
{"id":3376,"date":"2022-09-18T21:50:34","date_gmt":"2022-09-18T19:50:34","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=3376"},"modified":"2022-09-18T21:54:30","modified_gmt":"2022-09-18T19:54:30","slug":"uber-pirate-par-un-jeune-hacker-de-18-ans","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/","title":{"rendered":"Uber pirat\u00e9 par un Jeune hacker de 18 ans"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/AA11Trsz.img?w=768&amp;h=432&amp;m=6\" alt=\"Uber victime d\u2019une importante cyberattaque : le pirate aurait 18 ans\" title=\"Uber victime d\u2019une importante cyberattaque : le pirate aurait 18 ans\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Le jeune pirate a acc\u00e9d\u00e9 \u00e0 l\u2019intranet de l\u2019entreprise, notamment \u00e0 son code source et ses emails internes<\/strong>.<\/p>\n\n\n\n<p>Le malfaiteur s&rsquo;est amus\u00e9 \u00e0 diffuser des images pornographiques dans les messageries interne avant de r\u00e9cup\u00e9rer des dossiers sensibles.<\/p>\n\n\n\n<p>Le titre <a href=\"https:\/\/www.20minutes.fr\/economie\/uber\/\" target=\"_blank\" rel=\"noreferrer noopener\">Uber <\/a>d\u00e9visse de 4&nbsp;% \u00e0 <a href=\"https:\/\/www.20minutes.fr\/economie\/wall_street\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wall Street<\/a> vendredi. Pourquoi&nbsp;? Car l\u2019entreprise californienne a \u00e9t\u00e9 victime d\u2019un piratage, par un hacker qui revendique avoir 18 ans. Et qui semble avoir r\u00e9ussi \u00e0 acc\u00e9der au syst\u00e8me interne d\u2019Uber, notamment \u00e0 son code source et \u00e0 ses emails internes.<\/p>\n\n\n\n<p>\u00ab\u00a0Nous traitons en ce moment un incident de cybers\u00e9curit\u00e9\u00a0\u00bb, avait tweet\u00e9 le groupe jeudi soir, indiquant \u00eatre \u00ab\u00a0en contact avec les autorit\u00e9s\u00a0\u00bb \u00e0 ce sujet. Vendredi, Uber a pr\u00e9cis\u00e9 que le hacker ne semblait pas avoir acc\u00e9d\u00e9 aux donn\u00e9es sensibles des utilisateurs (adresse, historique des trajets\u00a0etc.), et que tous ses outils \u00e9taient op\u00e9rationnels.<\/p>\n\n\n\n<p>Les captures d\u2019\u00e9cran partag\u00e9es par le malfaiteur montrent ce qui semble \u00eatre un acc\u00e8s complet \u00e0 de nombreux syst\u00e8mes informatiques critiques <a href=\"https:\/\/www.numerama.com\/tech\/574140-au-fait-pourquoi-uber-sappelle-uber.html?utm_medium=distibuted&amp;utm_source=MicrosoftNews&amp;utm_campaign=1114498\" target=\"_blank\" rel=\"noreferrer noopener\">d\u2019Uber<\/a>, notamment le logiciel de s\u00e9curit\u00e9 de l\u2019entreprise et le domaine Windows. Tout serait parti d\u2019un mot de passe vol\u00e9, <a href=\"https:\/\/www.nytimes.com\/2022\/09\/15\/technology\/uber-hacking-breach.html\" rel=\"noreferrer noopener\" target=\"_blank\">selon New York Times<\/a>, qui a pu entrer en contact avec l\u2019attaquant. Ce dernier a d\u00e9clar\u00e9 avoir 18 ans et qu\u2019il a p\u00e9n\u00e9tr\u00e9 dans le syst\u00e8me d\u2019Uber parce que la s\u00e9curit\u00e9 de l\u2019entreprise \u00e9tait faible.&nbsp;<\/p>\n\n\n\n<p>Juste avant que les syst\u00e8mes ne soient mis hors service, un message Slack a \u00e9t\u00e9 envoy\u00e9 aux employ\u00e9s : \u00ab <em>J\u2019annonce que je suis un pirate informatique et Uber a subi une violation de donn\u00e9e<\/em>s \u00bb. Des photos pornographiques ont \u00e9t\u00e9 publi\u00e9s dans la foul\u00e9e.<\/p>\n\n\n\n<p>lusieurs sp\u00e9cialistes de cybers\u00e9curit\u00e9 ont \u00e9galement indiqu\u00e9 avoir \u00e9t\u00e9 en contact avec celui qui se pr\u00e9sentait comme le pirate. Ce dernier a utilis\u00e9 la messagerie Slack pour publier une image pornographique, accompagn\u00e9e du message moqueur \u00ab&nbsp;Fuck you, wankers&nbsp;\u00bb. Les employ\u00e9s d\u2019Uber ont d\u2019abord cru \u00e0 une blague, avant de r\u00e9aliser que c\u2019\u00e9tait s\u00e9rieux.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Proc\u00e8s pour avoir dissimul\u00e9 un piratage pr\u00e9c\u00e9dent<\/h2>\n\n\n\n<p>L\u2019incident intervient alors que se tient, cette semaine, \u00e0 San Francisco, le proc\u00e8s de l\u2019ancien responsable de la s\u00e9curit\u00e9 informatique d\u2019Uber, Joe Sullivan. Le quinquag\u00e9naire est accus\u00e9 d\u2019avoir dissimul\u00e9, en&nbsp;2016, une attaque informatique qui avait permis \u00e0 des pirates de mettre la main sur des donn\u00e9es personnelles d\u2019environ 57&nbsp;millions d\u2019utilisateurs de la plateforme. Selon l\u2019acte d\u2019accusation, Joe Sullivan, licenci\u00e9 en novembre&nbsp;2017, avait \u00e9galement organis\u00e9 le versement d\u2019une ran\u00e7on de 100.000 dollars aux pirates \u00e0 l\u2019origine de l\u2019attaque.<\/p>\n\n\n\n<p>L\u2019affaire n\u2019avait \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e qu\u2019un an plus tard. En\u00a02018, Uber a pass\u00e9 un accord amiable avec les procureurs de 50 Etats am\u00e9ricains, qui pr\u00e9voyait le versement de 148\u00a0millions de dollars d\u2019indemnit\u00e9s, au total, pour avoir tard\u00e9 \u00e0 d\u00e9voiler l\u2019attaque au r\u00e9gulateur ainsi qu\u2019au grand public.