{"id":94415,"date":"2023-12-15T22:52:14","date_gmt":"2023-12-15T21:52:14","guid":{"rendered":"https:\/\/jazairhope.org\/?p=94415"},"modified":"2023-12-15T22:52:14","modified_gmt":"2023-12-15T21:52:14","slug":"la-technologie-linformatique-et-la-securite-militaire","status":"publish","type":"post","link":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/","title":{"rendered":"La technologie, l&#8217;informatique et la s\u00e9curit\u00e9 militaire"},"content":{"rendered":"<p>Cette partie se contente seulement de mettre en relief, l&#8217;importance pour une nation, de sortir du r\u00e9seau informatique \u00e9tabli par des pays qui souhaitent tout contr\u00f4ler.<\/p>\n<p>Je donne quelques lignes sans trop d\u00e9velopper.<\/p>\n<p>Je pense que des pays ont d\u00e9j\u00e0 mis cela en place.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"western\"><i><b>*Les r\u00e9seaux, l&#8217;Internet\u00a0: ces moyens existants sont-ils fig\u00e9s\u00a0?<\/b><\/i><\/p>\n<p class=\"western\">Pour ma part, ce sera non\u00a0!<\/p>\n<p class=\"western\">Sauf pour ceux qui ne pensent et ne voient qu&#8217;\u00e0 travers les syst\u00e8mes actuels mis en place par ce que l&#8217;on qualifie de pays occidentaux\u00a0; ces derniers \u00e9tant per\u00e7us comme ceux qui les auraient majoritairement imagin\u00e9s.<\/p>\n<p class=\"western\">L\u00e0 aussi, je ne souhaite pas clarifier davantage ce sujet\u00a0; afin que, ce que je souhaite voir se d\u00e9velopper, ne soit pas avort\u00e9 par des pr\u00e9tendus penseur et expert qui seraient pr\u00e9sents dans les institutions concern\u00e9es par le monde de l&#8217;informatique et des r\u00e9seaux.<\/p>\n<p class=\"western\">Je souhaite tout de m\u00eame \u00e9mettre une piste possible.<\/p>\n<p class=\"western\">On peut obtenir <b>une forme d&#8217;isolement<\/b> dans ce qui s&#8217;appelle les r\u00e9seaux. Je citerai des intranets ou des \u00ab\u00a0internets miniatures\u00a0\u00bb <u>en dehors de l&#8217;actuel Internet<\/u>.<\/p>\n<p class=\"western\">Cette possibilit\u00e9 r\u00e9duira de mani\u00e8re cons\u00e9quente ce qui est qualifi\u00e9 de <b>cyberattaque\u00a0<\/b>: terme et domaine tr\u00e8s \u00e0 la mode\u00a0; et surtout tr\u00e8s rentable pour ceux qui d\u00e9noncent la s\u00e9curit\u00e9 informatique\u00a0; tout en conservant un certain flou. Les conf\u00e9rences sur ce \u00ab\u00a0fl\u00e9au num\u00e9rique\u00a0\u00bb sont \u00e0 la mode et maintiennent le n\u00e9ophyte ou le cr\u00e9dule \u00e0 leur merci.<\/p>\n<p class=\"western\">En effet\u00a0! En l\u2019\u00e9tat actuel des choses\u00a0; cela concerne tous les domaines des institutions, des entreprises et de la soci\u00e9t\u00e9 civile.<\/p>\n<p class=\"western\">De m\u00eame, si quelqu&#8217;un charg\u00e9 de ce domaine au sein du gouvernement est int\u00e9ress\u00e9 par ce que je viens de sugg\u00e9rer, il sait quoi faire\u00a0?<\/p>\n<p>&nbsp;<\/p>\n<p class=\"western\"><i><b>*L\u2019arm\u00e9e alg\u00e9rienne et ses missions<\/b><\/i><\/p>\n<p class=\"western\">L&#8217;arm\u00e9e alg\u00e9rienne doit non seulement \u00eatre soutenue par son peuple, tant qu\u2019elle d\u00e9fend les valeurs du pays, mais aussi, et surtout, toujours en pointe au niveau mat\u00e9riel.<\/p>\n<p class=\"western\"><b>Investir dans son arm\u00e9e<\/b> est une tr\u00e8s bonne chose dans le contexte mondial qui nous entoure.<\/p>\n<p class=\"western\">Tous les pays qui en ont les moyens investissent au niveau armement\u00a0! Le comble\u00a0? C\u2019est que ce sont surtout, et en particulier, ceux qui poss\u00e8dent des armes nucl\u00e9aires. Pourquoi\u00a0?<\/p>\n<p class=\"western\">Alors qu\u2019ils avaient \u00ab\u00a0rassur\u00e9\u00a0\u00bb les autres nations\u00a0; pr\u00e9textant qu\u2019ils avaient ce qu\u2019il fallait pour qu\u2019on les laisse tranquilles\u00a0; ils se trouvent que ce sont eux qui sont les principaux responsables non seulement \u00e0 la course \u00e0 l\u2019armement\u00a0; mais aussi, et surtout, aux agressions des autres \u00e9tats d\u00e9pourvus d&#8217;arsenal nucl\u00e9aire.<\/p>\n<p class=\"western\">Je me fais alors les r\u00e9flexions suivantes, sur la continuit\u00e9, de ces pays nucl\u00e9aris\u00e9s, de vouloir encore investir dans les armes traditionnelles et m\u00eames chimique et bact\u00e9riologique\u00a0:<\/p>\n<p class=\"western\">\u00ab\u00a0<i>Soit ils doutent de la capacit\u00e9 de ces fameuses armes nucl\u00e9aire de destructions massive qui avaient montr\u00e9 un certain potentiel sur Nagasaki et Hiroshima\u00a0; soit elles ne sont pas aussi si mena\u00e7antes que \u00e7a\u00a0?