{"id":79811,"date":"2018-05-11T15:59:38","date_gmt":"2018-05-11T15:59:38","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/05\/minimizing-risk-how-to-be-secure-on-twitter-and-other-social-networks\/"},"modified":"2025-11-27T21:07:59","modified_gmt":"2025-11-27T21:07:59","slug":"minimizing-risk-how-to-be-secure-on-twitter-and-other-social-networks","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/05\/minimizing-risk-how-to-be-secure-on-twitter-and-other-social-networks\/","title":{"rendered":"Minimiser les risques: comment pr\u00e9server sa s\u00e9curit\u00e9 sur Twitter et d&rsquo;autres r\u00e9seaux sociaux"},"content":{"rendered":"<p>L&rsquo;information de la semaine derni\u00e8re sur le fait que les mots de passe de chaque compte de Twitter existant <a href=\"https:\/\/www.theverge.com\/2018\/5\/3\/17316684\/twitter-password-bug-security-flaw-exposed-change-now\">a \u00e9t\u00e9 expos\u00e9 en texte brut<\/a> est un rappel de la nature parfois fragile de la s\u00e9curit\u00e9 dans les lieux en ligne auxquels nous confions informations personnelles.<\/p>\n<p>Dans ce dernier exemple, Twitter indique qu&rsquo;il s&rsquo;agit d&rsquo;une erreur technique de 330 millions d&rsquo;utilisateurs. Twitter a constat\u00e9 \u00e9galement qu&rsquo;il a corrig\u00e9 le bug, en confirmant que rien ne prouve que les comptes de quelqu&rsquo;un ont \u00e9t\u00e9 viol\u00e9s ou mal utilis\u00e9s.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/05\/minimizing-risk-how-to-be-secure-on-twitter-and-other-social-networks\/\">Lire plus (en anglais)<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;information de la semaine derni\u00e8re sur le fait que les mots de passe de chaque compte de Twitter existant a \u00e9t\u00e9 expos\u00e9 en texte brut est un rappel de la nature parfois fragile de la s\u00e9curit\u00e9 dans les lieux en ligne auxquels nous confions informations personnelles. Dans ce dernier exemple, Twitter indique qu&rsquo;il s&rsquo;agit d&rsquo;une [&hellip;]<\/p>\n","protected":false},"author":1335,"featured_media":79339,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,4909],"tags":[],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4243],"class_list":["post-79811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-renforcer-internet","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach.jpg",1280,540,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach-300x127.jpg",300,127,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach-768x324.jpg",768,324,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach-1024x432.jpg",1024,432,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach.jpg",1280,540,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach.jpg",1280,540,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach-250x105.jpg",250,105,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach-600x540.jpg",600,540,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach.jpg",300,127,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach.jpg",400,169,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/05\/Verge-Twitterbreach.jpg",600,253,false]},"uagb_author_info":{"display_name":"Neville Hobson","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/hobson\/"},"uagb_comment_info":0,"uagb_excerpt":"L&rsquo;information de la semaine derni\u00e8re sur le fait que les mots de passe de chaque compte de Twitter existant a \u00e9t\u00e9 expos\u00e9 en texte brut est un rappel de la nature parfois fragile de la s\u00e9curit\u00e9 dans les lieux en ligne auxquels nous confions informations personnelles. Dans ce dernier exemple, Twitter indique qu&rsquo;il s&rsquo;agit d&rsquo;une\u2026","authors":[{"term_id":4243,"user_id":1335,"is_guest":0,"slug":"hobson","display_name":"Neville Hobson","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/1c3b21e9432c39819215d5b26796827399db93da4a7749268d94f9ef1964f74e?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/79811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1335"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=79811"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/79811\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/79339"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=79811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=79811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=79811"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=79811"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=79811"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=79811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}