
{"id":2846,"date":"2022-04-26T16:49:07","date_gmt":"2022-04-26T14:49:07","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=2846"},"modified":"2022-04-26T16:49:51","modified_gmt":"2022-04-26T14:49:51","slug":"on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/","title":{"rendered":"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img.bfmtv.com\/c\/630\/420\/e0359\/ff733a80f1eea22f1c43febcc34.jpg\" alt=\"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0  un seul fichier son\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Des failles ont \u00e9t\u00e9 trouv\u00e9es dans la version open source du codec Apple Lossless Audio Codec. Elle n\u2019a jamais eu de mises \u00e0 jour de s\u00e9curit\u00e9 depuis&#8230; 2011.<\/strong><\/p>\n\n\n\n<p>Les chercheurs en s\u00e9curit\u00e9 de Check Point ont trouv\u00e9 des failles critiques dans une large gamme de d\u00e9codeurs audio de Qualcomm (CVE-2021-30351) et MediaTek (CV-2021-0674, CVE-2021-0675).<\/p>\n\n\n\n<p>Ces vuln\u00e9rabilit\u00e9s permettraient de prendre le contr\u00f4le \u00e0 distance d\u2019un smartphone Android. Il suffirait pour cela d\u2019envoyer un fichier son pi\u00e9g\u00e9 au format Apple Lossless Audio Codec (ALAC). Aussit\u00f4t, le pirate pourrait ex\u00e9cuter du code arbitraire \u00e0 distance sur le terminal et, le cas \u00e9ch\u00e9ant, espionner les conversations de l\u2019utilisateur ou le filmer \u00e0 son insu. Une attaque que les chercheurs ont baptis\u00e9e \u00ab&nbsp;ALHACK&nbsp;\u00bb, en r\u00e9f\u00e9rence au format d\u2019Apple.<\/p>\n\n\n\n<p>Qualcomm et MediaTek \u00e9tant les principaux fournisseurs de codecs dans le march\u00e9 des smartphones Android, ces failles affectent des dizaines de millions d\u2019appareils.<\/p>\n\n\n\n<p>Pour la seule ann\u00e9e&nbsp;2021, Check Point estime que deux tiers des smartphones Android vendus sont vuln\u00e9rables. La bonne nouvelle, c\u2019est que les deux fabricants ont diffus\u00e9s des patches en d\u00e9cembre dernier. Il faut maintenant esp\u00e9rer que les constructeurs les aient bien int\u00e9gr\u00e9s dans leurs mises \u00e0 jour depuis.<\/p>\n\n\n\n<p id=\"continueReadBreak\">Check Point devrait donnera les d\u00e9tails techniques sur ces failles en mai prochain, \u00e0 l\u2019occasion de la conf\u00e9rence CanSecWest\u00a02022. Ce que l\u2019on sait d\u00e9j\u00e0, en revanche, c\u2019est que ces failles proviennent de la version <em>open source<\/em> du codec ALAC qu\u2019Apple a publi\u00e9 en 2011.<\/p>\n\n\n\n<p>Ce code partag\u00e9 permet aux \u00e9quipements non-Apple de supporter ce format audio. Le probl\u00e8me, c\u2019est que personne ne s\u2019en occupe vraiment. Selon Check Point, il n\u2019a jamais eu de patches de s\u00e9curit\u00e9, alors que la version propri\u00e9taire utilis\u00e9e par Apple continue d\u2019\u00eatre mise \u00e0 jour r\u00e9guli\u00e8rement. Une n\u00e9gligence&nbsp;dont les cons\u00e9quences n\u00e9fastes se font maintenant ressentir.<\/p>\n\n\n\n<p><strong>Source&nbsp;<\/strong>: <a href=\"https:\/\/blog.checkpoint.com\/2022\/04\/21\/largest-mobile-chipset-manufacturers-used-vulnerable-audio-decoder-2-3-of-android-users-privacy-around-the-world-were-at-risk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des failles ont \u00e9t\u00e9 trouv\u00e9es dans la version open source du codec Apple Lossless Audio Codec. Elle n\u2019a jamais eu de mises \u00e0 jour de s\u00e9curit\u00e9 depuis&#8230; 2011. Les chercheurs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11,196],"tags":[],"class_list":["post-2846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Des failles ont \u00e9t\u00e9 trouv\u00e9es dans la version open source du codec Apple Lossless Audio Codec. Elle n\u2019a jamais eu de mises \u00e0 jour de s\u00e9curit\u00e9 depuis&#8230; 2011. Les chercheurs [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T14:49:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-26T14:49:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/04\/ab-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son\",\"datePublished\":\"2022-04-26T14:49:07+00:00\",\"dateModified\":\"2022-04-26T14:49:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/\"},\"wordCount\":360,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ab-11.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/\",\"name\":\"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ab-11.jpg\",\"datePublished\":\"2022-04-26T14:49:07+00:00\",\"dateModified\":\"2022-04-26T14:49:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ab-11.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/ab-11.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/04\\\/26\\\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/","og_locale":"fr_FR","og_type":"article","og_title":"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son - Parlons Techs - Store","og_description":"Des failles ont \u00e9t\u00e9 trouv\u00e9es dans la version open source du codec Apple Lossless Audio Codec. Elle n\u2019a jamais eu de mises \u00e0 jour de s\u00e9curit\u00e9 depuis&#8230; 2011. Les chercheurs [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/","og_site_name":"Parlons Techs - Store","article_published_time":"2022-04-26T14:49:07+00:00","article_modified_time":"2022-04-26T14:49:51+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/04\/ab-11.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son","datePublished":"2022-04-26T14:49:07+00:00","dateModified":"2022-04-26T14:49:51+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/"},"wordCount":360,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/04\/ab-11.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/","url":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/","name":"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/04\/ab-11.jpg","datePublished":"2022-04-26T14:49:07+00:00","dateModified":"2022-04-26T14:49:51+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/04\/ab-11.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/04\/ab-11.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2022\/04\/26\/on-pouvait-pirater-des-dizaines-de-millions-de-smartphones-android-grace-a-un-seul-fichier-son\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"On pouvait pirater des dizaines de millions de smartphones Android gr\u00e2ce \u00e0 un seul fichier son"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=2846"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2846\/revisions"}],"predecessor-version":[{"id":2847,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/2846\/revisions\/2847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/2848"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=2846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=2846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=2846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}