{"id":2887,"date":"2023-04-06T10:00:00","date_gmt":"2023-04-06T08:00:00","guid":{"rendered":"https:\/\/www.agence-lapostolle.com\/?p=2887"},"modified":"2024-01-15T13:07:57","modified_gmt":"2024-01-15T12:07:57","slug":"le-piratage-mitm","status":"publish","type":"post","link":"https:\/\/www.agence-lapostolle.com\/en\/2023\/04\/06\/le-piratage-mitm\/","title":{"rendered":"Le piratage MitM"},"content":{"rendered":"<p>Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique. Il vise \u00e0 intercepter les communications entre deux parties. Il sert \u00e0 voler des informations sensibles telles que des mots de passe, des informations bancaires et des donn\u00e9es personnelles.<\/p>\n\n\n\n<p>Le piratage \u00ab\u00a0man-in-the-middle\u00a0\u00bb (MitM) existe depuis l&rsquo;apparition des premi\u00e8res communications r\u00e9seau. Les premi\u00e8res formes de MitM ont \u00e9t\u00e9 utilis\u00e9es dans les ann\u00e9es 1970 pour surveiller les communications militaires et diplomatiques. Mais avec le d\u00e9veloppement de l&rsquo;Internet et de la technologie de l&rsquo;information. Cette technique de piratage s&rsquo;est \u00e9tendue \u00e0 tous les types de communications en ligne.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment fonctionne le MitM ? <\/h2>\n\n\n\n<p>Le MITM est possible gr\u00e2ce \u00e0 la mise en place d&rsquo;un interm\u00e9diaire malveillant qui se place entre l&rsquo;exp\u00e9diteur et le destinataire d&rsquo;un message. L&rsquo;interm\u00e9diaire peut alors lire, modifier voire m\u00eame bloquer les communications. Tout en faisant croire aux parties qu&rsquo;elles communiquent directement entre elles. Alors que pas du tout ! Et avouons le, c&rsquo;est effrayant ! Comment savoir que l&rsquo;on se fait pirater alors qu&rsquo;aucun indice n&rsquo;est d\u00e9tectable au premier abord ? <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Leurs techniques<\/h3>\n\n\n\n<p>Il existe plusieurs techniques utilis\u00e9es pour r\u00e9aliser un MitM. L&rsquo;une des plus courantes est l&rsquo;utilisation d&rsquo;un r\u00e9seau Wi-Fi public non s\u00e9curis\u00e9. Comme lorsque l&rsquo;on mange dans un fast-food, il y a souvent un r\u00e9seau gratuit et disponible \u00e0 tous. Vous voyez de quoi il s&rsquo;agit.  \u00c0 l&rsquo;aide de ces r\u00e9seaux, les pirates peuvent cr\u00e9er un point d&rsquo;acc\u00e8s Wi-Fi malveillant qui ressemble \u00e0 un r\u00e9seau l\u00e9gitime. Et inciter les utilisateurs \u00e0 se connecter \u00e0 celui-ci. Une fois connect\u00e9, les pirates peuvent intercepter les communications et voler des informations sensibles. Alors, on ne sait pas vous, mais <a href=\"https:\/\/www.agence-lapostolle.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">nous<\/a> on ne se connecte plus au r\u00e9seau gratuit ! <\/p>\n\n\n\n<p>Une autre technique courante est l&rsquo;utilisation d&rsquo;un logiciel malveillant sur l&rsquo;ordinateur de la victime. Ce logiciel peut d&rsquo;ailleurs s&rsquo;installer via des techniques d&rsquo;ing\u00e9nierie sociale comme des courriels de phishing ou des t\u00e9l\u00e9chargements de logiciels malveillants. Une fois install\u00e9, le logiciel peut intercepter les communications en utilisant des techniques de \u00ab proxy \u00bb pour rediriger les donn\u00e9es vers le pirate.<\/p>\n\n\n\n<p>Il existe \u00e9galement des techniques plus avanc\u00e9es et complexes pour des amateurs. Par exemple il y a  l&rsquo;utilisation de certificats de s\u00e9curit\u00e9 falsifi\u00e9s pour masquer l&rsquo;interception des communications. Ces techniques ciblent souvent des entreprises ou des organisations, et servent pour espionner des activit\u00e9s commerciales ou gouvernementales.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg\" alt=\"Piratage Mitm\" class=\"wp-image-4062\" srcset=\"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg 1024w, https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm-300x300.jpeg 300w, https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm-150x150.jpeg 150w, https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm-768x768.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Comment s&rsquo;en prot\u00e9ger ? <\/h2>\n\n\n\n<p>Pour se prot\u00e9ger contre les attaques MITM, il est important d&rsquo;utiliser des r\u00e9seaux s\u00e9curis\u00e9s lorsque cela est possible. Les r\u00e9seaux Wi-Fi s\u00e9curis\u00e9s utilisent des protocoles de s\u00e9curit\u00e9 tels que <a href=\"https:\/\/www.pandasecurity.com\/fr\/mediacenter\/mobile-news\/wpa-vs-wpa2\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPA2<\/a> pour chiffrer les communications. Ce qui rend difficile pour les pirates de les intercepter. Il est \u00e9galement important de ne pas se connecter \u00e0 des r\u00e9seaux Wi-Fi publics non s\u00e9curis\u00e9s. Et de v\u00e9rifier l&rsquo;URL d&rsquo;un site web pour vous assurer que vous vous connectez \u00e0 une source l\u00e9gitime.<\/p>\n\n\n\n<p>Il est \u00e9galement important de maintenir un bon niveau de s\u00e9curit\u00e9 sur votre ordinateur en utilisant un logiciel anti-virus. Et en \u00e9tant vigilant lorsque vous ouvrez des courriels ou des t\u00e9l\u00e9chargements de logiciels.