{"id":46316,"date":"2022-02-20T09:41:20","date_gmt":"2022-02-20T09:41:20","guid":{"rendered":"https:\/\/jazairhope.org\/?p=46316"},"modified":"2022-02-19T22:42:10","modified_gmt":"2022-02-19T22:42:10","slug":"il-faut-une-strategie-nationale-de-cybernetique","status":"publish","type":"post","link":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/","title":{"rendered":"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d"},"content":{"rendered":"<p><span style=\"color: #003366\"><strong>Libert\u00e9 : Comme nous l\u2019a montr\u00e9 le rapport de Securelist de Kaspersky et les r\u00e9centes attaques du Maroc, les cyberattaques repr\u00e9sentent une r\u00e9elle menace pour l\u2019Alg\u00e9rie. Comment appr\u00e9hendez-vous cette menace ?<\/strong><\/span><\/p>\n<p><span style=\"color: #003366\"><strong>Youn\u00e8s Grar :\u00a0<\/strong>On a d\u00e9j\u00e0 v\u00e9cu ces guerres \u00e9lectroniques entre les USA, la Chine, la Russie, l\u2019Iran, etc. L\u2019Alg\u00e9rie n\u2019est pas exclue de cette guerre \u00e9lectronique. Elle est cibl\u00e9e par cette guerre ! Notamment \u00e0 cause des conflits r\u00e9gionaux. L\u2019Alg\u00e9rie n\u2019a pas que des pays amis, elle a \u00e9galement des pays ennemis et qui veulent lui faire du mal en s\u2019attaquant \u00e0 ses syst\u00e8mes d\u2019information pour la d\u00e9stabiliser.\u00a0<\/span><br \/>\n<span style=\"color: #003366\">On re\u00e7oit beaucoup d\u2019attaques pour d\u00e9sactiver les services de num\u00e9risation et les rendre inaccessibles, mais aussi instaurer la m\u00e9fiance chez les citoyens. De l\u2019autre c\u00f4t\u00e9, on a v\u00e9cu l\u2019affaire du logiciel Pegasus d\u2019espionnage avec le Maroc qui s\u2019est attaqu\u00e9 \u00e0 des personnalit\u00e9s alg\u00e9riennes \u00e0 travers le t\u00e9l\u00e9phone et les applications utilis\u00e9es sur le smartphone. Cela d\u00e9montre que l\u2019Alg\u00e9rie est bien cibl\u00e9e. Maintenant, il s\u2019agit d\u2019organiser une riposte \u00e0 travers des antivirus et des syst\u00e8mes anti-intrusion et instaurer une nouvelle culture \u00e9lectronique pour se pr\u00e9munir de ces attaques.\u00a0<\/span><br \/>\n<span style=\"color: #003366\">Cela dit, il faut savoir que ce sont tous les pays qui sont attaqu\u00e9s, pas uniquement l\u2019Alg\u00e9rie ! Il ne faut pas s\u2019alarmer. Au contraire, il faut se pr\u00e9parer scientifiquement et techniquement parce que c\u2019est l\u2019affaire de toute notre vie. Aujourd\u2019hui, c\u2019est le Maroc, demain, ce sera un autre pays.<\/span><\/p>\n<p><span style=\"color: #003366\"><strong>Les mails constituent une forme s\u00e9v\u00e8re d\u2019attaques et de vols de donn\u00e9es, selon le m\u00eame rapport, notamment via les spams et le hame\u00e7onnage. Comment peut-on d\u00e9faire les parades des cybercriminels ?<\/strong><\/span><\/p>\n<p><span style=\"color: #003366\">Les mails sont les outils les plus utilis\u00e9s du point de vue professionnel et de la p\u00e9riodicit\u00e9 d\u2019usage pour recevoir des messages et des donn\u00e9es, mais aussi pour acc\u00e9der aux r\u00e9seaux sociaux. C\u2019est un outil tr\u00e8s cibl\u00e9 par les cybercriminels. La m\u00e9fiance est de mise et \u00e0 charge de l\u2019utilisateur d\u2019\u00eatre vigilant quant \u00e0 la fiabilit\u00e9 des donn\u00e9es et des liens qu\u2019il re\u00e7oit. Cette culture, il faut l\u2019inculquer au citoyen d\u00e8s le bas \u00e2ge, c\u2019est-\u00e0-dire d\u00e8s le niveau \u00e9l\u00e9mentaire de l\u2019\u00e9l\u00e8ve. Tout le monde est concern\u00e9 par cette culture. Aussi, il faut solliciter l\u2019assistance et l\u2019accompagnement des sp\u00e9cialistes pour r\u00e9soudre les probl\u00e8mes li\u00e9s \u00e0 ces mails ind\u00e9sirables. Il faut former le citoyen \u00e0 la s\u00e9curit\u00e9 num\u00e9rique. Mais, en amont, ce sont les d\u00e9cideurs qui sont le plus concern\u00e9s, que ce soit dans les entreprises, les administrations ou encore les secteurs strat\u00e9giques o\u00f9 les donn\u00e9es ont une importance primordiale. Il y va de la vie priv\u00e9e du citoyen jusqu\u2019\u00e0 l\u2019int\u00e9grit\u00e9 de l\u2019\u00c9tat.<\/span><\/p>\n<p><span style=\"color: #003366\"><strong>Que pr\u00e9coniseriez-vous pour assurer une immunit\u00e9 contre les formes d\u2019espionnage\u00a0 auxquelles fait face l\u2019Alg\u00e9rie, notamment de la part de nos voisins de l\u2019Ouest ?