{"id":6777,"date":"2024-05-08T09:40:46","date_gmt":"2024-05-08T07:40:46","guid":{"rendered":"https:\/\/gstf.site-preview.ch\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/"},"modified":"2024-11-27T14:13:24","modified_gmt":"2024-11-27T13:13:24","slug":"spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil","status":"publish","type":"post","link":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/","title":{"rendered":"\u00ab\u00a0Spyware-as-a-Service\u00a0\u00bb : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil"},"content":{"rendered":"\n<p>Un rapport de l&rsquo;organisation Turquoise Roof r\u00e9v\u00e8le des attaques syst\u00e9matiques commandit\u00e9es par des agences gouvernementales chinoises contre des dirigeants tib\u00e9tains en exil.<\/p>\n\n<p>Ce rapport a \u00e9t\u00e9 rendu possible par une importante fuite de donn\u00e9es au sein de l&rsquo;entreprise priv\u00e9e de cybers\u00e9curit\u00e9 chinoise I-Soon, qui compte parmi ses clients la police chinoise, le minist\u00e8re de la S\u00e9curit\u00e9 publique et l&rsquo;arm\u00e9e. Selon cette soci\u00e9t\u00e9, les t\u00e9l\u00e9phones portables des repr\u00e9sentants du gouvernement tib\u00e9tain en exil (Central Tibetan Administration, CTA) ont \u00e9t\u00e9 syst\u00e9matiquement espionn\u00e9s depuis 2018 et de grandes quantit\u00e9s de donn\u00e9es ont \u00e9t\u00e9 t\u00e9l\u00e9charg\u00e9es. L&rsquo;espionnage des r\u00e9seaux sociaux des personnes concern\u00e9es a fait l&rsquo;objet d&rsquo;un int\u00e9r\u00eat particulier. Un deuxi\u00e8me rapport de l&rsquo;organisation Citizen Lab montre que certaines personnes de la CTA ont re\u00e7u des liens infect\u00e9s dans des messages WhatsApp qui semblaient provenir de collaborateurs d&rsquo;ONG ou de journalistes. Un document interne d&rsquo;I-Soon montre comment l&rsquo;intelligence artificielle a \u00e9t\u00e9 utilis\u00e9e pour analyser \u00e9galement de grandes quantit\u00e9s de donn\u00e9es provenant des comptes de messagerie pirat\u00e9s des personnes concern\u00e9es.    <\/p>\n\n<p>Selon les experts, cette fuite de donn\u00e9es n&rsquo;est que la \u00ab\u00a0partie \u00e9merg\u00e9e de l&rsquo;iceberg\u00a0\u00bb, mais elle donne un aper\u00e7u sans pr\u00e9c\u00e9dent de l&rsquo;ampleur et des techniques de pointe utilis\u00e9es pour l&rsquo;espionnage par intelligence artificielle. La CTA n&rsquo;est pas la seule \u00e0 \u00eatre touch\u00e9e, des organisations ou\u00efgoures en exil et le mouvement d\u00e9mocratique de Hong Kong sont \u00e9galement concern\u00e9s. <\/p>\n\n<p>L&rsquo;ambassade de Chine \u00e0 Washington, interrog\u00e9e sur ces activit\u00e9s, a d\u00e9clar\u00e9 que le gouvernement avait \u00ab\u00a0toujours fermement rejet\u00e9 la cybercriminalit\u00e9 et pris des mesures s\u00e9v\u00e8res\u00a0\u00bb. Selon elle, les rapports sont une \u00ab\u00a0inversion compl\u00e8te du noir et du blanc\u00a0\u00bb. <\/p>\n\n<p><a href=\"https:\/\/turquoiseroof.org\/spyware-as-a-service-what-the-i-soon-files-reveal-about-chinas-targeting-of-the-tibetan-diaspora\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Rapport Turquoise Roof<\/em><\/a><em>, 18 avril 2024<\/em> \/ <a href=\"https:\/\/citizenlab.ca\/2019\/09\/poison-carp-tibetan-groups-targeted-with-1-click-mobile-exploits\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Rapport du Citizen Lab<\/em><\/a><em>, 24 novembre 2019<\/em> \/\/ Dr. Uwe Meya<\/p>\n\n<h2 class=\"wp-block-heading\">Encore plus d&rsquo;espionnage : les applications analysent les frappes au clavier<\/h2>\n\n<p>Un autre rapport de Citizen Lab a examin\u00e9 les applications de 8 fournisseurs chinois (Baidu, Honor, Huawei, iFlytek, OPPO, Samsung, Tencent, Vivo, et Xiaomi) qui permettent aux utilisateurs de t\u00e9l\u00e9phones portables de taper rapidement des caract\u00e8res chinois dans les messages. Ces applications sont tr\u00e8s populaires et largement utilis\u00e9es sur les t\u00e9l\u00e9phones portables en Chine. Certains appareils Android vendus en Chine ont \u00e9galement de telles applications pr\u00e9install\u00e9es.  <\/p>\n\n<p>\u00c0 une exception pr\u00e8s, l&rsquo;application de Huawei, les touches n&rsquo;\u00e9taient pas crypt\u00e9es. Par cons\u00e9quent, les touches ont pu \u00eatre collect\u00e9es et analys\u00e9es par des tiers sans aucune intervention. On peut donc soup\u00e7onner que les t\u00e9l\u00e9phones mobiles \u00e9taient disponibles pour l&rsquo;espionnage de masse des messages.  <\/p>\n\n<p>Apr\u00e8s que Citizen Lab a contact\u00e9 les fournisseurs \u00e0 ce sujet, tous, \u00e0 l&rsquo;exception de Baidu, ont corrig\u00e9 cette vuln\u00e9rabilit\u00e9. Le rapport indique toutefois que des mises \u00e0 jour des applications sont n\u00e9cessaires pour corriger la vuln\u00e9rabilit\u00e9. <\/p>\n\n<p><a href=\"https:\/\/citizenlab.ca\/2024\/04\/vulnerabilities-across-keyboard-apps-reveal-keystrokes-to-network-eavesdroppers\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Rapport du Citizen Lab<\/em><\/a><em>, 23 avril 2024<\/em> \/\/ Dr. Uwe Meya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un rapport de l&rsquo;organisation Turquoise Roof r\u00e9v\u00e8le des attaques syst\u00e9matiques commandit\u00e9es par des agences gouvernementales chinoises contre des dirigeants tib\u00e9tains en exil. Ce rapport a \u00e9t\u00e9 rendu possible par une importante fuite de donn\u00e9es au sein de l&rsquo;entreprise priv\u00e9e de cybers\u00e9curit\u00e9 chinoise I-Soon, qui compte parmi ses clients la police chinoise, le minist\u00e8re de la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[99,96],"tags":[],"class_list":["post-6777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generalites","category-international-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Spyware-as-a-Service&quot; : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil - GSTF<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Spyware-as-a-Service&quot; : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil - GSTF\" \/>\n<meta property=\"og:description\" content=\"Un rapport de l&rsquo;organisation Turquoise Roof r\u00e9v\u00e8le des attaques syst\u00e9matiques commandit\u00e9es par des agences gouvernementales chinoises contre des dirigeants tib\u00e9tains en exil. Ce rapport a \u00e9t\u00e9 rendu possible par une importante fuite de donn\u00e9es au sein de l&rsquo;entreprise priv\u00e9e de cybers\u00e9curit\u00e9 chinoise I-Soon, qui compte parmi ses clients la police chinoise, le minist\u00e8re de la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/\" \/>\n<meta property=\"og:site_name\" content=\"GSTF\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-08T07:40:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-27T13:13:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Spionage_App.png\" \/>\n\t<meta property=\"og:image:width\" content=\"420\" \/>\n\t<meta property=\"og:image:height\" content=\"262\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/67c7ae2b7567a05fa720632cf1a11bd6\"},\"headline\":\"\u00ab\u00a0Spyware-as-a-Service\u00a0\u00bb : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil\",\"datePublished\":\"2024-05-08T07:40:46+00:00\",\"dateModified\":\"2024-11-27T13:13:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/\"},\"wordCount\":534,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Spionage_App.png\",\"articleSection\":[\"G\u00e9n\u00e9ralit\u00e9s\",\"International\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/\",\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/\",\"name\":\"\\\"Spyware-as-a-Service\\\" : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil - GSTF\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Spionage_App.png\",\"datePublished\":\"2024-05-08T07:40:46+00:00\",\"dateModified\":\"2024-11-27T13:13:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/67c7ae2b7567a05fa720632cf1a11bd6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Spionage_App.png\",\"contentUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Spionage_App.png\",\"width\":420,\"height\":262},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/gstf.org\\\/fr\\\/page-daccueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8222;Spyware-as-a-Service&#8220; : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/\",\"name\":\"GSTF\",\"description\":\"Gesellschaft Schweizerisch-Tibetische Freundschaft\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gstf.