<\/p>","protected":false},"excerpt":{"rendered":"<p>Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique. Il vise \u00e0 intercepter les communications entre deux parties. Il sert \u00e0 voler des informations sensibles telles que des mots de passe, des informations bancaires et des donn\u00e9es personnelles. Le piratage \u00ab\u00a0man-in-the-middle\u00a0\u00bb (MitM) existe depuis l&rsquo;apparition des premi\u00e8res communications r\u00e9seau. Les premi\u00e8res formes [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[200,18,31,8],"tags":[216,6,44,75],"class_list":["post-2887","post","type-post","status-publish","format-standard","hentry","category-cyber-securite","category-google","category-growth-hacking","category-site-internet","tag-cybersecurite","tag-google","tag-growth-hacking","tag-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le piratage MitM | Agence Lapostolle \u00e0 Amiens<\/title>\n<meta name=\"description\" content=\"Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique qui vise \u00e0 intercepter les communications...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.agence-lapostolle.com\/en\/2023\/04\/06\/le-piratage-mitm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le piratage MitM | Agence Lapostolle \u00e0 Amiens\" \/>\n<meta property=\"og:description\" content=\"Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique qui vise \u00e0 intercepter les communications...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.agence-lapostolle.com\/en\/2023\/04\/06\/le-piratage-mitm\/\" \/>\n<meta property=\"og:site_name\" content=\"Lapostolle\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/agencelapostolle\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-06T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-15T12:07:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg\" \/>\n<meta name=\"author\" content=\"Wladimir Lapostolle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wladimir Lapostolle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/\"},\"author\":{\"name\":\"Wladimir Lapostolle\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#\\\/schema\\\/person\\\/3636da51a936bb6ffdbfc177dacd919b\"},\"headline\":\"Le piratage MitM\",\"datePublished\":\"2023-04-06T08:00:00+00:00\",\"dateModified\":\"2024-01-15T12:07:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Piratage-Mitm.jpeg\",\"keywords\":[\"cybers\u00e9curit\u00e9\",\"Google\",\"growth hacking\",\"internet\"],\"articleSection\":[\"Cyber-s\u00e9curit\u00e9\",\"Google\",\"Growth hacking\",\"Site internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/\",\"url\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/\",\"name\":\"Le piratage MitM | Agence Lapostolle \u00e0 Amiens\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Piratage-Mitm.jpeg\",\"datePublished\":\"2023-04-06T08:00:00+00:00\",\"dateModified\":\"2024-01-15T12:07:57+00:00\",\"description\":\"Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique qui vise \u00e0 intercepter les communications...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Piratage-Mitm.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Piratage-Mitm.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/2023\\\/04\\\/06\\\/le-piratage-mitm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le piratage MitM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#website\",\"url\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/\",\"name\":\"Agence Lapostolle\",\"description\":\"Agence web de cr\u00e9ation de site internet et intelligence artificielle \u00e0 Amiens en Hauts de France\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#organization\"},\"alternateName\":\"Agence web et IA \u00e0 Amiens\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#organization\",\"name\":\"Agence Lapostolle\",\"url\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Agence Lapostolle\"},\"image\":{\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/agencelapostolle\\\/\",\"https:\\\/\\\/www.instagram.com\\\/agence.lapostolle\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/agence-lapostolle\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/#\\\/schema\\\/person\\\/3636da51a936bb6ffdbfc177dacd919b\",\"name\":\"Wladimir Lapostolle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c89a7fb4c0c15ecfdf13129a9e6af9dc7d30b935661ccee5083b972020c80a4d?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c89a7fb4c0c15ecfdf13129a9e6af9dc7d30b935661ccee5083b972020c80a4d?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c89a7fb4c0c15ecfdf13129a9e6af9dc7d30b935661ccee5083b972020c80a4d?s=96&r=g\",\"caption\":\"Wladimir Lapostolle\"},\"description\":\"C\u2019est plus de 20 ans d\u2019exp\u00e9rience en informatique : Infographiste, d\u00e9veloppeur web, formateur\u2026 Expert en nouvelles technologies et dans le d\u00e9veloppement web, il est aussi sp\u00e9cialis\u00e9 en Intelligence Artificielle en terme de Machine Learning et de Deep Learning.\",\"sameAs\":[\"https:\\\/\\\/www.agence-lapostolle.com\"],\"url\":\"https:\\\/\\\/www.agence-lapostolle.com\\\/en\\\/author\\\/wlad\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le piratage MitM | Agence Lapostolle \u00e0 Amiens","description":"Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique qui vise \u00e0 intercepter les communications...