{"id":2375,"date":"2012-10-05T19:23:13","date_gmt":"2012-10-05T18:23:13","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=2375"},"modified":"2019-12-23T11:54:27","modified_gmt":"2019-12-23T10:54:27","slug":"democratiser-les-qr-codes-sans-les-risques","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/","title":{"rendered":"D\u00e9mocratiser les QR codes &#8230; sans les risques"},"content":{"rendered":"<p>L\u2019utilisation des QR codes (codes matriciels) est en pleine expansion. Devenu monnaie courante sur les supports marketing, ce nouveau vecteur de communication est-il sans risque ?<\/p>\n<h2>Qu&#8217;est qu&#8217;un QR code ?<\/h2>\n<p>Le QR code c\u2019est avant tout\u2026 un simple code-barres 2D (bidimensionnel). &#8220;QR&#8221; signifie Quick Response, en r\u00e9f\u00e9rence \u00e0 la rapidit\u00e9 de d\u00e9codage de ce carr\u00e9 le plus souvent noir et blanc. \u00c0 la diff\u00e9rence d&#8217;un code-barres classique (10 \u00e0 13 caract\u00e8res), le QR code peut contenir \u00e9norm\u00e9ment d\u2019informations (jusqu\u2019\u00e0 7000 caract\u00e8res). Pour d\u00e9coder l\u2019information, il suffit d\u2019un Smartphone \u00e9quip\u00e9 d&#8217;une cam\u00e9ra et\u00a0 d\u2019un lecteur de QR code.<\/p>\n<p>La lecture d\u2019un QR code permet d\u2019\u00eatre redirig\u00e9 vers un site internet, faire un paiement direct via son smartphone, d\u00e9clencher un appel vers un num\u00e9ro de t\u00e9l\u00e9phone, envoyer un SMS, ou encore t\u00e9l\u00e9charger une application mobile.<\/p>\n<p>Les QR codes cr\u00e9ent ainsi un lien entre monde physique et monde virtuel. Ce lien est alors une nouvelle porte d\u2019entr\u00e9e vers les donn\u00e9es personnelles voire les SI d\u2019entreprises et, ainsi, une nouvelle fen\u00eatre d\u2019attaque&#8230;<\/p>\n<h2>Quels sont les risques\u00a0?<\/h2>\n<p>L\u2019id\u00e9e est d\u2019utiliser les QR codes comme vecteur d\u2019attaque des smartphones et de leurs utilisateurs en particulier pour les diriger automatiquement vers un site malveillant afin de voler des informations.<\/p>\n<p>L\u2019attaque la plus r\u00e9pandue est le d\u00e9facement de support. Du simple ajout d\u2019un faux QR code sur un support qui n\u2019en contenait pas, \u00e0 la superposition d\u2019un QR code ill\u00e9gitime par-dessus le QR code initialement int\u00e9gr\u00e9 au support, le but est de renvoyer vers un contenu ma\u00eetris\u00e9 par l\u2019auteur du d\u00e9facement. On a ainsi vu, sur une affiche publicitaire en Argentine, un concurrent mettre un QR code qui renvoyait vers son propre site de vente de r\u00e9frig\u00e9rateur, ou, aux \u00c9tats-Unis, un d\u00e9facement qui redirigeait vers un site qui lan\u00e7ait le jailbreak de l\u2019IPhone et installait en m\u00eame temps keyloggers et autres logiciels malveillants.<\/p>\n<p>Le cas le plus connu d\u2019attaque via les codes-barres 2D nous vient de Russie o\u00f9 une affiche invitait \u00e0 scanner un QR code pour t\u00e9l\u00e9charger une application, application, qui, une fois install\u00e9e, envoyait \u00e0 l\u2019insu du propri\u00e9taire du smartphone des SMS \u00e0 un num\u00e9ro surtax\u00e9 (6$ par envoi)\u2026<\/p>\n<p>Dans ces attaques, le risque est principalement port\u00e9 par les utilisateurs. Cependant, le QR code peut \u00e9galement \u00eatre utilis\u00e9 comme moyen d\u2019identification. L\u2019utilisation de QR code \u00e0 de telles fins, notamment pour le m-paiement pr\u00e9sente plus de risques. Le principe est de g\u00e9n\u00e9rer un QR code unique sur le smartphone que l\u2019on pr\u00e9sente au commer\u00e7ant pour s\u2019authentifier et payer. Ceci n\u00e9cessite \u00e0 la fois une application sp\u00e9cifique pour la g\u00e9n\u00e9ration du QR code et une connexion du syst\u00e8me du commer\u00e7ant au back office de l\u2019applicatif install\u00e9 sur le smartphone. Les risques de compromission du syst\u00e8me de paiement et d\u2019usurpation d\u2019identit\u00e9 sont r\u00e9els et doivent faire l\u2019objet de mesures de s\u00e9curit\u00e9 avanc\u00e9es telles que des codes d\u2019authentification r\u00e9g\u00e9n\u00e9r\u00e9s \u00e0 chaque utilisation, la validation et la notification du paiement apr\u00e8s l\u2019authentification\u2026.<\/p>\n<h2>Comment se prot\u00e8ge-t-on\u00a0?<\/h2>\n<p>Le risque de d\u00e9facement est difficile \u00e0 ma\u00eetriser. Si un haut degr\u00e9 de personnification du code, ou le choix de supports compliqu\u00e9s \u00e0 d\u00e9facer (publicit\u00e9 dans la presse, \u00e9cran plut\u00f4t que affiche publicitaire, \u2026), peuvent l\u2019att\u00e9nuer, ce risque doit globalement \u00eatre accept\u00e9.<\/p>\n<p>La principale vuln\u00e9rabilit\u00e9 des tags vient du fait que l\u2019utilisateur n\u2019a pas de vision sur l\u2019action d\u00e9clench\u00e9e lors de la lecture du code. Cette faille peut \u00eatre palli\u00e9e par l\u2019utilisation de lecteurs de QR code qui pr\u00e9sentent l\u2019action demand\u00e9e \u00ab\u00a0\u00e0 priori\u00a0\u00bb pour validation. Les soci\u00e9t\u00e9s utilisant des QR codes peuvent dans un premier temps conseiller l\u2019utilisation de lecteur proposant de telles fonctionnalit\u00e9s et dans un second temps choisir des adresses parlantes pour les utilisateurs (par exemple <a href=\"http:\/\/www.solucom.fr\" target=\"_blank\" rel=\"noopener noreferrer\">www.solucom.fr<\/a> et non \u00a0<a href=\"http:\/\/www.xds2.to\">www.xds2.to<\/a>) afin d\u2019indiquer clairement la page internet point\u00e9e.