
{"id":5970,"date":"2024-02-24T13:11:03","date_gmt":"2024-02-24T12:11:03","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=5970"},"modified":"2024-02-24T13:11:16","modified_gmt":"2024-02-24T12:11:16","slug":"apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/","title":{"rendered":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.numerama.com\/wp-content\/uploads\/2021\/11\/illus-capteur-empreintes.jpg\" alt=\"Comment fonctionne un capteur d'empreinte de smartphone ? - Numerama\" \/><\/p>\n<h2><strong>Une nouvelle technologie,\u00a0PrintListener, menace la s\u00e9curit\u00e9 biom\u00e9trique en reproduisant les empreintes digitales \u00e0 partir du son. Une faille qui pourrait s\u00e9rieusement compromettre la confidentialit\u00e9 de vos donn\u00e9es.<\/strong><\/h2>\n<p>Dans un univers o\u00f9 la biom\u00e9trie est monnaie courante pour prot\u00e9ger nos donn\u00e9es personnelles, une vuln\u00e9rabilit\u00e9 impr\u00e9vue se dessine. Apr\u00e8s\u00a0votre visage, que GoldPickaxe vole, des scientifiques chinois et am\u00e9ricains ont r\u00e9v\u00e9l\u00e9 une m\u00e9thode \u00e9labor\u00e9e permettant de copier\u00a0nos empreintes digitales\u00a0en exploitant le son produit par nos doigts sur un \u00e9cran tactile.\u00a0Le logiciel PrintListener, fond\u00e9 sur cette technique, pourrait compromettre la s\u00e9curit\u00e9 de n\u2019importe quel compte et, \u00e0 terme, aiguiser\u00a0les app\u00e9tits des hackers, toujours l\u00e0 d\u00e8s lors qu&rsquo;il s&rsquo;agit de voler\u00a0vos donn\u00e9es personnelles.<\/p>\n<h2><\/h2>\n<h2 class=\"marty-title\">Les murs ont des oreilles, les doigts aussi<\/h2>\n<p>Nos applications quotidiennes, telles que\u00a0Discord,\u00a0Skype,\u00a0Windows Hello, r\u00e9cemment attaqu\u00e9, ou encore FaceTime ont \u00e9t\u00e9 con\u00e7ues pour la communication. Mais ces applications pourraient involontairement agir comme complices dans le piratage d\u2019empreintes digitales.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">\u00c0 chaque fois que vous faites glisser votre doigt sur l\u2019\u00e9cran de votre smartphone, m\u00eame pendant des conversations apparemment informelles, votre micro pourrait enregistrer accidentellement un son cach\u00e9 : la friction subtile g\u00e9n\u00e9r\u00e9e par les cr\u00eates de vos empreintes digitales.<\/p>\n<p class=\"marty-paragraph-left\">PrintListener exploite le son des doigts glissant sur un \u00e9cran tactile pour extraire les empreintes digitales.<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<div class=\"marty-cell-media\">\n<p><span class=\"marty-picture-link\" data-href=\"aHR0cHM6Ly9waWMuY2x1YmljLmNvbS92MS9pbWFnZXMvMjE5MjM1MC9yYXc=\"><picture class=\"marty-picture-no-link\"><source srcset=\"https:\/\/pic.clubic.com\/v1\/images\/2192350\/raw.webp?hash=4711373e2704a0c9cdf273a0bb8b3c22700da1ab\" type=\"image\/webp\" \/><source srcset=\"https:\/\/pic.clubic.com\/v1\/images\/2192350\/raw\" type=\"image\/jpeg\" \/><img loading=\"lazy\" decoding=\"async\" class=\"marty-image\" src=\"https:\/\/pic.clubic.com\/v1\/images\/2192350\/raw\" alt=\"Le fonctionnement de PrintListener \u00a9 NDSS Symposium\" width=\"802\" height=\"280\" border=\"0\" data-src-raw=\"https:\/\/pic.clubic.com\/v1\/images\/2192350\/raw\" \/><\/picture><\/span><\/p>\n<div class=\"marty-caption\">Le fonctionnement de PrintListener \u00a9 NDSS Symposium<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Les chercheurs ont d\u00e9montr\u00e9 que ce logiciel peut attaquer avec succ\u00e8s jusqu\u2019\u00e0\u00a027,9 % des empreintes partielles\u00a0et\u00a09,3 % des empreintes compl\u00e8tes\u00a0en seulement cinq tentatives, m\u00eame au niveau de s\u00e9curit\u00e9 le plus \u00e9lev\u00e9.<\/p>\n<p class=\"marty-paragraph-left\">Mais la technologie ne s&rsquo;arr\u00eate pas en si bon chemin.<br \/>\nPrintListener ne se contente pas de capter ces sons infimes : il les traduit. L\u2019outil utilise une technique avanc\u00e9e pour analyser le bruit faible de vos glissements, cherchant minutieusement des caract\u00e9ristiques sp\u00e9cifiques \u00e0 votre empreinte digitale.<\/p>\n<p class=\"marty-paragraph-left\">Cela implique potentiellement de personnaliser les contrefa\u00e7ons d\u2019empreintes digitales avec une bien plus grande exactitude.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Mieux vaut pr\u00e9venir que gu\u00e9rir<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Bien que PrintListener n\u2019ait pas encore \u00e9t\u00e9 utilis\u00e9 dans des cyberattaques, il est clair que cette technologie a un potentiel redoutable. La s\u00e9curit\u00e9 biom\u00e9trique, autrefois consid\u00e9r\u00e9e comme infaillible, doit d\u00e9sormais faire face \u00e0 cette nouvelle menace. Les empreintes digitales, symboles de confiance, pourraient bien devenir la cible des pirates conscients du pouvoir du son.<\/p>\n<p class=\"marty-paragraph-left\">En attendant, pour vous prot\u00e9ger contre ces risques, vous pouvez adopter des mesures de s\u00e9curit\u00e9 proactives, telles que la mise \u00e0 jour de votre\u00a0antivirus, ou encore :<\/p>\n<ul>\n<li>Le contr\u00f4le de vos applications : v\u00e9rifiez quelles applications ont acc\u00e8s \u00e0 votre microphone et \u00e0 votre cam\u00e9ra et d\u00e9sactivez ces autorisations pour celles qui n\u2019en ont pas r\u00e9ellement besoin.