u00e9t\u00e9 divulgu\u00e9. L\u2019identit\u00e9 des parties prenantes est \u00e9galement inconnue. Des chercheurs en s\u00e9curit\u00e9 de VX Underground ont apparemment pu mettre la main sur la preuve de concept. Ils devraient \u00ab&nbsp;bient\u00f4t&nbsp;\u00bb publier une d\u00e9monstration technique.<\/p>\n\n\n\n<p>En r\u00e9alit\u00e9, cette technique d\u2019ex\u00e9cution dans une carte graphique n\u2019est pas totalement nouvelle. Il y a six ans, des chercheurs en s\u00e9curit\u00e9 avait d\u00e9j\u00e0 cr\u00e9\u00e9 un rootkit pour Linux baptis\u00e9 \u00ab&nbsp;JellyFish&nbsp;\u00bb, capable de s\u2019ex\u00e9cuter dans une carte graphique. Ils ont \u00e9galement cr\u00e9\u00e9 pour Windows un rootkit et un enregistreur de frappe qui s\u2019ex\u00e9cutent dans un GPU. Tous ces codes sont disponibles sur&nbsp;<a href=\"https:\/\/github.com\/nwork\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>. La piste d\u2019une ex\u00e9cution de code malveillant sur le GPU avait \u00e9galement \u00e9t\u00e9 explor\u00e9e quelques ann\u00e9es auparavant par&nbsp;<a href=\"http:\/\/www.cs.columbia.edu\/~mikepo\/papers\/gpukeylogger.eurosec13.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">un groupe de chercheur<\/a>s de Hellas Institute of Computer Science et Columbia University.<\/p>\n\n\n\n<p>Il semblerait donc \u2014 et c\u2019est la v\u00e9ritable nouveaut\u00e9 \u2014 que ce travail universitaire commence \u00e0 \u00eatre mis en application par les pirates. Ce qui est plut\u00f4t inqui\u00e9tant.<\/p>\n\n\n\n<p>Source:&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cybercriminal-sells-tool-to-hide-malware-in-amd-nvidia-gpus\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019ex\u00e9cution d\u2019un malware dans la m\u00e9moire d\u2019un GPU permet de contourner le scan de s\u00e9curit\u00e9 de la RAM du PC. Une technique qui provient, \u00e0 l\u2019origine, de travaux universitaires. Un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11,196],"tags":[],"class_list":["post-2155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"L\u2019ex\u00e9cution d\u2019un malware dans la m\u00e9moire d\u2019un GPU permet de contourner le scan de s\u00e9curit\u00e9 de la RAM du PC. Une technique qui provient, \u00e0 l\u2019origine, de travaux universitaires. Un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-09T01:39:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-09T01:45:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/at-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques\",\"datePublished\":\"2021-09-09T01:39:14+00:00\",\"dateModified\":\"2021-09-09T01:45:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/\"},\"wordCount\":388,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/at-6.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/\",\"name\":\"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/at-6.jpg\",\"datePublished\":\"2021-09-09T01:39:14+00:00\",\"dateModified\":\"2021-09-09T01:45:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/at-6.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/at-6.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/09\\\/09\\\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/","og_locale":"fr_FR","og_type":"article","og_title":"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques - Parlons Techs - Store","og_description":"L\u2019ex\u00e9cution d\u2019un malware dans la m\u00e9moire d\u2019un GPU permet de contourner le scan de s\u00e9curit\u00e9 de la RAM du PC. Une technique qui provient, \u00e0 l\u2019origine, de travaux universitaires. Un [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-09-09T01:39:14+00:00","article_modified_time":"2021-09-09T01:45:24+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/at-6.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques","datePublished":"2021-09-09T01:39:14+00:00","dateModified":"2021-09-09T01:45:24+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/"},"wordCount":388,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/at-6.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/","url":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/","name":"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/at-6.jpg","datePublished":"2021-09-09T01:39:14+00:00","dateModified":"2021-09-09T01:45:24+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/at-6.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/09\/at-6.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/09\/09\/les-pirates-planquent-desormais-leurs-malwares-dans-les-cartes-graphiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Les pirates planquent d\u00e9sormais leurs malwares dans les cartes graphiques"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=2155"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2155\/revisions"}],"predecessor-version":[{"id":2157,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2155\/revisions\/2157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/2158"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=2155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=2155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=2155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}