{"version":"1.0","provider_name":"LockPassGen","provider_url":"https:\/\/lockpassgen.com\/blog","title":"Ce que votre pirates informatiques r\u00e9v\u00e8le sur vous - LockPassGen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"z72DlJ9VTk\"><a href=\"https:\/\/lockpassgen.com\/blog\/ce-que-votre-pirates-informatiques-revele-sur-vous\/\">Ce que votre pirates informatiques r\u00e9v\u00e8le sur vous<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lockpassgen.com\/blog\/ce-que-votre-pirates-informatiques-revele-sur-vous\/embed\/#?secret=z72DlJ9VTk\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Ce que votre pirates informatiques r\u00e9v\u00e8le sur vous\u00a0\u00bb &#8212; LockPassGen\" data-secret=\"z72DlJ9VTk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/lockpassgen.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Derri\u00e8re chaque cyberattaque se cache une histoire. Pas seulement celle d\u2019un syst\u00e8me vuln\u00e9rable, mais celle d\u2019un \u00eatre humain dont les habitudes, les faiblesses et les d\u00e9sirs sont expos\u00e9s au grand jour. Un hacker qui infiltre votre vie num\u00e9rique ne se contente pas de voler des donn\u00e9es\u202f; il dresse un portrait psychologique et comportemental de sa..."}