{"id":64550,"date":"2020-02-05T11:53:11","date_gmt":"2020-02-05T11:53:11","guid":{"rendered":"https:\/\/\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/"},"modified":"2020-02-05T11:53:11","modified_gmt":"2020-02-05T11:53:11","slug":"le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/","title":{"rendered":"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle"},"content":{"rendered":"<p><span class=\"tlid-translation translation\" lang=\"fr\">En collaboration avec l&rsquo;Universit\u00e9 de St. Andrews et l&rsquo;Universit\u00e9 King Abdullah des sciences et de la technologie (KAUST), la soci\u00e9t\u00e9 affirme avoir d\u00e9velopp\u00e9 un prototype de cryptage fonctionnel appell\u00e9 \u00ab\u00a0secret parfait\u00a0\u00bb bas\u00e9 sur une puce \u00e9lectronique et avoir d\u00e9montr\u00e9 qu&rsquo;il est incassable &#8211; quelle que soit la puissance de calcul disponible dans le futur.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">\u00ab\u00a0Avec l&rsquo;av\u00e8nement des ordinateurs quantiques de plus en plus puissants\u00a0\u00bb, explique Andrea Fratalocchi, professeur agr\u00e9g\u00e9 de g\u00e9nie \u00e9lectrique \u00e0 KAUST, et leader de l&rsquo;\u00e9tude, \u00ab\u00a0tous les cryptages actuels seront bris\u00e9s dans tr\u00e8s peu de temps, exposant l&rsquo;espace priv\u00e9 de notre pr\u00e9sent et surtout, les communications pass\u00e9es, \u00e0 moins de nous mettre \u00e0 penser diff\u00e9remment. \u00ab\u00a0<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Les chercheurs des organisations travaillant sur le projet affirment avoir rigoureusement d\u00e9montr\u00e9 un protocole pour une cryptographie parfaitement secr\u00e8te qui utilise des puces de silicium compatibles CMOS qui transmettent des informations sur un r\u00e9seau optique classique public.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">\u00ab\u00a0Combin\u00e9s \u00e0 la maturit\u00e9 technologique, \u00e0 la vitesse et \u00e0 l&rsquo;\u00e9volutivit\u00e9 des communications optiques classiques, les r\u00e9sultats pr\u00e9sent\u00e9s ouvrent la voie \u00e0 la mise en \u0153uvre d&rsquo;une cryptographie parfaitement secr\u00e8te \u00e0 l&rsquo;\u00e9chelle mondiale avec des co\u00fbts ma\u00eetris\u00e9s\u00a0\u00bb ajoutent les chercheurs.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">La puce de cryptage a \u00e9t\u00e9 d\u00e9velopp\u00e9e en utilisant la th\u00e9orie du chaos et la deuxi\u00e8me loi de la thermodynamique. Elle transmet et mesure des signaux \u00e0 la vitesse de la lumi\u00e8re et a une capacit\u00e9 presque illimit\u00e9e de g\u00e9n\u00e9rer des signaux pour chaque communication. Les cl\u00e9s g\u00e9n\u00e9r\u00e9es par la puce \u00ab\u00a0secret parfait\u00a0\u00bb, qui d\u00e9verrouillent chaque message, ne sont jamais stock\u00e9es ou communiqu\u00e9es avec le message et ne peuvent pas \u00eatre recr\u00e9\u00e9es, m\u00eame par les utilisateurs eux-m\u00eames.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Les puces en silicium contiennent des structures complexes qui sont irr\u00e9versiblement modifi\u00e9es pour chaque communication, selont les chercheurs, envoyant des informations dans une cl\u00e9 unique qui ne peut jamais \u00eatre intercept\u00e9e par un attaquant. Les puces peuvent g\u00e9n\u00e9rer 0,1 Tbit de cl\u00e9s diff\u00e9rentes pour chaque millim\u00e8tre de longueur du canal d&rsquo;entr\u00e9e et n\u00e9cessitent la transmission d&rsquo;une quantit\u00e9 de donn\u00e9es inf\u00e9rieure \u00e0 1\/1 000 de la longueur du message.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Le professeur Andrea Di Falco de l&rsquo;\u00c9cole de physique et d&rsquo;astronomie de l&rsquo;Universit\u00e9 de St. Andrews, et premier auteur de l&rsquo;\u00e9tude, a d\u00e9clar\u00e9: \u00ab\u00a0Notre solution peut prot\u00e9ger les communications \u00e9chang\u00e9es par des utilisateurs s\u00e9par\u00e9s par n&rsquo;importe quelle distance et est bas\u00e9e sur une technologie mature et enti\u00e8rement \u00e9volutive et qui est pr\u00eate \u00e0 \u00eatre d\u00e9ploy\u00e9e. \u00ab\u00a0<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">CUP Sciences est responsable de la coordination des prochaines \u00e9tapes de d\u00e9veloppement de la technologie aupr\u00e8s des institutions inventrices et de la commercialisation des technologies qui en d\u00e9coulent. La soci\u00e9t\u00e9 affirme qu&rsquo;elle pr\u00e9voit des applications allant du secteur financier, \u00e0 la protection du commerce \u00e9lectronique et des services bancaires, \u00e0 l&rsquo;\u00e9nergie, \u00e0 la prise en charge des r\u00e9seaux et des villes intelligents.