{"version":"1.0","provider_name":"Internet Society","provider_url":"https:\/\/www.internetsociety.org\/fr\/","author_name":"Mark Buell","author_url":"https:\/\/www.internetsociety.org\/fr\/author\/buell\/","title":"La recherche sur la s\u00e9curit\u00e9 est essentielle pour prot\u00e9ger l'Internet ouvert - Internet Society","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RXPbPLIIVI\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/security-research-critical-protect-open-internet\/\">La recherche sur la s\u00e9curit\u00e9 est essentielle pour prot\u00e9ger l&rsquo;Internet ouvert<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/04\/security-research-critical-protect-open-internet\/embed\/#?secret=RXPbPLIIVI\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La recherche sur la s\u00e9curit\u00e9 est essentielle pour prot\u00e9ger l&rsquo;Internet ouvert\u00a0\u00bb &#8212; Internet Society\" data-secret=\"RXPbPLIIVI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.internetsociety.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/security-research-expert-statement.jpg","thumbnail_width":1280,"thumbnail_height":515,"description":"Le 10 Avril 2018,\u00a0j&rsquo;ai rejoint plus de cinquante personnes partageant les m\u00eames id\u00e9es et signant une lettre\u00a0qui met l&rsquo;accent sur l&rsquo;importance de la recherche sur la s\u00e9curit\u00e9. La lettre renonce \u00e0 un certain nombre de proc\u00e8s r\u00e9cents, tels que\u00a0Keeper v. Goodlin et\u00a0River City Media v. Kromtech, contre les chercheurs en s\u00e9curit\u00e9 et des journalistes, et [&hellip;]"}