
{"id":3021,"date":"2022-07-18T12:53:08","date_gmt":"2022-07-18T10:53:08","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=3021"},"modified":"2022-07-18T12:53:08","modified_gmt":"2022-07-18T10:53:08","slug":"comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/","title":{"rendered":"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/AAZvWL8.img?w=738&amp;h=492&amp;m=6\" alt=\"Le logo de la police f\u00e9d\u00e9rale am\u00e9ricaine (FBI).\" title=\"Le logo de la police f\u00e9d\u00e9rale am\u00e9ricaine (FBI).\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Tr\u00e8s pris\u00e9 des malfaiteurs, le t\u00e9l\u00e9phone Anom est r\u00e9put\u00e9 pour \u00eatre ultra-s\u00e9curis\u00e9. Avec une seule application de messagerie install\u00e9e, il convient parfaitement aux \u00e9changes des organisations criminelles. Seul probl\u00e8me, il retransmet toutes les conversations au FBI.<\/strong><\/p>\n\n\n\n<p>Tout commence en 2018. Les agences gouvernementales de plusieurs pays, dont les Etats-Unis, la France ou l\u2019Australie, s\u2019associent autour de l\u2019op\u00e9ration \u201cBouclier de Troie\u201d. Elles vont profiter de la fermeture, en d\u00e9but d&rsquo;ann\u00e9e, de la soci\u00e9t\u00e9 Phantom Secure, qui fournit des t\u00e9l\u00e9phones s\u00e9curis\u00e9s \u00e0 des r\u00e9seaux criminels.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Un code en grande partie libre<\/h2>\n\n\n\n<p>Les malfaiteurs sont alors \u00e0 la recherche d\u2019un nouveau moyen pour communiquer de mani\u00e8re secr\u00e8te. La solution des t\u00e9l\u00e9phones Anom s\u2019av\u00e8re particuli\u00e8rement adapt\u00e9e gr\u00e2ce \u00e0 sa messagerie chiffr\u00e9e. Ils se sont r\u00e9pandus entre 2018 et 2021 \u00e0 travers le march\u00e9 noir. Au final, ils passent entre les mains de plus de 300 groupes de criminels.<\/p>\n\n\n\n<p>Mais en r\u00e9alit\u00e9, le FBI est \u00e9troitement li\u00e9 au d\u00e9veloppement des appareils Anom. La police am\u00e9ricaine parvient ainsi \u00e0 mettre en place un syst\u00e8me de copie des messages envoy\u00e9s via cette application, dont le m\u00e9dia am\u00e9rician <a href=\"https:\/\/www.vice.com\/en\/article\/v7veg8\/anom-app-source-code-operation-trojan-shield-an0m\" target=\"_blank\" rel=\"noreferrer noopener\">Vice<\/a> a pu consulter le code source.<\/p>\n\n\n\n<p>Ce code aurait \u00e9t\u00e9 en grande partie copi\u00e9 d\u2019une application disponible librement sur internet. L\u2019application Anom utilisait le protocole de messagerie instantan\u00e9e XMPP pour communiquer, indique le site am\u00e9ricain. Naturellement, les messages \u00e9taient chiffr\u00e9s avant d\u2019\u00eatre envoy\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Un syst\u00e8me de g\u00e9olocalisation<\/h2>\n\n\n\n<p>Comme l&rsquo;explique Vice, le FBI a en r\u00e9alit\u00e9 dissimul\u00e9 un identifiant cach\u00e9 dans la liste de contacts du mobile. A chaque envoi, les messages \u00e9taient \u00e9galement re\u00e7us par ce compte cach\u00e9. Ind\u00e9tectable sur le t\u00e9l\u00e9phone, cet utilisateur fant\u00f4me les retransmettait ensuite aux \u00e9quipes de police.<\/p>\n\n\n\n<p>L\u2019analyse du code de l\u2019application a \u00e9galement d\u00e9voil\u00e9 la pr\u00e9sence d\u2019un syst\u00e8me de g\u00e9olocalisation des appareils. Si des dysfonctionnements ont parfois \u00e9t\u00e9 report\u00e9s, les autorit\u00e9s ont tout de m\u00eame \u00e9tabli la v\u00e9racit\u00e9 de coordonn\u00e9es GPS collect\u00e9es.<\/p>\n\n\n\n<p>Gr\u00e2ce \u00e0 l\u2019ensemble des informations obtenues via les t\u00e9l\u00e9phones Anom, un gigantesque coup de filet a pu \u00eatre organis\u00e9 en juin 2021. L\u2019op\u00e9ration \u201cBouclier de Troie\u201d est \u00e0 l\u2019origine d\u2019environ 1000 arrestations.<\/p>\n\n\n\n<p>bfmtv<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tr\u00e8s pris\u00e9 des malfaiteurs, le t\u00e9l\u00e9phone Anom est r\u00e9put\u00e9 pour \u00eatre ultra-s\u00e9curis\u00e9. Avec une seule application de messagerie install\u00e9e, il convient parfaitement aux \u00e9changes des organisations criminelles. Seul probl\u00e8me, il [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[],"class_list":["post-3021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Tr\u00e8s pris\u00e9 des malfaiteurs, le t\u00e9l\u00e9phone Anom est r\u00e9put\u00e9 pour \u00eatre ultra-s\u00e9curis\u00e9. Avec une seule application de messagerie install\u00e9e, il convient parfaitement aux \u00e9changes des organisations criminelles. Seul probl\u00e8me, il [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-18T10:53:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/07\/ab-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s\",\"datePublished\":\"2022-07-18T10:53:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/\"},\"wordCount\":421,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/ab-6.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/\",\"name\":\"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/ab-6.jpg\",\"datePublished\":\"2022-07-18T10:53:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/ab-6.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/ab-6.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/07\\\/18\\\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s - Parlons Techs - Store","og_description":"Tr\u00e8s pris\u00e9 des malfaiteurs, le t\u00e9l\u00e9phone Anom est r\u00e9put\u00e9 pour \u00eatre ultra-s\u00e9curis\u00e9. Avec une seule application de messagerie install\u00e9e, il convient parfaitement aux \u00e9changes des organisations criminelles. Seul probl\u00e8me, il [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/","og_site_name":"Parlons Techs - Store","article_published_time":"2022-07-18T10:53:08+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/07\/ab-6.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s","datePublished":"2022-07-18T10:53:08+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/"},"wordCount":421,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/07\/ab-6.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/","url":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/","name":"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/07\/ab-6.jpg","datePublished":"2022-07-18T10:53:08+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/07\/ab-6.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/07\/ab-6.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2022\/07\/18\/comment-le-fbi-a-espionne-le-crime-organise-grace-a-des-telephones-truques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Comment le FBI a espionn\u00e9 le crime organis\u00e9 gr\u00e2ce \u00e0 des t\u00e9l\u00e9phones truqu\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=3021"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3021\/revisions"}],"predecessor-version":[{"id":3023,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3021\/revisions\/3023"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/3022"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=3021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=3021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=3021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}