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">\u00abNotre micropuce offrant un\u00ab secret parfait \u00bbsera la premi\u00e8re d&rsquo;une multitude de technologies bas\u00e9es sur la complexit\u00e9 que nous allons faire \u00e9voluer vers une commercialisation rapide ce qui validera notre approche disruptive\u00bb, a d\u00e9clar\u00e9 Quelita Moreno, cofondatrice de CUP Sciences. \u00ab\u00a0Le partenaire de CUP Sciences, PERA Complexity, contribuera \u00e0 la strat\u00e9gie de commercialisation et \u00e0 la commercialisation. Nous sommes impatients d&rsquo;identifier d&rsquo;autres partenaires et investisseurs qui travailleront avec nous pour apporter cette technologie et d&rsquo;autres technologies importantes au monde.\u00a0\u00bb<\/span><\/p>\n<p>lire aussi:<\/p>\n<p><a href=\"http:\/\/Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide\">Puce de cryptage \u00e0 cl\u00e9 publique tr\u00e8s basse consommation et 500x plus rapide<\/a><\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/systeme-de-cryptage-avec-periode-dessai-gratuite-de-30-jours\"><strong>Syst\u00e8me de cryptage avec p\u00e9riode d&rsquo;essai gratuite de 30 jours<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/lantivirus-qui-trompe-les-pirates\"><strong>L&rsquo;antivirus qui trompe les pirates<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/comment-can-peut-offrir-une-cybersecurite-sans-cryptage\">Comment CAN peut offrir une cybers\u00e9curit\u00e9 sans cryptage<\/a><\/p>\n<p>For more, see \u00ab\u00a0<a href=\"https:\/\/www.nature.com\/articles\/s41467-019-13740-y\">Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips<\/a>.\u00a0\u00bb<\/p>\n<p><a href=\"https:\/\/www.cupsciences.net\/\">CUP Sciences<\/a><br \/>\n<a href=\"https:\/\/peracomplexity.com\/\">PERA Complexity<\/a><\/p>\n<p><b>Related articles:<\/b><br \/>\n<a href=\"https:\/\/www.smart2zero.com\/news\/uncrackable-encryption-comes-space\">Uncrackable encryption comes from the space<\/a><br \/>\n<a href=\"https:\/\/www.smart2zero.com\/node\/101224\">Encryption perspectives in a world of quantum computers<\/a><br \/>\n<a href=\"https:\/\/www.smart2zero.com\/news\/quantum-key-delivery-technique-claims-commercial-viability\">Quantum key delivery technique claims commercial viability<\/a><br \/>\n<a href=\"https:\/\/www.smart2zero.com\/news\/quantum-cryptography-ready-internet-scientists-say\">Quantum cryptography ready for the internet, scientists say<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La soci\u00e9t\u00e9 \u00ab\u00a0Center for Unconventional Processes of Sciences\u00a0\u00bb (CUP Sciences), qui poursuit la commercialisation de technologies mat\u00e9rielles et logicielles embarqu\u00e9es bas\u00e9es sur la complexit\u00e9, a d\u00e9clar\u00e9 avoir d\u00e9velopp\u00e9 une technologie de cryptage \u00ab\u00a0au secret parfait\u00a0\u00bb qui, selon elle, devrait permettre de \u00ab\u00a0transformer\u00a0\u00bb la cyber-s\u00e9curit\u00e9.<\/p>\n","protected":false},"author":22,"featured_media":64551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[893,896,919,913,905,907,917,915],"domains":[47],"ppma_author":[1149],"class_list":["post-64550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-authentication-encryption-fr","tag-digitalsignalprocessing-fr","tag-iot-fr","tag-materials-processes-fr","tag-memory-data-storage-fr","tag-optoelectronics-fr","tag-software-embedded-tools-fr","tag-wireless-communications-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title><\/title>\n<meta name=\"description\" content=\"La soci\u00e9t\u00e9 &quot;Center for Unconventional Processes of Sciences&quot; (CUP Sciences), qui poursuit la commercialisation de technologies mat\u00e9rielles et logicielles...