
{"id":6125,"date":"2024-03-23T17:39:34","date_gmt":"2024-03-23T16:39:34","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=6125"},"modified":"2024-03-23T17:39:34","modified_gmt":"2024-03-23T16:39:34","slug":"attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/","title":{"rendered":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/v1\/images\/2199420\/raw?fit=max&amp;width=1200&amp;hash=3ebba96154c54017dc834f06d1940ba9a0444c1c\" alt=\"Une nouvelle arnaque s\u00e9vit sur X.com \u00a9 Diego Thomazini \/ Shutterstock\" \/><\/p>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-paragraph-left\"><strong>Le syst\u00e8me de preview de X.com est unique et diff\u00e9rent de celui que l&rsquo;on peut trouver sur Google. Et apparemment, il est beaucoup plus facile \u00e0 abuser \u00e9galement.<br \/>\n<\/strong><\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Ne croyez pas tout ce que vous voyez sur Twitter. Bien s\u00fbr, cela fait un moment que cette phrase est vraie, mais d\u00e9sormais, m\u00eame les aper\u00e7us des liens qui y sont post\u00e9s, et cens\u00e9s \u00eatre trait\u00e9s par le site, peuvent \u00eatre trompeurs et vous mener vers des arnaques. Un probl\u00e8me pas uniquement limit\u00e9 \u00e0 d&rsquo;obscurs comptes, mais qui peut \u00e9galement se retrouver dans les posts de publicit\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Ne faites pas confiance aux aper\u00e7us sur X.com<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">C&rsquo;est le chercheur en cybers\u00e9curit\u00e9 Will Dormann qui a remarqu\u00e9 le premier un post sur le r\u00e9seau social. Ce post \u00e9tait d&rsquo;ailleurs mis en avant, et l&rsquo;aper\u00e7u ainsi que le nom de domaine affich\u00e9s indiquaient que le lien conduisait ceux qui cliquaient dessus vers une source de confiance s&rsquo;il en est, forbes.com. Ce post, publi\u00e9 par\u00a0un compte \u00ab certifi\u00e9 \u00bb, \u00e9tait pourtant trompeur : ceux qui cliquaient dessus n&rsquo;arrivaient pas sur le site du journal, mais sur une cha\u00eene Telegram, \u00ab Crypto with Harry \u00bb, qui met en avant des cryptomonnaies plus douteuses encore que la moyenne.<\/p>\n<\/div>\n<p>La faute, selon Dormann, \u00e0 un syst\u00e8me d&rsquo;affichage d&rsquo;aper\u00e7u particulier, dont le fonctionnement diff\u00e8re de ceux que l&rsquo;on peut trouver sur d&rsquo;autres r\u00e9seaux sociaux. Alors qu&rsquo;un tel aper\u00e7u sur Google, par exemple, affiche le premier domaine vers lequel une URL redirige, X.com utilise un syst\u00e8me qui affiche la destination et le nom de domaine de cette page. Les acteurs malveillants utilisent un syst\u00e8me qui permet de d\u00e9terminer si une requ\u00eate est faite par un bot ou un utilisateur authentique, puis qui les redirige vers le contenu qu&rsquo;ils souhaitent afficher respectivement pour eux, ce qui permet donc \u00e0 ces arnaques crypto de passer sous les radars des syst\u00e8mes de d\u00e9tection de Twitter.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/v1\/images\/2168151\/raw?fit=max&amp;width=1200&amp;hash=c1cdf1ddcb41338b03d37aee61c797ac6a14c416\" alt=\"Les d\u00e9cisions internes de X.com ne risquent pas de faire dispara\u00eetre ce genre d'arnaques \u00a9 Angga Budhiyanto \/ Shutterstock\" \/><\/p>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Un probl\u00e8me qui n&rsquo;est pas r\u00e9cent<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Pour Elon Musk, qui souhaite faire de sa plateforme la source d&rsquo;information la plus fiable au monde, cela devrait \u00eatre un probl\u00e8me. Mais pas vraiment une surprise, puisque\u00a0moins un r\u00e9seau social a de mod\u00e9rateurs\u00a0et autres employ\u00e9s consacr\u00e9s \u00e0 la v\u00e9rification, plus ce type d&rsquo;incident est susceptible de se produire.<\/p>\n<\/div>\n<p>Et apparemment, le probl\u00e8me n&rsquo;est pas nouveau, des acteurs malveillants l&rsquo;exploitent depuis au moins un an, si l&rsquo;on en croit des posts sur Reddit au moins aussi vieux qui se plaignent du ph\u00e9nom\u00e8ne.<\/p>\n<p><em><small>Source :\u00a0<\/small><\/em><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/heres-why-twitter-sends-you-to-a-different-site-than-what-you-clicked\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><small>Bleeping Computer<\/small><\/em><\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Le syst\u00e8me de preview de X.com est unique et diff\u00e9rent de celui que l&rsquo;on peut trouver sur Google. Et apparemment, il est beaucoup plus facile \u00e0 abuser \u00e9galement. Ne croyez [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11,41],"tags":[],"class_list":["post-6125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","category-reseaux-sociaux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"Le syst\u00e8me de preview de X.com est unique et diff\u00e9rent de celui que l&rsquo;on peut trouver sur Google. Et apparemment, il est beaucoup plus facile \u00e0 abuser \u00e9galement. Ne croyez [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-23T16:39:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/social-19.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/social-19.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL\",\"datePublished\":\"2024-03-23T16:39:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/\"},\"wordCount\":469,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ab-19.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\",\"R\u00e9seaux Sociaux\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/\",\"name\":\"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ab-19.jpg\",\"datePublished\":\"2024-03-23T16:39:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ab-19.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ab-19.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/03\\\/23\\\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/","og_locale":"fr_FR","og_type":"article","og_title":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - ParlonsTechs","og_description":"Le syst\u00e8me de preview de X.com est unique et diff\u00e9rent de celui que l&rsquo;on peut trouver sur Google. Et apparemment, il est beaucoup plus facile \u00e0 abuser \u00e9galement. Ne croyez [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-03-23T16:39:34+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/social-19.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/social-19.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL","datePublished":"2024-03-23T16:39:34+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/"},"wordCount":469,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/ab-19.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9","R\u00e9seaux Sociaux"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/","url":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/","name":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/ab-19.jpg","datePublished":"2024-03-23T16:39:34+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/ab-19.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/03\/ab-19.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/03\/23\/attention-x-com-ex-twitter-est-utilise-pour-des-arnaques-aux-fausses-url\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Attention, X.com (ex-Twitter) est utilis\u00e9 pour des arnaques aux fausses URL"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=6125"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6125\/revisions"}],"predecessor-version":[{"id":6128,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6125\/revisions\/6128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/6126"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=6125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=6125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=6125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}