<\/i>\u00a0\u00bb<\/p>\n<p class=\"western\">Une remarque concernant la r\u00e9elle capacit\u00e9 de destruction des armes nucl\u00e9aire\u00a0; il a \u00e9t\u00e9 avanc\u00e9, qu&#8217;en fait, Nagasaki et Hiroshima \u00e9taient des villes dont les structures \u00e9taient en bois et en papier\u00a0; quel aurait \u00e9t\u00e9 le r\u00e9sultat sur des structures en b\u00e9ton et acier\u00a0? A part l&#8217;effet de souffle et des radiations par la suite, qui ne doivent pas \u00eatre n\u00e9gligeables, qu&#8217;en est-il r\u00e9ellement\u00a0?<\/p>\n<p class=\"western\">En tous cas, cette envie d\u2019avoir plus d\u2019armement est inqui\u00e9tant\u00a0; et en particulier de ces \u00e9tats nucl\u00e9aris\u00e9\u00a0; et fait se poser des questions sur ce qui est vraiment \u00ab\u00a0une suffisante capacit\u00e9 militaire d\u2019un pays.\u00a0\u00bb<\/p>\n<p class=\"western\">Il est \u00e9trange que ces pays s&#8217;arrangent pour emp\u00eacher les autres \u00e9tats d&#8217;en faire autant\u00a0; et en particulier au niveau nucl\u00e9aire.<\/p>\n<p class=\"western\">En tous cas, les \u00e9v\u00e9nements qui se d\u00e9roulent prouvent qu\u2019il ne faut pas se reposer uniquement sur un alli\u00e9 puissant\u00a0; mais aussi, et surtout, \u00eatre soi-m\u00eame une puissance militaire\u00a0; qu\u2019importe l\u2019avis des autres.<\/p>\n<p class=\"western\">Du coup, pour ma part, l\u2019\u00e9tat alg\u00e9rien doit s\u2019armer du mieux qu\u2019il peut\u00a0; et aussi former et entretenir son peuple \u00e0 se d\u00e9fendre afin de prot\u00e9ger son pays. Sans fanatisme. Juste au cas o\u00f9 des \u00e9tats belliqueux, et aux aguets de la moindre faiblesse de l&#8217;Alg\u00e9rie, seraient dans l\u2019optique de tenter un nouveau 1830.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cette partie se contente seulement de mettre en relief, l&#8217;importance pour une nation, de sortir du r\u00e9seau informatique \u00e9tabli par des pays&hellip;<\/p>\n","protected":false},"author":1,"featured_media":94641,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[39,50],"tags":[],"class_list":["post-94415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-en-vedette","category-science-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La technologie, l&#039;informatique et la s\u00e9curit\u00e9 militaire - AAH.JZR<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La technologie, l&#039;informatique et la s\u00e9curit\u00e9 militaire - AAH.JZR\" \/>\n<meta property=\"og:description\" content=\"Cette partie se contente seulement de mettre en relief, l&#8217;importance pour une nation, de sortir du r\u00e9seau informatique \u00e9tabli par des pays&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/\" \/>\n<meta property=\"og:site_name\" content=\"AAH.JZR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jazairhope\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T21:52:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jazairhope.org\/wp-content\/uploads\/2023\/12\/jh-64.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"276\" \/>\n\t<meta property=\"og:image:height\" content=\"183\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ssuperadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ssuperadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/\"},\"author\":{\"name\":\"Ssuperadmin\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#\\\/schema\\\/person\\\/43650ebd889d8960700b5456ed9264c4\"},\"headline\":\"La technologie, l&#8217;informatique et la s\u00e9curit\u00e9 militaire\",\"datePublished\":\"2023-12-15T21:52:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/\"},\"wordCount\":777,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/jh-64.jpg\",\"articleSection\":[\"Articles en vedette\",\"Science &amp; Technologie\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/\",\"url\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/\",\"name\":\"La technologie, l'informatique et la s\u00e9curit\u00e9 militaire - AAH.JZR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/jh-64.jpg\",\"datePublished\":\"2023-12-15T21:52:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#\\\/schema\\\/person\\\/43650ebd889d8960700b5456ed9264c4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/jh-64.jpg\",\"contentUrl\":\"https:\\\/\\\/jazairhope.org\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/jh-64.jpg\",\"width\":276,\"height\":183},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/la-technologie-linformatique-et-la-securite-militaire\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La technologie, l&#8217;informatique et la s\u00e9curit\u00e9 militaire\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/\",\"name\":\"AAH.JZR\",\"description\":\"Environment, Health, Science, Art, Economics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/#\\\/schema\\\/person\\\/43650ebd889d8960700b5456ed9264c4\",\"name\":\"Ssuperadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4068e88b9c557952c81ca0efc4e11e19a2ed480173b8cef95a240894b16bf22?