{"id":85466,"date":"2019-05-28T16:54:44","date_gmt":"2019-05-28T16:54:44","guid":{"rendered":"https:\/\/\/les-fpgas-ont-des-defauts-de-securite-inherents\/"},"modified":"2019-05-28T16:54:44","modified_gmt":"2019-05-28T16:54:44","slug":"les-fpgas-ont-des-defauts-de-securite-inherents","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/","title":{"rendered":"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents"},"content":{"rendered":"<p><span class=\"tlid-translation translation\" lang=\"fr\">En fonction de leur configuration, les FPGA peuvent assumer presque toutes les fonctions de toute autre puce. C&rsquo;est pourquoi ils sont souvent utilis\u00e9s dans le d\u00e9veloppement de nouveaux dispositifs ou syst\u00e8mes. \u00ab\u00a0Par exemple, les FPGA sont utilis\u00e9s dans le premier lot de nouveaux composants, car ils peuvent \u00eatre modifi\u00e9s ult\u00e9rieurement &#8211; contrairement \u00e0 un ASIC, dont le d\u00e9veloppement co\u00fbteux ne vaut la peine que pour de tr\u00e8s grandes quantit\u00e9s\u00a0\u00bb, d\u00e9clare Dennis Gnad de l&rsquo;Institute of Computer Engineering ( ITEC) au KIT.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Ces composants polyvalents sont utilis\u00e9s dans une grande vari\u00e9t\u00e9 d&rsquo;applications telles que les smartphones, les r\u00e9seaux de donn\u00e9es, l&rsquo;\u00e9lectronique automobile et l&rsquo;a\u00e9rospatiale. Les FPGA consomment relativement peu d&rsquo;\u00e9nergie, ce qui est id\u00e9al pour une utilisation dans les applications de serveurs et de services cloud. En outre, ces puces programmables pr\u00e9sentent un autre avantage: elles peuvent \u00eatre divis\u00e9es en fonction des besoins. \u00ab\u00a0Par exemple, un client dans un contexte cloud peut utiliser un segment du FPGA, et un autre client une&nbsp; autre partie\u00a0\u00bb, d\u00e9clare Jonas Krautter, \u00e9galement de l&rsquo;ITEC. Ceci est un sc\u00e9nario d&rsquo;utilisation attrayant pour les services cloud. Cela inclut, par exemple, des t\u00e2ches dans les domaines des bases de donn\u00e9es, des applications d&rsquo;intelligence artificielle telles que l&rsquo;apprentissage automatique ou des applications financi\u00e8res.<\/span><\/p>\n<p>\u00e0 suivre: o\u00f9 est le probl\u00e8me?<\/p>\n<hr \/>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Le probl\u00e8me: \u00ab\u00a0L&rsquo;utilisation simultan\u00e9e d&rsquo;un FPGA par plusieurs utilisateurs est une passerelle favorisant les attaques malveillantes\u00a0\u00bb, d\u00e9clare Gnad. Les pirates informatiques astucieux peuvent utiliser la polyvalence des FPGA pour mener des attaques lat\u00e9rales. Dans un tel sc\u00e9nario, les attaquants utilisent la consommation d&rsquo;\u00e9nergie de la puce pour extraire des informations avec lesquelles ils peuvent d\u00e9chiffrer son cryptage. <\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">De telles mesures internes \u00e0 la puce permettent \u00e0 un client du service cloud d&rsquo;en espionner un autre. En outre, les pirates informatiques pourraient non seulement espionner les fluctuations de la consommation d&rsquo;\u00e9nergie, mais aussi les g\u00e9n\u00e9rer eux-m\u00eames. \u00ab\u00a0Cela pourrait fausser les calculs d&rsquo;autres clients ou m\u00eame provoquer le crash de la puce enti\u00e8re, ce qui pourrait entra\u00eener une perte de donn\u00e9es\u00a0\u00bb, explique Krautter. Des dangers similaires existent avec d&rsquo;autres architectures de circuits int\u00e9gr\u00e9s, poursuit Gnad.<\/span> <span class=\"tlid-translation translation\" lang=\"fr\">Par exemple, les SoC (syst\u00e8mes sur une puce), qui sont fr\u00e9quemment utilis\u00e9s dans les applications de l&rsquo;Internet des objets.<\/p>\n<p>Gnad et Krautter ont l&rsquo;intention de r\u00e9soudre le probl\u00e8me en limitant l&rsquo;acc\u00e8s direct des utilisateurs aux FPGA. Mais ce n\u2019est pas une t\u00e2che facile: la difficult\u00e9 consiste \u00e0 filtrer les utilisateurs malveillants sans trop restreindre les autres utilisateurs.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">\u00e0 lire \u00e9galement: <\/span><\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/hardwarebee-permet-aux-ingenieurs-de-faire-le-meilleur-choix-entre-fpga-ou-asic\"><span class=\"tlid-translation translation\" lang=\"fr\">Hardwarebee permet aux ing\u00e9nieurs de faire le meilleur choix entre FPGA ou ASIC<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/hardwarebee-permet-aux-ingenieurs-de-faire-le-meilleur-choix-entre-fpga-ou-asic\">RISC-V, MIPS pourraient utiliser la plateforme de s\u00e9curit\u00e9 d&rsquo;Arm<\/a><\/p>\n<p>Original publication: &nbsp;<a href=\"https:\/\/doi.org\/10.13154\/tches.v2019.i3.305-339\">https:\/\/doi.org\/10.13154\/tches.v2019.i3.305-339<\/a><\/p>\n<p>Related articles in English:<\/p>\n<p><a href=\"https:\/\/www.smart2zero.com\/news\/fpga-secures-systems-against-variety-threats\">FPGA secures systems against a variety of threats<\/a><\/p>\n<p><a href=\"https:\/\/www.smart2zero.com\/news\/quantum-safe-security-breakthrough-existing-computers-iot-devices\">Quantum-safe security &lsquo;breakthrough&rsquo; for existing computers, IoT devices<\/a><\/p>\n<p><a href=\"https:\/\/www.eenewseurope.com\/news\/researchers-discover-new-security-vulnerabilities-intel-processors\">Researchers discover new security vulnerabilities in Intel processors<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les FPGA (Field Programmable Gate Arrays) sont des composants \u00e9lectroniques qui peuvent \u00eatre utilis\u00e9s de mani\u00e8re plus flexible que les processeurs standard. Ils sont \u00e9galement utilis\u00e9s dans les grands centres de donn\u00e9es pour les services cloud. Jusqu&rsquo;\u00e0 pr\u00e9sent, l&rsquo;utilisation de tels services \u00e9tait consid\u00e9r\u00e9e comme relativement s\u00fbre. Mais les chercheurs de l&rsquo;institut de technologie de Karlsruhe (KIT) ont maintenant trouv\u00e9 des portes d&rsquo;entr\u00e9e potentielles pour les cybercriminels.