<\/p>\n\n\n\n<p>avec numerame et 20minutes<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le jeune pirate a acc\u00e9d\u00e9 \u00e0 l\u2019intranet de l\u2019entreprise, notamment \u00e0 son code source et ses emails internes. Le malfaiteur s&rsquo;est amus\u00e9 \u00e0 diffuser des images pornographiques dans les messageries [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3378,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-3376","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Uber pirat\u00e9 par un Jeune hacker de 18 ans - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uber pirat\u00e9 par un Jeune hacker de 18 ans\" \/>\n<meta property=\"og:description\" content=\"Le jeune pirate a acc\u00e9d\u00e9 \u00e0 l\u2019intranet de l\u2019entreprise, notamment \u00e0 son code source et ses emails internes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-18T19:50:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-18T19:54:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-17.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Uber pirat\u00e9 par un Jeune hacker de 18 ans\" \/>\n<meta name=\"twitter:description\" content=\"Le jeune pirate a acc\u00e9d\u00e9 \u00e0 l\u2019intranet de l\u2019entreprise, notamment \u00e0 son code source et ses emails internes.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-17.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Uber pirat\u00e9 par un Jeune hacker de 18 ans\",\"datePublished\":\"2022-09-18T19:50:34+00:00\",\"dateModified\":\"2022-09-18T19:54:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/\"},\"wordCount\":525,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-17.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/\",\"name\":\"Uber pirat\u00e9 par un Jeune hacker de 18 ans - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-17.jpg\",\"datePublished\":\"2022-09-18T19:50:34+00:00\",\"dateModified\":\"2022-09-18T19:54:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-17.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ab-17.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2022\\\/09\\\/18\\\/uber-pirate-par-un-jeune-hacker-de-18-ans\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uber pirat\u00e9 par un Jeune hacker de 18 ans\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uber pirat\u00e9 par un Jeune hacker de 18 ans - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/","og_locale":"fr_FR","og_type":"article","og_title":"Uber pirat\u00e9 par un Jeune hacker de 18 ans","og_description":"Le jeune pirate a acc\u00e9d\u00e9 \u00e0 l\u2019intranet de l\u2019entreprise, notamment \u00e0 son code source et ses emails internes.","og_url":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/","og_site_name":"Parlons Techs - Store","article_published_time":"2022-09-18T19:50:34+00:00","article_modified_time":"2022-09-18T19:54:30+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-17.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Uber pirat\u00e9 par un Jeune hacker de 18 ans","twitter_description":"Le jeune pirate a acc\u00e9d\u00e9 \u00e0 l\u2019intranet de l\u2019entreprise, notamment \u00e0 son code source et ses emails internes.","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/social-17.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Uber pirat\u00e9 par un Jeune hacker de 18 ans","datePublished":"2022-09-18T19:50:34+00:00","dateModified":"2022-09-18T19:54:30+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/"},"wordCount":525,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-17.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/","url":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/","name":"Uber pirat\u00e9 par un Jeune hacker de 18 ans - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-17.jpg","datePublished":"2022-09-18T19:50:34+00:00","dateModified":"2022-09-18T19:54:30+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-17.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/09\/ab-17.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2022\/09\/18\/uber-pirate-par-un-jeune-hacker-de-18-ans\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Uber pirat\u00e9 par un Jeune hacker de 18 ans"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=3376"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3376\/revisions"}],"predecessor-version":[{"id":3377,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/3376\/revisions\/3377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/3378"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=3376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=3376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=3376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}