{"id":38483,"date":"2024-06-18T10:29:45","date_gmt":"2024-06-18T10:29:45","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=38483"},"modified":"2024-06-20T11:51:27","modified_gmt":"2024-06-20T11:51:27","slug":"cyber-carte-28-les-pieges-des-deepfakes","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/","title":{"rendered":"Cyber Carte #28 &#8211; Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.25.2&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb min_height=\u00a0\u00bb1363.1px\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<span>Il y a quelques ann\u00e9es, nous les aurions class\u00e9s dans la pure science-fiction, alors qu&rsquo;aujourd&rsquo;hui ils sont si r\u00e9els qu&rsquo;ils paraissent r\u00e9els. Il s&rsquo;agit des deepfakes, l&rsquo;un des principaux outils de manipulation et de falsification de la r\u00e9alit\u00e9, tr\u00e8s appr\u00e9ci\u00e9 des hackers pour leurs escroqueries. <\/span><\/p>\n<p><span>Il s&rsquo;agit d&rsquo;une technique qui, gr\u00e2ce \u00e0 l&rsquo;intelligence artificielle, permet de combiner et de superposer des images et des vid\u00e9os existantes avec des vid\u00e9os ou des images originales. Le r\u00e9sultat est sans doute surprenant. Pour reconna\u00eetre les Deepfakes et \u00e9viter d&rsquo;en \u00eatre les victimes, n<\/span><span>Il n&rsquo;est pas n\u00e9cessaire d&rsquo;\u00eatre un \u00ab\u00a0expert\u00a0\u00bb en s\u00e9curit\u00e9 informatique.<\/span><span> Il suffit de suivre quelques r\u00e8gles de base simples.<\/span><\/p>\n<p><em><strong>Cette cybercarte peut vous aider \u00e0 acqu\u00e9rir la bonne conscience num\u00e9rique !<\/strong><\/em><em><strong><\/strong><\/em><\/p>\n<p><em><strong><\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_FR.webp\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_FR.webp\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:image -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il y a quelques ann\u00e9es, nous les aurions class\u00e9s dans la pure science-fiction, alors qu&rsquo;aujourd&rsquo;hui ils sont si r\u00e9els qu&rsquo;ils paraissent r\u00e9els. Il s&rsquo;agit des deepfakes, l&rsquo;un des principaux outils de manipulation et de falsification de la r\u00e9alit\u00e9, tr\u00e8s appr\u00e9ci\u00e9 des hackers pour leurs escroqueries. Il s&rsquo;agit d&rsquo;une technique qui, gr\u00e2ce \u00e0 l&rsquo;intelligence artificielle, permet [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":38524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[],"class_list":["post-38483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Carte #28 - Les pi\u00e8ges des deepfakes<\/title>\n<meta name=\"description\" content=\"Deepfakes : comment distinguer la r\u00e9alit\u00e9 de la manipulation. Sensibilisez-vous au num\u00e9rique pour \u00e9viter de devenir une victime.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Carte #28 - Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter\" \/>\n<meta property=\"og:description\" content=\"Deepfakes : comment distinguer la r\u00e9alit\u00e9 de la manipulation. Sensibilisez-vous au num\u00e9rique pour \u00e9viter de devenir une victime.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-18T10:29:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T11:51:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_Preview_FR.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Carte #28 &#8211; Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter\",\"datePublished\":\"2024-06-18T10:29:45+00:00\",\"dateModified\":\"2024-06-20T11:51:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/\"},\"wordCount\":276,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/CyberCard_28_Preview_FR.webp\",\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/\",\"name\":\"Cyber Carte #28 - Les pi\u00e8ges des deepfakes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/CyberCard_28_Preview_FR.webp\",\"datePublished\":\"2024-06-18T10:29:45+00:00\",\"dateModified\":\"2024-06-20T11:51:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Deepfakes : comment distinguer la r\u00e9alit\u00e9 de la manipulation. Sensibilisez-vous au num\u00e9rique pour \u00e9viter de devenir une victime.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/CyberCard_28_Preview_FR.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/CyberCard_28_Preview_FR.webp\",\"width\":1440,\"height\":810,\"caption\":\"DeepFake - cyber card\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/06\\\/18\\\/cyber-carte-28-les-pieges-des-deepfakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Carte #28 &#8211; Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Carte #28 - Les pi\u00e8ges des deepfakes","description":"Deepfakes : comment distinguer la r\u00e9alit\u00e9 de la manipulation. Sensibilisez-vous au num\u00e9rique pour \u00e9viter de devenir une victime.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber Carte #28 - Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter","og_description":"Deepfakes : comment distinguer la r\u00e9alit\u00e9 de la manipulation. Sensibilisez-vous au num\u00e9rique pour \u00e9viter de devenir une victime.","og_url":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-06-18T10:29:45+00:00","article_modified_time":"2024-06-20T11:51:27+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_Preview_FR.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Carte #28 &#8211; Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter","datePublished":"2024-06-18T10:29:45+00:00","dateModified":"2024-06-20T11:51:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/"},"wordCount":276,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_Preview_FR.webp","articleSection":["Carte"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/","url":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/","name":"Cyber Carte #28 - Les pi\u00e8ges des deepfakes","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_Preview_FR.webp","datePublished":"2024-06-18T10:29:45+00:00","dateModified":"2024-06-20T11:51:27+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Deepfakes : comment distinguer la r\u00e9alit\u00e9 de la manipulation. Sensibilisez-vous au num\u00e9rique pour \u00e9viter de devenir une victime.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_Preview_FR.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/06\/CyberCard_28_Preview_FR.webp","width":1440,"height":810,"caption":"DeepFake - cyber card"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/06\/18\/cyber-carte-28-les-pieges-des-deepfakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Cyber Carte #28 &#8211; Les pi\u00e8ges des deepfakes, comment les reconnaitre et les \u00e9viter"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/38483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=38483"}],"version-history":[{"count":12,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/38483\/revisions"}],"predecessor-version":[{"id":38579,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/38483\/revisions\/38579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/38524"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=38483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=38483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=38483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}