<\/p>\n","protected":false},"author":22,"featured_media":85467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[883],"tags":[893,919,908],"domains":[47],"ppma_author":[1149],"class_list":["post-85466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-authentication-encryption-fr","tag-iot-fr","tag-plds-fpgas-asics-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents ...<\/title>\n<meta name=\"description\" content=\"Les FPGA (Field Programmable Gate Arrays) sont des composants \u00e9lectroniques qui peuvent \u00eatre utilis\u00e9s de mani\u00e8re plus flexible que les processeurs...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/85466\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents\" \/>\n<meta property=\"og:description\" content=\"Les FPGA (Field Programmable Gate Arrays) sont des composants \u00e9lectroniques qui peuvent \u00eatre utilis\u00e9s de mani\u00e8re plus flexible que les processeurs standard. Ils sont \u00e9galement utilis\u00e9s dans les grands centres de donn\u00e9es pour les services cloud. Jusqu&#039;\u00e0 pr\u00e9sent, l&#039;utilisation de tels services \u00e9tait consid\u00e9r\u00e9e comme relativement s\u00fbre. Mais les chercheurs de l&#039;institut de technologie de Karlsruhe (KIT) ont maintenant trouv\u00e9 des portes d&#039;entr\u00e9e potentielles pour les cybercriminels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/85466\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-28T16:54:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/images\/01-picture-library\/electronic-components-pcb2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"828\" \/>\n\t<meta property=\"og:image:height\" content=\"580\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents\",\"datePublished\":\"2019-05-28T16:54:44+00:00\",\"dateModified\":\"2019-05-28T16:54:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\",\"IoT\",\"PLDs\/FPGAs\/ASICs\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/\",\"url\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/\",\"name\":\"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2019-05-28T16:54:44+00:00\",\"dateModified\":\"2019-05-28T16:54:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents ...","description":"Les FPGA (Field Programmable Gate Arrays) sont des composants \u00e9lectroniques qui peuvent \u00eatre utilis\u00e9s de mani\u00e8re plus flexible que les processeurs...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/85466\/","og_locale":"fr_FR","og_type":"article","og_title":"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents","og_description":"Les FPGA (Field Programmable Gate Arrays) sont des composants \u00e9lectroniques qui peuvent \u00eatre utilis\u00e9s de mani\u00e8re plus flexible que les processeurs standard. Ils sont \u00e9galement utilis\u00e9s dans les grands centres de donn\u00e9es pour les services cloud. Jusqu'\u00e0 pr\u00e9sent, l'utilisation de tels services \u00e9tait consid\u00e9r\u00e9e comme relativement s\u00fbre. Mais les chercheurs de l'institut de technologie de Karlsruhe (KIT) ont maintenant trouv\u00e9 des portes d'entr\u00e9e potentielles pour les cybercriminels.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/85466\/","og_site_name":"EENewsEurope","article_published_time":"2019-05-28T16:54:44+00:00","og_image":[{"width":828,"height":580,"url":"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/images\/01-picture-library\/electronic-components-pcb2.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/#article","isPartOf":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents","datePublished":"2019-05-28T16:54:44+00:00","dateModified":"2019-05-28T16:54:44+00:00","mainEntityOfPage":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"keywords":["Authentication &amp; Encryption","IoT","PLDs\/FPGAs\/ASICs"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/","url":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/","name":"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2019-05-28T16:54:44+00:00","dateModified":"2019-05-28T16:54:44+00:00","breadcrumb":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cdn.eenewseurope.com\/fr\/les-fpgas-ont-des-defauts-de-securite-inherents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Les FPGAs ont des d\u00e9fauts de s\u00e9curit\u00e9 inh\u00e9rents"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/85466"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=85466"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/85466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/85467"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=85466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=85466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=85466"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=85466"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=85466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}