
{"id":5829,"date":"2024-02-04T09:08:10","date_gmt":"2024-02-04T08:08:10","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=5829"},"modified":"2024-02-04T09:08:34","modified_gmt":"2024-02-04T08:08:34","slug":"comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/","title":{"rendered":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.bfmtv.com\/394KhwJRbWfWZXtyvVtMz9RjhwA=\/0x0:1600x900\/1600x0\/images\/iPhone-14-Pro-Max-il-passe-a-1-si-vous-passez-par-cette-offre-inedite-1650980.jpg\" alt=\"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications\" \/><\/p>\n<h2><strong>Deux chercheurs en cybers\u00e9curit\u00e9 ont alert\u00e9 sur des risques pour la s\u00e9curit\u00e9 de la vie priv\u00e9e lors de la r\u00e9ception des notifications. Des applications s&rsquo;en serviraient pour r\u00e9cup\u00e9rer des donn\u00e9es de votre iPhone.<\/strong><\/h2>\n<p>On a beau prendre toutes ses dispositions pour prot\u00e9ger son smartphone pour osciller entre l&rsquo;anonymat et la protection absolue de ses donn\u00e9es, il y a toujours des d\u00e9veloppeurs plus malins pour arriver \u00e0 leurs fins. Et quand il s&rsquo;agit des plus grosses entreprises de la tech, les entourloupes deviennent difficiles \u00e0 d\u00e9busquer.<\/p>\n<p class=\"continue-read-break\" data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Deux d\u00e9veloppeurs\u00a0iOS\u00a0sp\u00e9cialis\u00e9s en\u00a0cybers\u00e9curit\u00e9\u00a0ont ainsi mis en lumi\u00e8re un d\u00e9tournement de fonction mis en place notamment par Tiktok, Meta ou encore X (ex-Twitter).<\/p>\n<p>\u00ab\u00a0Les applications gourmandes en donn\u00e9es utilisent les notifications push pour r\u00e9cup\u00e9rer et envoyer des informations et des donn\u00e9es utilisateurs de l&rsquo;application vers leurs serveurs distants\u00a0\u00bb, expliquent les deux hommes sur leur compte Twitter.<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Mais ce qui para\u00eet le plus \u00e9trange, c&rsquo;est que les notifications re\u00e7ues sur\u00a0iPhone\u00a0servent de point d&rsquo;entr\u00e9e vers les donn\u00e9es m\u00eame si les applications ne sont pas en cours d&rsquo;ex\u00e9cution.<\/p>\n<h2 class=\"article-sub-heading\">Une br\u00e8che dans la s\u00e9curit\u00e9<\/h2>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">L&rsquo;iPhone a pour principe de ne pas laisser fonctionner en arri\u00e8re-plan les applications inactives, notamment pour des questions de protection de la vie priv\u00e9e en plus des performances. Mais Apple autorise n\u00e9anmoins les applications \u00e0 envoyer des notifications sans avoir besoin que celle-ci s&rsquo;ex\u00e9cute.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8\ud83c\udfac Privacy Concerns about Apple Push Notifications<\/p>\n<p>TL;DR: data-hungry apps use push notifications as a trigger to send app analytics and device information to their remote servers, even if the apps aren&#39;t running at all on your iPhone. Such apps include TikTok, Facebook, FB\u2026 <a href=\"https:\/\/t.co\/qyFDbmrBjq\">pic.twitter.com\/qyFDbmrBjq<\/a><\/p>\n<p>&mdash; Mysk \ud83c\udde8\ud83c\udde6\ud83c\udde9\ud83c\uddea (@mysk_co) <a href=\"https:\/\/twitter.com\/mysk_co\/status\/1750502700112916504?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">January 25, 2024<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>&nbsp;<\/p>\n<p>Et c&rsquo;est ce moment pr\u00e9cis dont ont su profiter les ing\u00e9nieuses applications. A la r\u00e9ception d&rsquo;une notification, iOS la r\u00e9veille en arri\u00e8re-plan \u00ab\u00a0et lui laisse un temps limit\u00e9 pour personnaliser la notification avant qu&rsquo;elle ne soit affich\u00e9e pour l&rsquo;utilisateur\u00a0\u00bb, expliquent les chercheurs.<\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"article-sub-heading\">Les notifications en cheval de Troie<\/h2>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Cela va passer par le t\u00e9l\u00e9chargement de contenu suppl\u00e9mentaire pour enrichir la notification (image, lien, etc.). iOS coupe ensuite le canal ouvert vers l&rsquo;application en arri\u00e8re-plan.<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Ils ont ainsi d\u00e9couvert que les applications qui cherchent le plus \u00e0 r\u00e9cup\u00e9rer des donn\u00e9es personnelles de leurs utilisateurs profitent de cette br\u00e8che ouverte pour ex\u00e9cuter du code en arri\u00e8re-plan et lire de nombreuses informations (mod\u00e8le de l&rsquo;appareil, localisation, \u00e9tat de la batterie, etc.).<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Des signaux qui peuvent \u00eatre utilis\u00e9s pour d\u00e9finir une empreinte digitale du consommateur et mieux le suivre dans son utilisation, ce qui est interdit par Apple. Et pourtant, pour les deux d\u00e9veloppeurs, c&rsquo;est \u00ab\u00a0une mine d&rsquo;or\u00a0\u00bb pour les applications.<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Ils ont not\u00e9 que Facebook Messenger,\u00a0Thread, Instagram, X ou encore\u00a0Tiktok\u00a0se servaient tr\u00e8s fr\u00e9quemment de cette pratique pour envoyer des informations de l&rsquo;appareil vers leurs serveurs. La majorit\u00e9 de ces apps \u00ab\u00a0envoie \u00e9galement des donn\u00e9es lorsqu&rsquo;elles effacent leurs notifications dans le Centre de notification\u00a0\u00bb. Cela passe souvent par Google Analytics et Firebase, m\u00eame si Facebook utilise son propre service tout comme Tiktok en partie.