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/67c7ae2b7567a05fa720632cf1a11bd6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/gstf.org\"],\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Spyware-as-a-Service\" : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil - GSTF","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/","og_locale":"fr_FR","og_type":"article","og_title":"\"Spyware-as-a-Service\" : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil - GSTF","og_description":"Un rapport de l&rsquo;organisation Turquoise Roof r\u00e9v\u00e8le des attaques syst\u00e9matiques commandit\u00e9es par des agences gouvernementales chinoises contre des dirigeants tib\u00e9tains en exil. Ce rapport a \u00e9t\u00e9 rendu possible par une importante fuite de donn\u00e9es au sein de l&rsquo;entreprise priv\u00e9e de cybers\u00e9curit\u00e9 chinoise I-Soon, qui compte parmi ses clients la police chinoise, le minist\u00e8re de la [&hellip;]","og_url":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/","og_site_name":"GSTF","article_published_time":"2024-05-08T07:40:46+00:00","article_modified_time":"2024-11-27T13:13:24+00:00","og_image":[{"width":420,"height":262,"url":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Spionage_App.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#article","isPartOf":{"@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/"},"author":{"name":"admin","@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/67c7ae2b7567a05fa720632cf1a11bd6"},"headline":"\u00ab\u00a0Spyware-as-a-Service\u00a0\u00bb : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil","datePublished":"2024-05-08T07:40:46+00:00","dateModified":"2024-11-27T13:13:24+00:00","mainEntityOfPage":{"@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/"},"wordCount":534,"commentCount":0,"image":{"@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#primaryimage"},"thumbnailUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Spionage_App.png","articleSection":["G\u00e9n\u00e9ralit\u00e9s","International"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/","url":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/","name":"\"Spyware-as-a-Service\" : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil - GSTF","isPartOf":{"@id":"https:\/\/gstf.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#primaryimage"},"image":{"@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#primaryimage"},"thumbnailUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Spionage_App.png","datePublished":"2024-05-08T07:40:46+00:00","dateModified":"2024-11-27T13:13:24+00:00","author":{"@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/67c7ae2b7567a05fa720632cf1a11bd6"},"breadcrumb":{"@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#primaryimage","url":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Spionage_App.png","contentUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2024\/10\/Spionage_App.png","width":420,"height":262},{"@type":"BreadcrumbList","@id":"https:\/\/gstf.org\/fr\/spyware-as-a-service-des-pirates-informatiques-attaquent-des-representants-tibetains-en-exil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/gstf.org\/fr\/page-daccueil\/"},{"@type":"ListItem","position":2,"name":"&#8222;Spyware-as-a-Service&#8220; : des pirates informatiques attaquent des repr\u00e9sentants tib\u00e9tains en exil"}]},{"@type":"WebSite","@id":"https:\/\/gstf.org\/fr\/#website","url":"https:\/\/gstf.org\/fr\/","name":"GSTF","description":"Gesellschaft Schweizerisch-Tibetische Freundschaft","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gstf.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/67c7ae2b7567a05fa720632cf1a11bd6","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d3f2fcb093e9c2d13668a154a0a0f6cd486b88af630485da5e7873949764c3a?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/gstf.org"],"url":"https:\/\/gstf.org\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/6777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/comments?post=6777"}],"version-history":[{"count":1,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/6777\/revisions"}],"predecessor-version":[{"id":6779,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/6777\/revisions\/6779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/media\/6778"}],"wp:attachment":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/media?parent=6777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/categories?post=6777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/tags?post=6777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}