{"id":134262,"date":"2018-01-05T09:25:36","date_gmt":"2018-01-05T09:25:36","guid":{"rendered":"https:\/\/\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/"},"modified":"2018-01-05T09:25:36","modified_gmt":"2018-01-05T09:25:36","slug":"meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/","title":{"rendered":"Meltdown et Spectre, les processeurs Intel pas seuls en cause"},"content":{"rendered":"<p><span id=\"result_box\" lang=\"fr\"><span title=\"During 2017 a couple of academic groupings and the so-called Google Zero Project performed research into side-channel attacks on to processors that perform speculative execution, which means most modern processor architectures.\n\n\">Au courrant de l&rsquo;ann\u00e9e 2017, deux groupes universitaires et le groupe Projet Google Zero ont men\u00e9 des recherches sur les attaques par canal lat\u00e9ral sur des processeurs ex\u00e9cutant une ex\u00e9cution sp\u00e9culative, c&rsquo;est \u00e0 dire la grande majorit\u00e9 des architectures de processeurs modernes.<\/span><\/p>\n<p><span title=\"The findings were that processor microarchitectures from Intel, AMD and ARM were all vulnerable to a lesser or greater extent.\">Les r\u00e9sultats ont montr\u00e9 que les microarchitectures de processeurs Intel, AMD et ARM \u00e9taient toutes plus ou moins vuln\u00e9rables. <\/span><span title=\"Google reported the first findings to the processor companies on June 1, 2017 and the fact that Intel, AMD and ARM are all referenced suggests that all forms of equipment from embedded applications up through smartphones to laptops and servers in data centers are vulnerable.\n\n\">Google a rapport\u00e9 les premiers r\u00e9sultats aux fabricants de microprocesseurs le 1er juin 2017 et le fait qu&rsquo;Intel, AMD et ARM soient tous nomm\u00e9s sugg\u00e8re que toutes les formes d&rsquo;\u00e9quipements, des applications embarqu\u00e9es aux smartphones, aux ordinateurs portables et aux serveurs des data centers sont vuln\u00e9rables.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Google Zero Project has published a blogpost here that details three types of attack under two codenames;\">Google Zero Project a publi\u00e9 un <a href=\"https:\/\/googleprojectzero.blogspot.be\/2018\/01\/reading-privileged-memory-with-side.html\">article de blog<\/a> (en anglais) qui d\u00e9taille trois types d&rsquo;attaque sous deux noms de code: <\/span><span title=\"Meltdown and Spectre but all make use of a so-called kernel leakage and operating system companies appear to have been scrambling to prepare patches and updates to block such attacks.\">Meltdown et Spectre, mais tous utilisent un d\u00e9faut appel\u00e9 \u00ab\u00a0<\/span><\/span>kernel leakage\u00a0\u00bb<span lang=\"fr\"><span title=\"Meltdown and Spectre but all make use of a so-called kernel leakage and operating system companies appear to have been scrambling to prepare patches and updates to block such attacks.\"> et les soci\u00e9t\u00e9s propri\u00e9taires des syst\u00e8mes d&rsquo;exploitation sembent avoir eu du mal \u00e0 pr\u00e9parer des correctifs et des mises \u00e0 jour pour bloquer de telles attaques. <\/span><span title=\"Much debate now seems set to ensue as to what degree which processors are affected and how much they are hobbled in performance by the resulting software burden.\n\n\">Beaucoup de d\u00e9bats s&rsquo;ensuivent pour d\u00e9terminer dans quelle mesure les processeurs sont affect\u00e9s et \u00e0 quel point les performances seront d\u00e9grad\u00e9es par le fardeau logiciel qui en r\u00e9sulte.<\/span><\/p>\n<p><span title=\"With increasing discussion of &quot;kernel leakage&quot; and how this could be used to obtain passwords and other elements of secure systems Intel made a statement on January 3, 2018.\n\n\">Face \u00e0 une discussion croissante sur le \u00ab\u00a0<\/span><\/span>kernel leakage<span lang=\"fr\"><span title=\"With increasing discussion of &quot;kernel leakage&quot; and how this could be used to obtain passwords and other elements of secure systems Intel made a statement on January 3, 2018.\n\n\">\u00a0\u00bb et comment cela pourrait \u00eatre utilis\u00e9 pour obtenir des mots de passe et d&rsquo;autres \u00e9l\u00e9ments de syst\u00e8mes s\u00e9curis\u00e9s, Intel a fait une d\u00e9claration le 3 janvier 2018.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"The company acknowledged that it had been made aware of the possibility of &quot;gathering sensitive data from computing devices that are operating as designed.&quot;\n\n\">La soci\u00e9t\u00e9 a reconnu qu&rsquo;elle avait \u00e9t\u00e9 inform\u00e9e de la possibilit\u00e9 de \u00abrecueillir des donn\u00e9es sensibles \u00e0 partir d&rsquo;appareils informatiques fonctionnant comme pr\u00e9vu\u00bb.<\/span><br \/>\n<span title=\"Intel said that these exploits were not caused by a &quot;bug&quot; or a &quot;flaw&quot; and were not unique to Intel products.\">Intel a d\u00e9clar\u00e9 que cette exploitation n&rsquo;\u00e9tait pas caus\u00e9e par un \u00ab\u00a0bug\u00a0\u00bb ou une \u00ab\u00a0faille\u00a0\u00bb et n&rsquo;\u00e9taient pas sp\u00e9cifiques aux produits Intel. <\/span><span title=\"&quot;Based on the analysis to date, many types of computing devices \u2013 with many different vendors' processors and operating systems \u2013 are susceptible to these exploits,&quot; the company said.