<\/p>\n<div class=\"intra-article-module\" data-t=\"{&quot;n&quot;:&quot;intraArticle&quot;,&quot;t&quot;:13}\"><\/div>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">\u00ab\u00a0Heureusement, \u00e0 partir du printemps 2024, Apple exigera des d\u00e9veloppeurs qu&rsquo;ils d\u00e9clarent les raisons pour lesquelles ils utilisent les API qui renvoient des signaux uniques de l&rsquo;appareil, tels que ceux couramment utilis\u00e9s pour les empreintes digitales\u00a0\u00bb, concluent-ils.<\/p>\n<p>Comment \u00e9viter la pratique ?<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Pour emp\u00eacher les applications de lire vos donn\u00e9es via push, il suffit d&rsquo;aller dans les param\u00e8tres du smartphone, puis dans les notifications et de d\u00e9sactiver compl\u00e8tement les notifications inutiles.<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">avec bfm<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deux chercheurs en cybers\u00e9curit\u00e9 ont alert\u00e9 sur des risques pour la s\u00e9curit\u00e9 de la vie priv\u00e9e lors de la r\u00e9ception des notifications. Des applications s&rsquo;en serviraient pour r\u00e9cup\u00e9rer des donn\u00e9es [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11,181,41],"tags":[],"class_list":["post-5829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite","category-internet","category-reseaux-sociaux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"Deux chercheurs en cybers\u00e9curit\u00e9 ont alert\u00e9 sur des risques pour la s\u00e9curit\u00e9 de la vie priv\u00e9e lors de la r\u00e9ception des notifications. Des applications s&rsquo;en serviraient pour r\u00e9cup\u00e9rer des donn\u00e9es [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-04T08:08:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-04T08:08:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-18.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-18.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications\",\"datePublished\":\"2024-02-04T08:08:10+00:00\",\"dateModified\":\"2024-02-04T08:08:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/\"},\"wordCount\":659,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-16.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\",\"Internet\",\"R\u00e9seaux Sociaux\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/\",\"name\":\"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-16.jpg\",\"datePublished\":\"2024-02-04T08:08:10+00:00\",\"dateModified\":\"2024-02-04T08:08:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-16.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-16.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/04\\\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - ParlonsTechs","og_description":"Deux chercheurs en cybers\u00e9curit\u00e9 ont alert\u00e9 sur des risques pour la s\u00e9curit\u00e9 de la vie priv\u00e9e lors de la r\u00e9ception des notifications. Des applications s&rsquo;en serviraient pour r\u00e9cup\u00e9rer des donn\u00e9es [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-02-04T08:08:10+00:00","article_modified_time":"2024-02-04T08:08:34+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-18.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-18.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications","datePublished":"2024-02-04T08:08:10+00:00","dateModified":"2024-02-04T08:08:34+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/"},"wordCount":659,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-16.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9","Internet","R\u00e9seaux Sociaux"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/","url":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/","name":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-16.jpg","datePublished":"2024-02-04T08:08:10+00:00","dateModified":"2024-02-04T08:08:34+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-16.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-16.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/04\/comment-les-reseaux-sociaux-collectent-vos-donnees-personnelles-grace-aux-notifications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Comment les r\u00e9seaux sociaux collectent vos donn\u00e9es personnelles gr\u00e2ce aux notifications"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/5829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=5829"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/5829\/revisions"}],"predecessor-version":[{"id":5833,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/5829\/revisions\/5833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/5832"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=5829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=5829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=5829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}