<\/strong><\/span><\/p>\n<p><span style=\"color: #003366\">Il faut une strat\u00e9gie nationale de cybern\u00e9tique pour prot\u00e9ger notre r\u00e9seau pour qu\u2019il ne soit pas cibl\u00e9 par des attaques r\u00e9currentes et qui pourraient provoquer des d\u00e9g\u00e2ts inestimables sur les syst\u00e8mes d\u2019information du pays. Il faut \u00eatre sur le qui-vive et d\u00e9ployer des experts du domaine pour mettre en place cette strat\u00e9gie qui touchera tous les secteurs sans exclusive. Parall\u00e8lement, il faut sensibiliser et former \u00e0 tous les niveaux. Car les retomb\u00e9es d\u2019une attaque sont souvent d\u00e9sastreuses pour un pays. Aussi, l\u2019Alg\u00e9rie a beaucoup plus besoin d\u2019outils et d\u2019\u00e9quipements \u00e9lectroniques de s\u00e9curisation des donn\u00e9es pour se pr\u00e9munir contre les attaques similaires \u00e0 celles perp\u00e9tr\u00e9es par nos voisins (Maroc, ndlr).\u00a0<\/span><br \/>\n<span style=\"color: #003366\">Du reste, il ne faut pas se contenter d\u2019une seule entreprise ou d\u2019un seul pays pour acqu\u00e9rir ces solutions, sinon, on tombera sous le coup d\u2019une d\u00e9pendance ou d\u2019injonctions de leurs gouvernements. Il faut les accompagner avec des entreprises locales pour limiter cette d\u00e9pendance. Enfin, je pr\u00e9conise la cr\u00e9ation d\u2019une structure pour analyser les donn\u00e9es et les attaques, comme celles du logiciel Pegasus du Maroc. C\u2019est cette structure qui prendra les d\u00e9cisions ad\u00e9quates, y compris les poursuites judiciaires aux tribunaux internationaux.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #003366\"><em>Entretien r\u00e9alis\u00e9 par\u00a0<\/em><strong>:\u00a0F. BELGACEM<\/strong><\/span><\/p>\n<p><span style=\"color: #003366\">www.liberte-algerie.com<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Libert\u00e9 : Comme nous l\u2019a montr\u00e9 le rapport de Securelist de Kaspersky et les r\u00e9centes attaques du Maroc, les cyberattaques repr\u00e9sentent une&hellip;<\/p>\n","protected":false},"author":58,"featured_media":46317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[35,50],"tags":[],"class_list":["post-46316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-economie","category-science-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d - AAH.JZR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d - AAH.JZR\" \/>\n<meta property=\"og:description\" content=\"Libert\u00e9 : Comme nous l\u2019a montr\u00e9 le rapport de Securelist de Kaspersky et les r\u00e9centes attaques du Maroc, les cyberattaques repr\u00e9sentent une&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/\" \/>\n<meta property=\"og:site_name\" content=\"AAH.JZR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jazairhope\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-20T09:41:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jazairhope.org\/wp-content\/uploads\/2022\/02\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mohamed Redha Chettibi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mohamed Redha Chettibi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/\"},\"author\":{\"name\":\"Mohamed Redha Chettibi\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#\\\/schema\\\/person\\\/25f89793241399d8600e452019d99b77\"},\"headline\":\"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d\",\"datePublished\":\"2022-02-20T09:41:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/\"},\"wordCount\":790,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg\",\"articleSection\":[\"\u00c9conomie\",\"Science &amp; Technologie\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/\",\"url\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/\",\"name\":\"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d - AAH.JZR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg\",\"datePublished\":\"2022-02-20T09:41:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#\\\/schema\\\/person\\\/25f89793241399d8600e452019d99b77\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg\",\"contentUrl\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg\",\"width\":850,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/il-faut-une-strategie-nationale-de-cybernetique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/\",\"name\":\"AAH.JZR\",\"description\":\"Environment, Health, Science, Art, Economics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#\\\/schema\\\/person\\\/25f89793241399d8600e452019d99b77\",\"name\":\"Mohamed Redha Chettibi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fbd403d607af3d36f26025d8726b5d4b27c7ea4fe21ef10d17299a6c717ed442?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fbd403d607af3d36f26025d8726b5d4b27c7ea4fe21ef10d17299a6c717ed442?