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.agence-lapostolle.com\/en\/2023\/04\/06\/le-piratage-mitm\/","og_locale":"en_US","og_type":"article","og_title":"Le piratage MitM | Agence Lapostolle \u00e0 Amiens","og_description":"Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique qui vise \u00e0 intercepter les communications...","og_url":"https:\/\/www.agence-lapostolle.com\/en\/2023\/04\/06\/le-piratage-mitm\/","og_site_name":"Lapostolle","article_publisher":"https:\/\/www.facebook.com\/agencelapostolle\/","article_published_time":"2023-04-06T08:00:00+00:00","article_modified_time":"2024-01-15T12:07:57+00:00","og_image":[{"url":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg","type":"","width":"","height":""}],"author":"Wladimir Lapostolle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wladimir Lapostolle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#article","isPartOf":{"@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/"},"author":{"name":"Wladimir Lapostolle","@id":"https:\/\/www.agence-lapostolle.com\/#\/schema\/person\/3636da51a936bb6ffdbfc177dacd919b"},"headline":"Le piratage MitM","datePublished":"2023-04-06T08:00:00+00:00","dateModified":"2024-01-15T12:07:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/"},"wordCount":566,"publisher":{"@id":"https:\/\/www.agence-lapostolle.com\/#organization"},"image":{"@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg","keywords":["cybers\u00e9curit\u00e9","Google","growth hacking","internet"],"articleSection":["Cyber-s\u00e9curit\u00e9","Google","Growth hacking","Site internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/","url":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/","name":"Le piratage MitM | Agence Lapostolle \u00e0 Amiens","isPartOf":{"@id":"https:\/\/www.agence-lapostolle.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#primaryimage"},"image":{"@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg","datePublished":"2023-04-06T08:00:00+00:00","dateModified":"2024-01-15T12:07:57+00:00","description":"Le piratage Man-in-the-Middle (MITM) est une forme de piratage de s\u00e9curit\u00e9 informatique qui vise \u00e0 intercepter les communications...","breadcrumb":{"@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#primaryimage","url":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg","contentUrl":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2023\/04\/Piratage-Mitm.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.agence-lapostolle.com\/2023\/04\/06\/le-piratage-mitm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.agence-lapostolle.com\/"},{"@type":"ListItem","position":2,"name":"Le piratage MitM"}]},{"@type":"WebSite","@id":"https:\/\/www.agence-lapostolle.com\/#website","url":"https:\/\/www.agence-lapostolle.com\/","name":"Agence Lapostolle","description":"Agence web de cr\u00e9ation de site internet et intelligence artificielle \u00e0 Amiens en Hauts de France","publisher":{"@id":"https:\/\/www.agence-lapostolle.com\/#organization"},"alternateName":"Agence web et IA \u00e0 Amiens","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.agence-lapostolle.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.agence-lapostolle.com\/#organization","name":"Agence Lapostolle","url":"https:\/\/www.agence-lapostolle.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.agence-lapostolle.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2018\/10\/logo.jpg","contentUrl":"https:\/\/www.agence-lapostolle.com\/wp-content\/uploads\/2018\/10\/logo.jpg","width":1920,"height":1080,"caption":"Agence Lapostolle"},"image":{"@id":"https:\/\/www.agence-lapostolle.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/agencelapostolle\/","https:\/\/www.instagram.com\/agence.lapostolle\/","https:\/\/www.linkedin.com\/company\/agence-lapostolle"]},{"@type":"Person","@id":"https:\/\/www.agence-lapostolle.com\/#\/schema\/person\/3636da51a936bb6ffdbfc177dacd919b","name":"Wladimir Lapostolle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c89a7fb4c0c15ecfdf13129a9e6af9dc7d30b935661ccee5083b972020c80a4d?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c89a7fb4c0c15ecfdf13129a9e6af9dc7d30b935661ccee5083b972020c80a4d?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c89a7fb4c0c15ecfdf13129a9e6af9dc7d30b935661ccee5083b972020c80a4d?s=96&r=g","caption":"Wladimir Lapostolle"},"description":"C\u2019est plus de 20 ans d\u2019exp\u00e9rience en informatique : Infographiste, d\u00e9veloppeur web, formateur\u2026 Expert en nouvelles technologies et dans le d\u00e9veloppement web, il est aussi sp\u00e9cialis\u00e9 en Intelligence Artificielle en terme de Machine Learning et de Deep Learning.","sameAs":["https:\/\/www.agence-lapostolle.com"],"url":"https:\/\/www.agence-lapostolle.com\/en\/author\/wlad\/"}]}},"_links":{"self":[{"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/posts\/2887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/comments?post=2887"}],"version-history":[{"count":7,"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/posts\/2887\/revisions"}],"predecessor-version":[{"id":4079,"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/posts\/2887\/revisions\/4079"}],"wp:attachment":[{"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/media?parent=2887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/categories?post=2887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.agence-lapostolle.com\/en\/wp-json\/wp\/v2\/tags?post=2887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}