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4068e88b9c557952c81ca0efc4e11e19a2ed480173b8cef95a240894b16bf22?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4068e88b9c557952c81ca0efc4e11e19a2ed480173b8cef95a240894b16bf22?s=96&d=mm&r=g\",\"caption\":\"Ssuperadmin\"},\"sameAs\":[\"https:\\\/\\\/jazairhope.org\"],\"url\":\"https:\\\/\\\/jazairhope.org\\\/fr\\\/author\\\/superadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La technologie, l'informatique et la s\u00e9curit\u00e9 militaire - AAH.JZR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/","og_locale":"fr_FR","og_type":"article","og_title":"La technologie, l'informatique et la s\u00e9curit\u00e9 militaire - AAH.JZR","og_description":"Cette partie se contente seulement de mettre en relief, l&#8217;importance pour une nation, de sortir du r\u00e9seau informatique \u00e9tabli par des pays&hellip;","og_url":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/","og_site_name":"AAH.JZR","article_publisher":"https:\/\/www.facebook.com\/jazairhope","article_published_time":"2023-12-15T21:52:14+00:00","og_image":[{"width":276,"height":183,"url":"https:\/\/jazairhope.org\/wp-content\/uploads\/2023\/12\/jh-64.jpg","type":"image\/jpeg"}],"author":"Ssuperadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Ssuperadmin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#article","isPartOf":{"@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/"},"author":{"name":"Ssuperadmin","@id":"https:\/\/jazairhope.org\/fr\/#\/schema\/person\/43650ebd889d8960700b5456ed9264c4"},"headline":"La technologie, l&#8217;informatique et la s\u00e9curit\u00e9 militaire","datePublished":"2023-12-15T21:52:14+00:00","mainEntityOfPage":{"@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/"},"wordCount":777,"commentCount":3,"image":{"@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#primaryimage"},"thumbnailUrl":"https:\/\/jazairhope.org\/wp-content\/uploads\/2023\/12\/jh-64.jpg","articleSection":["Articles en vedette","Science &amp; Technologie"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/","url":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/","name":"La technologie, l'informatique et la s\u00e9curit\u00e9 militaire - AAH.JZR","isPartOf":{"@id":"https:\/\/jazairhope.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#primaryimage"},"image":{"@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#primaryimage"},"thumbnailUrl":"https:\/\/jazairhope.org\/wp-content\/uploads\/2023\/12\/jh-64.jpg","datePublished":"2023-12-15T21:52:14+00:00","author":{"@id":"https:\/\/jazairhope.org\/fr\/#\/schema\/person\/43650ebd889d8960700b5456ed9264c4"},"breadcrumb":{"@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#primaryimage","url":"https:\/\/jazairhope.org\/wp-content\/uploads\/2023\/12\/jh-64.jpg","contentUrl":"https:\/\/jazairhope.org\/wp-content\/uploads\/2023\/12\/jh-64.jpg","width":276,"height":183},{"@type":"BreadcrumbList","@id":"https:\/\/jazairhope.org\/fr\/la-technologie-linformatique-et-la-securite-militaire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/jazairhope.org\/fr\/"},{"@type":"ListItem","position":2,"name":"La technologie, l&#8217;informatique et la s\u00e9curit\u00e9 militaire"}]},{"@type":"WebSite","@id":"https:\/\/jazairhope.org\/fr\/#website","url":"https:\/\/jazairhope.org\/fr\/","name":"AAH.JZR","description":"Environment, Health, Science, Art, Economics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jazairhope.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/jazairhope.org\/fr\/#\/schema\/person\/43650ebd889d8960700b5456ed9264c4","name":"Ssuperadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b4068e88b9c557952c81ca0efc4e11e19a2ed480173b8cef95a240894b16bf22?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b4068e88b9c557952c81ca0efc4e11e19a2ed480173b8cef95a240894b16bf22?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4068e88b9c557952c81ca0efc4e11e19a2ed480173b8cef95a240894b16bf22?s=96&d=mm&r=g","caption":"Ssuperadmin"},"sameAs":["https:\/\/jazairhope.org"],"url":"https:\/\/jazairhope.org\/fr\/author\/superadmin\/"}]}},"views":411,"_links":{"self":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts\/94415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/comments?post=94415"}],"version-history":[{"count":1,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts\/94415\/revisions"}],"predecessor-version":[{"id":94416,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/posts\/94415\/revisions\/94416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/media\/94641"}],"wp:attachment":[{"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/media?parent=94415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/categories?post=94415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jazairhope.org\/fr\/wp-json\/wp\/v2\/tags?post=94415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}