<\/li>\n<li>L&rsquo;utilisation de la biom\u00e9trie avec prudence : les fonctionnalit\u00e9s de s\u00e9curit\u00e9 biom\u00e9triques comme la reconnaissance d\u2019empreintes digitales et faciale offrent de la commodit\u00e9, mais ne les consid\u00e9rez pas comme infaillibles. Consid\u00e9rez-les comme des outils utiles plut\u00f4t que comme des boucliers incassables.<\/li>\n<\/ul>\n<ul>\n<li>L&rsquo;importance capitale de vos mots de passe : choisissez des mots de passe complexes et uniques pour chaque compte, et ne les r\u00e9utilisez jamais.\u00a0Si possible, activez l\u2019authentification \u00e0 plusieurs facteurs (MFA), qui n\u00e9cessite un code ou une confirmation suppl\u00e9mentaire en plus de votre mot de passe.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\"><small><em>Sources:\u00a0<\/em><\/small><a href=\"https:\/\/dataconomy.com\/2024\/02\/20\/printlistener-fingerprint-hack-by-sound\/\" target=\"_blank\" rel=\"noopener noreferrer\"><small><em>Data Economy<\/em><\/small><\/a><small><em>,\u00a0<\/em><\/small><a href=\"https:\/\/www.tomsguide.fr\/les-pirates-peuvent-reproduire-vos-empreintes-digitales-pour-acceder-a-vos-comptes\/\" target=\"_blank\" rel=\"noopener noreferrer\"><small><em>Tom&rsquo;s guide<\/em><\/small><\/a><small><em>,\u00a0<\/em><\/small><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2024-618-paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><small><em>NDSS Symposium<\/em><\/small><\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Une nouvelle technologie,\u00a0PrintListener, menace la s\u00e9curit\u00e9 biom\u00e9trique en reproduisant les empreintes digitales \u00e0 partir du son. Une faille qui pourrait s\u00e9rieusement compromettre la confidentialit\u00e9 de vos donn\u00e9es. Dans un univers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5971,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-5970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"Une nouvelle technologie,\u00a0PrintListener, menace la s\u00e9curit\u00e9 biom\u00e9trique en reproduisant les empreintes digitales \u00e0 partir du son. Une faille qui pourrait s\u00e9rieusement compromettre la confidentialit\u00e9 de vos donn\u00e9es. Dans un univers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-24T12:11:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-24T12:11:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-48.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-48.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales\",\"datePublished\":\"2024-02-24T12:11:03+00:00\",\"dateModified\":\"2024-02-24T12:11:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/\"},\"wordCount\":597,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-45.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/\",\"name\":\"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-45.jpg\",\"datePublished\":\"2024-02-24T12:11:03+00:00\",\"dateModified\":\"2024-02-24T12:11:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-45.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/ab-45.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/02\\\/24\\\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/","og_locale":"fr_FR","og_type":"article","og_title":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - ParlonsTechs","og_description":"Une nouvelle technologie,\u00a0PrintListener, menace la s\u00e9curit\u00e9 biom\u00e9trique en reproduisant les empreintes digitales \u00e0 partir du son. Une faille qui pourrait s\u00e9rieusement compromettre la confidentialit\u00e9 de vos donn\u00e9es. Dans un univers [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-02-24T12:11:03+00:00","article_modified_time":"2024-02-24T12:11:16+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-48.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/social-48.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales","datePublished":"2024-02-24T12:11:03+00:00","dateModified":"2024-02-24T12:11:16+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/"},"wordCount":597,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-45.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/","url":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/","name":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-45.jpg","datePublished":"2024-02-24T12:11:03+00:00","dateModified":"2024-02-24T12:11:16+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-45.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/02\/ab-45.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/02\/24\/apres-votre-visage-comment-les-pirates-pourraient-voler-vos-empreintes-digitales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Apr\u00e8s votre visage, comment les pirates pourraient voler vos empreintes digitales"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/5970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=5970"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/5970\/revisions"}],"predecessor-version":[{"id":5974,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/5970\/revisions\/5974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/5971"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=5970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=5970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=5970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}