{"id":28039,"date":"2011-08-30T11:40:03","date_gmt":"2011-08-30T09:40:03","guid":{"rendered":"http:\/\/www.pauljorion.com\/blog\/?p=28039"},"modified":"2013-01-02T14:35:08","modified_gmt":"2013-01-02T13:35:08","slug":"les-murs-ont-des-oreilles","status":"publish","type":"post","link":"https:\/\/www.pauljorion.com\/blog\/2011\/08\/30\/les-murs-ont-des-oreilles\/","title":{"rendered":"<b>LES MURS ONT DES OREILLES !<\/b>"},"content":{"rendered":"<p>Dans <a href=\"http:\/\/online.wsj.com\/article\/SB10001424053111904199404576538721260166388.html?mod=WSJEurope_hpp_LEFTTopStories\"><strong>un article publi\u00e9 ce matin<\/strong><\/a>, le Wall Street Journal dresse le catalogue des firmes qui ont certainement vendu ou tr\u00e8s probablement vendu au colonel Khadafi du mat\u00e9riel d&rsquo;interception de communications t\u00e9l\u00e9phoniques ou par courriel, de blocage de sites toile, de d\u00e9codage de messages crypt\u00e9s et de blocage de communications anonymes sur l&rsquo;Internet.<\/p>\n<p>On trouve dans la liste, le fran\u00e7ais Amesys, filiale de Bull, l&rsquo;am\u00e9ricain Narus, filiale de Boeing, le chinois ZTE et le Sud-africain VASTech.<\/p>\n<p>Comme le Wall Street Journal le fait remarquer, la vente de ces mat\u00e9riels est libre \u00e0 peu pr\u00e8s partout. Soyez donc prudent : il n&rsquo;y a pas que le gouvernement qui \u00e9coute toutes vos conversations t\u00e9l\u00e9phoniques et qui lit tous vos mails : toute compagnie priv\u00e9e suffisamment riche pour s&rsquo;acheter un logiciel (!) a la capacit\u00e9 de le faire aussi.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans <a href=\"http:\/\/online.wsj.com\/article\/SB10001424053111904199404576538721260166388.html?mod=WSJEurope_hpp_LEFTTopStories\"><strong>un article publi\u00e9 ce matin<\/strong><\/a>, le Wall Street Journal dresse le catalogue des firmes qui ont certainement vendu ou tr\u00e8s probablement vendu au colonel Khadafi du mat\u00e9riel d&rsquo;interception de communications t\u00e9l\u00e9phoniques ou par courriel, de blocage de sites toile, de d\u00e9codage de messages crypt\u00e9s et de blocage de communications anonymes sur l&rsquo;Internet.<\/p>\n<p>On [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,1317],"tags":[1319],"class_list":["post-28039","post","type-post","status-publish","format-standard","hentry","category-blog","category-numerique","tag--la-guerre-civile-numerique-"],"_links":{"self":[{"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/posts\/28039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/comments?post=28039"}],"version-history":[{"count":9,"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/posts\/28039\/revisions"}],"predecessor-version":[{"id":47110,"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/posts\/28039\/revisions\/47110"}],"wp:attachment":[{"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/media?parent=28039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/categories?post=28039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pauljorion.com\/blog\/wp-json\/wp\/v2\/tags?post=28039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}