\n\n\">\u00ab\u00a0Sur la base de l&rsquo;analyse \u00e0 ce jour, de nombreux types d&rsquo;appareils informatiques &#8211; avec de nombreux processeurs et syst\u00e8mes d&rsquo;exploitation de diff\u00e9rents fournisseurs &#8211; sont sensibles \u00e0 cette exploitation\u00a0\u00bb.<\/span><\/p>\n<p><span title=\"Intel added that it is working with AMD, ARM and several operating system vendors to resolve the issue.\">Intel a ajout\u00e9 qu&rsquo;il travaillait avec AMD, ARM et plusieurs fournisseurs de syst\u00e8mes d&rsquo;exploitation pour r\u00e9soudre le probl\u00e8me. <\/span><span title=\"Intel added that &quot;performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.&quot;\n\n\">Intel a ajout\u00e9 que \u00ables impacts sur les performances d\u00e9pendent de la charge de travail et, pour l&rsquo;utilisateur moyen, ne devraient pas \u00eatre significatifs et seront att\u00e9nu\u00e9s au fil du temps\u00bb.<\/span><\/span><\/p>\n<p>Daniel Gruss, one of the researchers at Graz University of Technology in Austria who co-authored one of the first academic papers on Meltdown, called it \u00ab\u00a0probably one of the worst CPU bugs ever found\u00a0\u00bb in an interview with <em>Reuters<\/em>.<\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"AMD has a page providing an update on speculative execution (see https:\/\/www.amd.com\/en\/corporate\/speculative-execution) and said that one of the loopholes (bounds check bypass) has already been closed by software and OS\">AMD a une page fournissant une mise \u00e0 jour sur l&rsquo;ex\u00e9cution sp\u00e9culative <\/span><\/span>(voir <a href=\"https:\/\/www.amd.com\/en\/corporate\/speculative-execution)\">https:\/\/www.amd.com\/en\/corporate\/speculative-execution)<\/a><span lang=\"fr\"><span title=\"AMD has a page providing an update on speculative execution (see https:\/\/www.amd.com\/en\/corporate\/speculative-execution) and said that one of the loopholes (bounds check bypass) has already been closed by software and OS\"> et a d\u00e9clar\u00e9 que l&rsquo;une des failles (contr\u00f4le de contournement des bornes) a d\u00e9j\u00e0 \u00e9t\u00e9 colmat\u00e9e par logiciel et des&nbsp;<\/span><span title=\"updates;\">mises \u00e0 jour de <\/span><span title=\"AMD has a page providing an update on speculative execution (see https:\/\/www.amd.com\/en\/corporate\/speculative-execution) and said that one of the loopholes (bounds check bypass) has already been closed by software and OS\">l&rsquo;OS <\/span><span title=\"updates;\">; <\/span><span title=\"variant two (branch target injection) has not been demonstrated on AMD processors to date and that variant three (rogue data cache load) provides zero vulnerability due to differences in the AMD architecture.\n\n\">la variante 2 (<\/span><\/span>branch target injection<span lang=\"fr\"><span title=\"variant two (branch target injection) has not been demonstrated on AMD processors to date and that variant three (rogue data cache load) provides zero vulnerability due to differences in the AMD architecture.\n\n\">) n&rsquo;a pas \u00e9t\u00e9 d\u00e9montr\u00e9e sur les processeurs AMD \u00e0 ce jour et la variante 3 (chargement de cache de donn\u00e9es non autoris\u00e9) n&rsquo;offre aucune vuln\u00e9rabilit\u00e9 en raison de diff\u00e9rences dans l&rsquo;architecture AMD.<\/span><\/p>\n<p><span title=\"Daniel Gruss, one of the researchers at Graz University of Technology in Austria who co-authored one of the first academic papers on Meltdown, called it &quot;probably one of the worst CPU bugs ever found&quot; in an interview with Reuters.\">Daniel Gruss, l&rsquo;un des chercheurs de l&rsquo;universit\u00e9 de technologie de Graz en Autriche, co-auteur de l&rsquo;un des premiers articles acad\u00e9miques sur Meltdown, l&rsquo;a qualifi\u00e9 de \u00ab\u00a0probablement l&rsquo;un des pires bugs CPU jamais rencontr\u00e9s\u00a0\u00bb dans un entretien avec Reuters.<\/span><\/span><\/p>\n<p><strong>Related links and articles: <\/strong><\/p>\n<p><a href=\"http:\/\/www.intel.com\">www.intel.com<\/a><\/p>\n<p><a href=\"http:\/\/www.amd.com\">www.amd.com<\/a><\/p>\n<p><a href=\"http:\/\/www.arm.com\">www.arm.com<\/a><\/p>\n<p><a href=\"https:\/\/googleprojectzero.blogspot.co.uk\/\">googleprojectzero.blogspot.co.uk<\/a><\/p>\n<p><strong>News articles: <\/strong><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/pourquoi-thales-rachete-gemalto-pour-48-milliard-eu\"><strong>Pourquoi Thales rach\u00e8te Gemalto pour 4.8 milliard \u20ac<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/solutions-de-securite-cles-en-main-pour-proteger-les-systemes-embarques\"><strong>Solutions de s\u00e9curit\u00e9 cl\u00e9s en main pour prot\u00e9ger les syst\u00e8mes embarqu\u00e9s<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intel a publi\u00e9 une d\u00e9claration concernant les vuln\u00e9rabilit\u00e9s de ses processeurs aux attaques par logiciels sur les processeurs qui effectuent une ex\u00e9cution sp\u00e9culative de code. Tout en niant que ses processeurs sont d\u00e9fectueux, Intel a reconnu la vuln\u00e9rabilit\u00e9.