{"id":182651,"date":"2017-03-10T10:11:00","date_gmt":"2017-03-10T10:11:00","guid":{"rendered":"https:\/\/www.webdo.tn\/fr\/blog\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/"},"modified":"2025-05-19T08:29:24","modified_gmt":"2025-05-19T08:29:24","slug":"methodes-de-piratage-de-cia-bientot-divulguees-wikileaks","status":"publish","type":"post","link":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/","title":{"rendered":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks"},"content":{"rendered":"<p>Le fondateur de WikiLeaks, Julian Assange, a d\u00e9clar\u00e9, jeudi 9 mars 2017, que son organisation allait fournir aux entreprises technologiques un acc\u00e8s aux m\u00e9thodes de piratage de la CIA afin de leur permettre de rem\u00e9dier aux failles de leurs propres logiciels.<\/p>\n<p>WikiLeaks a publi\u00e9 cette semaine des documents d\u00e9crivant les m\u00e9thodes secr\u00e8tes de piratage de la CIA, et des bouts de code informatique. Elle n&rsquo;a pas publi\u00e9 les programmes complets qui seraient n\u00e9cessaires pour r\u00e9aliser des cyberattaques contre des t\u00e9l\u00e9phones, des ordinateurs ou des r\u00e9cepteurs de t\u00e9l\u00e9vision, rapporte Reuters.<\/p>\n<p>\u00ab\u00a0Je tiens \u00e0 annoncer que, en consid\u00e9rant ce que nous jugeons \u00eatre la meilleure mani\u00e8re de proc\u00e9der, et en r\u00e9ponse aux demandes de certains entrepreneurs, nous avons d\u00e9cid\u00e9 de coop\u00e9rer et de leur donner un acc\u00e8s exclusif aux d\u00e9tails techniques qui sont \u00e0 notre disposition, afin qu&rsquo;ils puissent rem\u00e9dier \u00e0 des failles et gagner en s\u00e9curit\u00e9\u00a0\u00bb, a dit Assange lors d&rsquo;une conf\u00e9rence de presse diffus\u00e9e via Facebook Live.<\/p>\n<p>Mercredi, les services de renseignement am\u00e9ricains ont d\u00e9clar\u00e9 \u00e0 Reuters que des sous-traitants de la CIA \u00e9taient sans doute responsables de fuites de documents qui ont \u00e9t\u00e9 transmis \u00e0 WikiLeaks. Deux responsables ont jug\u00e9 authentiques les documents en question, qui portent sur les techniques de piratage de la CIA de 2013 \u00e0 2016.<\/p>\n<p>Julian Assange a d\u00e9clar\u00e9 \u00eatre en possession d'\u00a0\u00bbune foule d&rsquo;autres renseignements\u00a0\u00bb sur le cyberarsenal de la CIA, qui seront rendus publics prochainement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks<\/p>\n","protected":false},"author":3222,"featured_media":310910,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2598],"tags":[2600],"class_list":["post-182651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-international","tag-guerre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks<\/title>\n<meta name=\"description\" content=\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\" \/>\n<meta property=\"og:description\" content=\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/\" \/>\n<meta property=\"og:site_name\" content=\"webdo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webdotn\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-10T10:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-19T08:29:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2017\/03\/assange.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webdo.tn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webdo_tn\" \/>\n<meta name=\"twitter:site\" content=\"@webdo_tn\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"webdo.tn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/\"},\"author\":{\"name\":\"webdo.tn\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#\\\/schema\\\/person\\\/9a9c6118d687c117df8ef3cc36a4d175\"},\"headline\":\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\",\"datePublished\":\"2017-03-10T10:11:00+00:00\",\"dateModified\":\"2025-05-19T08:29:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/\"},\"wordCount\":270,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/assange.jpg\",\"keywords\":[\"guerre\"],\"articleSection\":[\"International\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/\",\"url\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/\",\"name\":\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/assange.jpg\",\"datePublished\":\"2017-03-10T10:11:00+00:00\",\"dateModified\":\"2025-05-19T08:29:24+00:00\",\"description\":\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/assange.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/assange.jpg\",\"width\":800,\"height\":533,\"caption\":\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/international\\\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\\\/182651\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/\",\"name\":\"webdo\",\"description\":\"Tunisie - News en Tunisie et \u00e0 l&#039;international sur Webdo.tn\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#organization\",\"name\":\"Webdo\",\"alternateName\":\"Webdo.tn\",\"url\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Webdo-Tunisie_168377.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Webdo-Tunisie_168377.jpg\",\"width\":301,\"height\":301,\"caption\":\"Webdo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/webdotn\",\"https:\\\/\\\/x.com\\\/webdo_tn\"],\"description\":\"Webdo est un m\u00e9dia num\u00e9rique tunisien fond\u00e9 en 2010, sp\u00e9cialis\u00e9 dans l\u2019actualit\u00e9 nationale et internationale, l\u2019\u00e9conomie, la soci\u00e9t\u00e9 et les analyses politiques. Le site s\u2019adresse \u00e0 un large public francophone et couvre l\u2019information tunisienne en temps r\u00e9el.\",\"email\":\"redac@webdo.tn\",\"legalName\":\"YNJ SARL\",\"foundingDate\":\"2010-09-06\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/#\\\/schema\\\/person\\\/9a9c6118d687c117df8ef3cc36a4d175\",\"name\":\"webdo.tn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7ce1f28c0c3bbac99ff550b85ef8e44a6950c6ee24514fb6a5489e51d06f0298?