<\/p>\n<p>Notons tout de m\u00eame que malgr\u00e9 des millions de scans quotidiens, tr\u00e8s peu d\u2019attaques sont aujourd\u2019hui recens\u00e9es. Toutefois, les nouveaux modes d\u2019usage, tels que le m-paiement doivent faire l\u2019objet d\u2019attentions particuli\u00e8res, les risques devenant partag\u00e9s entre utilisateurs, \u00e9diteurs de solutions et le commanditaire.<\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019utilisation des QR codes (codes matriciels) est en pleine expansion. Devenu monnaie courante sur les supports marketing, ce nouveau vecteur de communication est-il sans risque ? Qu&#8217;est qu&#8217;un QR code ? Le QR code c\u2019est avant tout\u2026 un simple code-barres&#8230;<\/p>\n","protected":false},"author":21,"featured_media":6344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36,43],"tags":[],"coauthors":[807],"class_list":["post-2375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","category-telcos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9mocratiser les QR codes ... sans les risques - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9mocratiser les QR codes ... sans les risques - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"L\u2019utilisation des QR codes (codes matriciels) est en pleine expansion. Devenu monnaie courante sur les supports marketing, ce nouveau vecteur de communication est-il sans risque ? Qu&#8217;est qu&#8217;un QR code ? Le QR code c\u2019est avant tout\u2026 un simple code-barres...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-05T18:23:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-23T10:54:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gabriel Amirault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriel Amirault\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\"},\"author\":{\"name\":\"Gabriel Amirault\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\"},\"headline\":\"D\u00e9mocratiser les QR codes &#8230; sans les risques\",\"datePublished\":\"2012-10-05T18:23:13+00:00\",\"dateModified\":\"2019-12-23T10:54:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Telcos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\",\"name\":\"D\u00e9mocratiser les QR codes ... sans les risques - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"datePublished\":\"2012-10-05T18:23:13+00:00\",\"dateModified\":\"2019-12-23T10:54:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9mocratiser les QR codes &#8230; sans les risques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\",\"name\":\"Gabriel Amirault\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9mocratiser les QR codes ... sans les risques - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/","og_locale":"en_US","og_type":"article","og_title":"D\u00e9mocratiser les QR codes ... sans les risques - RiskInsight","og_description":"L\u2019utilisation des QR codes (codes matriciels) est en pleine expansion. Devenu monnaie courante sur les supports marketing, ce nouveau vecteur de communication est-il sans risque ? Qu&#8217;est qu&#8217;un QR code ? Le QR code c\u2019est avant tout\u2026 un simple code-barres...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/","og_site_name":"RiskInsight","article_published_time":"2012-10-05T18:23:13+00:00","article_modified_time":"2019-12-23T10:54:27+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","type":"image\/jpeg"}],"author":"Gabriel Amirault","twitter_misc":{"Written by":"Gabriel Amirault","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/"},"author":{"name":"Gabriel Amirault","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca"},"headline":"D\u00e9mocratiser les QR codes &#8230; sans les risques","datePublished":"2012-10-05T18:23:13+00:00","dateModified":"2019-12-23T10:54:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/"},"wordCount":777,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Telcos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/","name":"D\u00e9mocratiser les QR codes ... sans les risques - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","datePublished":"2012-10-05T18:23:13+00:00","dateModified":"2019-12-23T10:54:27+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/10\/democratiser-les-qr-codes-sans-les-risques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"D\u00e9mocratiser les QR codes &#8230; sans les risques"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca","name":"Gabriel Amirault","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=2375"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2375\/revisions"}],"predecessor-version":[{"id":12465,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/2375\/revisions\/12465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6344"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=2375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=2375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=2375"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=2375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}