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fbd403d607af3d36f26025d8726b5d4b27c7ea4fe21ef10d17299a6c717ed442?s=96&d=mm&r=g\",\"caption\":\"Mohamed Redha Chettibi\"},\"url\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/author\\\/mrc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d - AAH.JZR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/","og_locale":"fr_FR","og_type":"article","og_title":"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d - AAH.JZR","og_description":"Libert\u00e9 : Comme nous l\u2019a montr\u00e9 le rapport de Securelist de Kaspersky et les r\u00e9centes attaques du Maroc, les cyberattaques repr\u00e9sentent une&hellip;","og_url":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/","og_site_name":"AAH.JZR","article_publisher":"https:\/\/www.facebook.com\/jazairhope","article_published_time":"2022-02-20T09:41:20+00:00","og_image":[{"width":850,"height":480,"url":"https:\/\/jazairhope.org\/wp-content\/uploads\/2022\/02\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg","type":"image\/jpeg"}],"author":"Mohamed Redha Chettibi","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Mohamed Redha Chettibi","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#article","isPartOf":{"@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/"},"author":{"name":"Mohamed Redha Chettibi","@id":"https:\/\/jazairhope.org\/fr\/#\/schema\/person\/25f89793241399d8600e452019d99b77"},"headline":"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d","datePublished":"2022-02-20T09:41:20+00:00","mainEntityOfPage":{"@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/"},"wordCount":790,"commentCount":0,"image":{"@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#primaryimage"},"thumbnailUrl":"https:\/\/jazairhope.org\/wp-content\/uploads\/2022\/02\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg","articleSection":["\u00c9conomie","Science &amp; Technologie"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/","url":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/","name":"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d - AAH.JZR","isPartOf":{"@id":"https:\/\/jazairhope.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#primaryimage"},"image":{"@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#primaryimage"},"thumbnailUrl":"https:\/\/jazairhope.org\/wp-content\/uploads\/2022\/02\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg","datePublished":"2022-02-20T09:41:20+00:00","author":{"@id":"https:\/\/jazairhope.org\/fr\/#\/schema\/person\/25f89793241399d8600e452019d99b77"},"breadcrumb":{"@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#primaryimage","url":"https:\/\/jazairhope.org\/wp-content\/uploads\/2022\/02\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg","contentUrl":"https:\/\/jazairhope.org\/wp-content\/uploads\/2022\/02\/d_9a59e0ba7a9cac2376e1a2ddd3bcab1f.jpg","width":850,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/jazairhope.org\/fr\/il-faut-une-strategie-nationale-de-cybernetique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/jazairhope.org\/fr\/"},{"@type":"ListItem","position":2,"name":"\u201cIl faut une strat\u00e9gie nationale de cybern\u00e9tique\u201d"}]},{"@type":"WebSite","@id":"https:\/\/jazairhope.org\/fr\/#website","url":"https:\/\/jazairhope.org\/fr\/","name":"AAH.JZR","description":"Environment, Health, Science, Art, Economics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jazairhope.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/jazairhope.org\/fr\/#\/schema\/person\/25f89793241399d8600e452019d99b77","name":"Mohamed Redha Chettibi","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/fbd403d607af3d36f26025d8726b5d4b27c7ea4fe21ef10d17299a6c717ed442?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fbd403d607af3d36f26025d8726b5d4b27c7ea4fe21ef10d17299a6c717ed442?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fbd403d607af3d36f26025d8726b5d4b27c7ea4fe21ef10d17299a6c717ed442?s=96&d=mm&r=g","caption":"Mohamed Redha Chettibi"},"url":"https:\/\/jazairhope.org\/fr\/author\/mrc\/"}]}},"views":322,"_links":{"self":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts\/46316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/comments?post=46316"}],"version-history":[{"count":0,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts\/46316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/media\/46317"}],"wp:attachment":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/media?parent=46316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/categories?post=46316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/tags?post=46316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}