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7ce1f28c0c3bbac99ff550b85ef8e44a6950c6ee24514fb6a5489e51d06f0298?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7ce1f28c0c3bbac99ff550b85ef8e44a6950c6ee24514fb6a5489e51d06f0298?s=96&d=mm&r=g\",\"caption\":\"webdo.tn\"},\"url\":\"https:\\\/\\\/www.webdo.tn\\\/fr\\\/actualite\\\/author\\\/webdotn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","description":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","canonical":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/","og_locale":"fr_FR","og_type":"article","og_title":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","og_description":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","og_url":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/","og_site_name":"webdo","article_publisher":"https:\/\/www.facebook.com\/webdotn","article_published_time":"2017-03-10T10:11:00+00:00","article_modified_time":"2025-05-19T08:29:24+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2017\/03\/assange.jpg","type":"image\/jpeg"}],"author":"webdo.tn","twitter_card":"summary_large_image","twitter_creator":"@webdo_tn","twitter_site":"@webdo_tn","twitter_misc":{"\u00c9crit par":"webdo.tn","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#article","isPartOf":{"@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/"},"author":{"name":"webdo.tn","@id":"https:\/\/www.webdo.tn\/fr\/#\/schema\/person\/9a9c6118d687c117df8ef3cc36a4d175"},"headline":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","datePublished":"2017-03-10T10:11:00+00:00","dateModified":"2025-05-19T08:29:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/"},"wordCount":270,"commentCount":0,"publisher":{"@id":"https:\/\/www.webdo.tn\/fr\/#organization"},"image":{"@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#primaryimage"},"thumbnailUrl":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2017\/03\/assange.jpg","keywords":["guerre"],"articleSection":["International"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/","url":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/","name":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","isPartOf":{"@id":"https:\/\/www.webdo.tn\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#primaryimage"},"image":{"@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#primaryimage"},"thumbnailUrl":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2017\/03\/assange.jpg","datePublished":"2017-03-10T10:11:00+00:00","dateModified":"2025-05-19T08:29:24+00:00","description":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks","breadcrumb":{"@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#primaryimage","url":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2017\/03\/assange.jpg","contentUrl":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2017\/03\/assange.jpg","width":800,"height":533,"caption":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.webdo.tn\/fr\/actualite\/international\/methodes-de-piratage-de-cia-bientot-divulguees-wikileaks\/182651\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.webdo.tn\/fr\/"},{"@type":"ListItem","position":2,"name":"Les m\u00e9thodes de piratage de la CIA bient\u00f4t divulgu\u00e9es par WikiLeaks"}]},{"@type":"WebSite","@id":"https:\/\/www.webdo.tn\/fr\/#website","url":"https:\/\/www.webdo.tn\/fr\/","name":"webdo","description":"Tunisie - News en Tunisie et \u00e0 l&#039;international sur Webdo.tn","publisher":{"@id":"https:\/\/www.webdo.tn\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webdo.tn\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.webdo.tn\/fr\/#organization","name":"Webdo","alternateName":"Webdo.tn","url":"https:\/\/www.webdo.tn\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.webdo.tn\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2025\/06\/Webdo-Tunisie_168377.jpg","contentUrl":"https:\/\/www.webdo.tn\/fr\/wp-content\/uploads\/2025\/06\/Webdo-Tunisie_168377.jpg","width":301,"height":301,"caption":"Webdo"},"image":{"@id":"https:\/\/www.webdo.tn\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webdotn","https:\/\/x.com\/webdo_tn"],"description":"Webdo est un m\u00e9dia num\u00e9rique tunisien fond\u00e9 en 2010, sp\u00e9cialis\u00e9 dans l\u2019actualit\u00e9 nationale et internationale, l\u2019\u00e9conomie, la soci\u00e9t\u00e9 et les analyses politiques. Le site s\u2019adresse \u00e0 un large public francophone et couvre l\u2019information tunisienne en temps r\u00e9el.","email":"redac@webdo.tn","legalName":"YNJ SARL","foundingDate":"2010-09-06","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/www.webdo.tn\/fr\/#\/schema\/person\/9a9c6118d687c117df8ef3cc36a4d175","name":"webdo.tn","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7ce1f28c0c3bbac99ff550b85ef8e44a6950c6ee24514fb6a5489e51d06f0298?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7ce1f28c0c3bbac99ff550b85ef8e44a6950c6ee24514fb6a5489e51d06f0298?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ce1f28c0c3bbac99ff550b85ef8e44a6950c6ee24514fb6a5489e51d06f0298?s=96&d=mm&r=g","caption":"webdo.tn"},"url":"https:\/\/www.webdo.tn\/fr\/actualite\/author\/webdotn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/posts\/182651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/users\/3222"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/comments?post=182651"}],"version-history":[{"count":0,"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/posts\/182651\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/media\/310910"}],"wp:attachment":[{"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/media?parent=182651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/categories?post=182651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webdo.tn\/fr\/wp-json\/wp\/v2\/tags?post=182651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}