
{"id":3225,"date":"2022-08-28T23:08:44","date_gmt":"2022-08-28T21:08:44","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=3225"},"modified":"2022-08-28T23:09:43","modified_gmt":"2022-08-28T21:09:43","slug":"la-double-authentification-nest-pas-le-gage-de-securite-ultime","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/","title":{"rendered":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/AAYp5IU.img?w=768&amp;h=432&amp;m=6\" alt=\"Cette plateforme fran\u00e7aise recense les menaces cyber contre l\u2019Ukraine\" title=\"Cette plateforme fran\u00e7aise recense les menaces cyber contre l\u2019Ukraine\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d&rsquo;ajouter une \u00e9tape suppl\u00e9mentaire.<\/strong><\/p>\n\n\n\n<p>La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d\u2019ajouter une \u00e9tape suppl\u00e9mentaire.<\/p>\n\n\n\n<p>Qu\u2019on se le dise tout de suite, un mot de passe n\u2019est aujourd\u2019hui pas suffisant pour prot\u00e9ger un compte ou une boite de messagerie. Qu\u2019en est-il de la double authentification, alors ? Depuis quelques ann\u00e9es, que ce soit sur Gmail, Outlook ou Facebook, vous pouvez configurer la demande d\u2019un second mot de passe lors d\u2019une connexion \u00e0 une session. G\u00e9n\u00e9ralement, vous recevez un message avec un mot de passe unique ou un bouton d\u2019authentification sur votre smartphone. \u00c0 premi\u00e8re vue, cette \u00e9tape de s\u00e9curit\u00e9 devrait emp\u00eacher toute connexion ext\u00e9rieure. C\u2019est sous-estimer les hackers. Dans les faits, la double authentification n\u2019emp\u00eache pas les piratages depuis quelques ann\u00e9es d\u00e9j\u00e0.<\/p>\n\n\n\n<p>Les hackers du c\u00e9l\u00e8bre groupe Lapsus$, connus pour avoir vol\u00e9 des donn\u00e9es \u00e0 Microsoft, ou les pirates russes de Nobelium, responsables de l\u2019attaque contre SolarWinds, sont parvenus \u00e0 contourner la double authentification lors des connexions aux messageries des entreprises victimes.<\/p>\n\n\n\n<p>Pascal Le Digol, directeur France de WatchGuard, nous d\u00e9crit quelques techniques : \u00ab <em>Parmi les m\u00e9thodes courantes, on peut citer l\u2019ing\u00e9nierie sociale. Le pirate se place entre le site et l\u2019utilisateur pour directement r\u00e9cup\u00e9rer le code de connexion. Il peut, par exemple, le tromper en envoyant une fausse page o\u00f9 la victime tapera un mot de passe. On a rep\u00e9r\u00e9 d\u2019autres proc\u00e9d\u00e9s comme la capacit\u00e9 de rediriger des SMS pour se connecter en payant ou piratant l\u2019op\u00e9rateur. <\/em>\u00bb<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u00ab Ajouter de nouvelles \u00e9tapes \u00bb<\/h2>\n\n\n\n<p>De nombreuses autres techniques existent et ont \u00e9t\u00e9 mises en pratique par les hackers. La force brute \u2013 un bot g\u00e9n\u00e8re sans arr\u00eat de nouvelles combinaisons \u2013 peut-\u00eatre utilis\u00e9e pour tenter des milliers de codes jusqu\u2019\u00e0 tomber sur le bon. Un vol de cookie de session peut permettre au hacker de retrouver des mots de passes utilis\u00e9s. Plus simple, si un pirate acc\u00e8de \u00e0 votre messagerie en trouvant les codes sur le darknet, il peut contourner la 2FA sur certains comptes en r\u00e9installant le mot de passe. Des malfaiteurs sont m\u00eame parvenus \u00e0 copier le signal d\u2019un boitier d\u2019authentification 2FA qui demande un clic de son propri\u00e9taire. Bien \u00e9videmment, cela demande d\u2019\u00e9normes ressources et beaucoup de temps de la part des pirates. Robert A. Grimes, expert en cybers\u00e9curit\u00e9, d\u00e9taille douze mani\u00e8res de briser la double authentification <a href=\"https:\/\/www.knowbe4.com\/hubfs\/KB4-CON2019-12WaystoHack2FA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">dans un rapport en ligne<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/AATHfUU.img?w=768&amp;h=431&amp;m=6\" alt=\"La biom\u00e9trie ajoute une couche de s\u00e9curit\u00e9 suppl\u00e9mentaire, mais demande de donner ses empreintes digitales \u00e0 une soci\u00e9t\u00e9. \/\/ Source : Cnil\" title=\"La biom\u00e9trie ajoute une couche de s\u00e9curit\u00e9 suppl\u00e9mentaire, mais demande de donner ses empreintes digitales \u00e0 une soci\u00e9t\u00e9. \/\/ Source : Cnil\"\/><\/figure>\n\n\n\n<p>\u00ab <em>Tout est une question de couche de s\u00e9curit\u00e9. Plus on en rajoute, et plus on complique la t\u00e2che pour le malfaiteur. Le pirate r\u00e9fl\u00e9chit \u00e0 la rentabilit\u00e9, il cherche l\u2019attaque qui lui demande le moins de temps et de moyens. Certains prennent m\u00eame plaisir \u00e0 trouver quelques m\u00e9thodes innovantes \u00e0 contourner un 2FA <\/em>\u00bb, nous explique Pascal Le Digol.