{"id":132321,"date":"2021-02-01T00:00:49","date_gmt":"2021-02-01T00:00:49","guid":{"rendered":"https:\/\/www.internetsociety.org\/?post_type=news&#038;p=132321"},"modified":"2025-11-14T15:19:47","modified_gmt":"2025-11-14T15:19:47","slug":"la-securite-talon-dachille-de-la-5g","status":"publish","type":"news","link":"https:\/\/www.internetsociety.org\/fr\/news\/dans-les-nouvelles\/2021\/la-securite-talon-dachille-de-la-5g\/","title":{"rendered":"La s\u00e9curit\u00e9, talon d&rsquo;Achille de la 5G ?"},"content":{"rendered":"\n<p><span style=\"color:#24366e\" class=\"tadv-color\">La s\u00e9curit\u00e9, talon d&rsquo;Achille de la 5G ?<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/www.journaldunet.com\/solutions\/dsi\/1497263-la-securite-talon-d-achille-de-la-5g\/\">Journal du Net<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9, talon d&rsquo;Achille de la 5G ? Journal du Net<\/p>\n","protected":false},"author":1551,"featured_media":0,"template":"","categories":[178,170,156,4909,4775,183],"tags":[6247,2795],"region_news_regions":[6029],"content_category":[],"class_list":["post-132321","news","type-news","status-publish","hentry","category-securite","category-confidentialite","category-iot-fr","category-renforcer-internet","category-securite-fr","category-technologie","tag-internet-des-objets-ido","tag-ota-fr","region_news_regions-mondial","news_type-dans-les-nouvelles"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"M\u00f4nica Fast","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/fast\/"},"uagb_comment_info":0,"uagb_excerpt":"La s\u00e9curit\u00e9, talon d&rsquo;Achille de la 5G ? Journal du Net","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/news\/132321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1551"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=132321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=132321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=132321"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=132321"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=132321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}