<\/p>\n","protected":false},"author":22,"featured_media":134263,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[906,917],"domains":[47],"ppma_author":[1149],"class_list":["post-134262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-mpus-mcus-fr","tag-software-embedded-tools-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Meltdown et Spectre, les processeurs Intel pas seuls en cause ...<\/title>\n<meta name=\"description\" content=\"Intel a publi\u00e9 une d\u00e9claration concernant les vuln\u00e9rabilit\u00e9s de ses processeurs aux attaques par logiciels sur les processeurs qui effectuent une...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/134262\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meltdown et Spectre, les processeurs Intel pas seuls en cause\" \/>\n<meta property=\"og:description\" content=\"Intel a publi\u00e9 une d\u00e9claration concernant les vuln\u00e9rabilit\u00e9s de ses processeurs aux attaques par logiciels sur les processeurs qui effectuent une ex\u00e9cution sp\u00e9culative de code. Tout en niant que ses processeurs sont d\u00e9fectueux, Intel a reconnu la vuln\u00e9rabilit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/134262\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-05T09:25:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/screen_shot_2018-01-04_at_14.56.43.png\" \/>\n\t<meta property=\"og:image:width\" content=\"876\" \/>\n\t<meta property=\"og:image:height\" content=\"597\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Meltdown et Spectre, les processeurs Intel pas seuls en cause\",\"datePublished\":\"2018-01-05T09:25:36+00:00\",\"dateModified\":\"2018-01-05T09:25:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"keywords\":[\"MPUs\/MCUs\",\"Software &amp; Embedded tools\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/\",\"url\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/\",\"name\":\"Meltdown et Spectre, les processeurs Intel pas seuls en cause -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2018-01-05T09:25:36+00:00\",\"dateModified\":\"2018-01-05T09:25:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cdn.eenewseurope.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meltdown et Spectre, les processeurs Intel pas seuls en cause\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Meltdown et Spectre, les processeurs Intel pas seuls en cause ...","description":"Intel a publi\u00e9 une d\u00e9claration concernant les vuln\u00e9rabilit\u00e9s de ses processeurs aux attaques par logiciels sur les processeurs qui effectuent une...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/134262\/","og_locale":"fr_FR","og_type":"article","og_title":"Meltdown et Spectre, les processeurs Intel pas seuls en cause","og_description":"Intel a publi\u00e9 une d\u00e9claration concernant les vuln\u00e9rabilit\u00e9s de ses processeurs aux attaques par logiciels sur les processeurs qui effectuent une ex\u00e9cution sp\u00e9culative de code. Tout en niant que ses processeurs sont d\u00e9fectueux, Intel a reconnu la vuln\u00e9rabilit\u00e9.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/134262\/","og_site_name":"EENewsEurope","article_published_time":"2018-01-05T09:25:36+00:00","og_image":[{"width":876,"height":597,"url":"https:\/\/www.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/screen_shot_2018-01-04_at_14.56.43.png","type":"image\/png"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/#article","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Meltdown et Spectre, les processeurs Intel pas seuls en cause","datePublished":"2018-01-05T09:25:36+00:00","dateModified":"2018-01-05T09:25:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"keywords":["MPUs\/MCUs","Software &amp; Embedded tools"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/","url":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/","name":"Meltdown et Spectre, les processeurs Intel pas seuls en cause -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2018-01-05T09:25:36+00:00","dateModified":"2018-01-05T09:25:36+00:00","breadcrumb":{"@id":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eenewseurope.com\/fr\/meltdown-et-spectre-les-processeurs-intel-pas-seuls-en-cause\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cdn.eenewseurope.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Meltdown et Spectre, les processeurs Intel pas seuls en cause"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/134262"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=134262"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/134262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/134263"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=134262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=134262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=134262"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=134262"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=134262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}