<\/p>\n\n\n\n<p>Naturellement, l\u2019internaute ne peut pas installer des authentifications multicouches pour chaque site. D\u00e9j\u00e0, cela ruinerait l\u2019exp\u00e9rience d\u2019utilisateur, mais ce dernier agit \u00e9galement avec les outils qu\u2019il a en main, et tous les sites ne proposent pas de 2FA. Pour les comptes sensibles, les experts nous recommandent d\u2019installer la MFA \u2013 authentification multifacteur \u2013 qui demande de taper un code plus une autre \u00e9tape de v\u00e9rification, : r\u00e9pondre \u00e0 une question, apposer une empreinte digitale ou appuyer sur une cl\u00e9 USB de s\u00e9curit\u00e9. \u00c9videmment, les hackers les plus talentueux trouvent d\u00e9j\u00e0 des man\u0153uvres pour contourner ces barri\u00e8res. Il faut se rendre \u00e0 l\u2019\u00e9vidence, c\u2019est une comp\u00e9tition sans fin entre les entreprises de cyber et les pirates.<\/p>\n\n\n\n<p>numerama<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d&rsquo;ajouter une \u00e9tape suppl\u00e9mentaire. La couche de s\u00e9curit\u00e9 standard pour [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3227,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-3225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime\" \/>\n<meta property=\"og:description\" content=\"La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d&#039;ajouter une \u00e9tape suppl\u00e9mentaire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-28T21:08:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-28T21:09:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/social-13.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime\" \/>\n<meta name=\"twitter:description\" content=\"La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d&#039;ajouter une \u00e9tape suppl\u00e9mentaire.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/social-13.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime\",\"datePublished\":\"2022-08-28T21:08:44+00:00\",\"dateModified\":\"2022-08-28T21:09:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/\"},\"wordCount\":668,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ab-27.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/\",\"name\":\"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ab-27.jpg\",\"datePublished\":\"2022-08-28T21:08:44+00:00\",\"dateModified\":\"2022-08-28T21:09:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ab-27.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/ab-27.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/08\\\/28\\\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/","og_locale":"fr_FR","og_type":"article","og_title":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime","og_description":"La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d'ajouter une \u00e9tape suppl\u00e9mentaire.","og_url":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/","og_site_name":"Parlons Techs - Store","article_published_time":"2022-08-28T21:08:44+00:00","article_modified_time":"2022-08-28T21:09:43+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/social-13.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime","twitter_description":"La couche de s\u00e9curit\u00e9 standard pour de nombreuses boites de messagerie est obsol\u00e8te pour de nombreux hackers. Les hackers recommandent d'ajouter une \u00e9tape suppl\u00e9mentaire.","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/social-13.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime","datePublished":"2022-08-28T21:08:44+00:00","dateModified":"2022-08-28T21:09:43+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/"},"wordCount":668,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/ab-27.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/","url":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/","name":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/ab-27.jpg","datePublished":"2022-08-28T21:08:44+00:00","dateModified":"2022-08-28T21:09:43+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/ab-27.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/08\/ab-27.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2022\/08\/28\/la-double-authentification-nest-pas-le-gage-de-securite-ultime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"La double authentification n\u2019est pas le gage de s\u00e9curit\u00e9 ultime"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=3225"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3225\/revisions"}],"predecessor-version":[{"id":3228,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3225\/revisions\/3228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/3227"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=3225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=3225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=3225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}