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/64550\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle\" \/>\n<meta property=\"og:description\" content=\"La soci\u00e9t\u00e9 &quot;Center for Unconventional Processes of Sciences&quot; (CUP Sciences), qui poursuit la commercialisation de technologies mat\u00e9rielles et logicielles embarqu\u00e9es bas\u00e9es sur la complexit\u00e9, a d\u00e9clar\u00e9 avoir d\u00e9velopp\u00e9 une technologie de cryptage &quot;au secret parfait&quot; qui, selon elle, devrait permettre de &quot;transformer&quot; la cyber-s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/64550\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-05T11:53:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/2020-01-30_cryptography_encryption_perfect_secrecy_cybersecurity_cup_sciences.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle\",\"datePublished\":\"2020-02-05T11:53:11+00:00\",\"dateModified\":\"2020-02-05T11:53:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\",\"DigitalSignalProcessing\",\"IoT\",\"Materials &amp; processes\",\"Memory &amp; Data Storage\",\"Optoelectronics\",\"Software &amp; Embedded tools\",\"Wireless Communications\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/\",\"name\":\"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2020-02-05T11:53:11+00:00\",\"dateModified\":\"2020-02-05T11:53:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit?...","description":"La soci\u00e9t\u00e9 \"Center for Unconventional Processes of Sciences\" (CUP Sciences), qui poursuit la commercialisation de technologies mat\u00e9rielles et logicielles...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/64550\/","og_locale":"fr_FR","og_type":"article","og_title":"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle","og_description":"La soci\u00e9t\u00e9 \"Center for Unconventional Processes of Sciences\" (CUP Sciences), qui poursuit la commercialisation de technologies mat\u00e9rielles et logicielles embarqu\u00e9es bas\u00e9es sur la complexit\u00e9, a d\u00e9clar\u00e9 avoir d\u00e9velopp\u00e9 une technologie de cryptage \"au secret parfait\" qui, selon elle, devrait permettre de \"transformer\" la cyber-s\u00e9curit\u00e9.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/64550\/","og_site_name":"EENewsEurope","article_published_time":"2020-02-05T11:53:11+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/2020-01-30_cryptography_encryption_perfect_secrecy_cybersecurity_cup_sciences.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle","datePublished":"2020-02-05T11:53:11+00:00","dateModified":"2020-02-05T11:53:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/"},"wordCount":707,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"keywords":["Authentication &amp; Encryption","DigitalSignalProcessing","IoT","Materials &amp; processes","Memory &amp; Data Storage","Optoelectronics","Software &amp; Embedded tools","Wireless Communications"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/","url":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/","name":"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2020-02-05T11:53:11+00:00","dateModified":"2020-02-05T11:53:11+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/le-cryptage-secret-parfait-sur-une-puce-offre-une-securite-inconditionnelle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Le cryptage \u00absecret parfait sur une puce\u00bb offre une s\u00e9curit\u00e9 inconditionnelle"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/64550"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=64550"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/64550\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/64551"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=64550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=64550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=64550"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=64550"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=64550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}