{"id":7360,"date":"2025-01-08T09:38:53","date_gmt":"2025-01-08T08:38:53","guid":{"rendered":"https:\/\/gstf.org\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/"},"modified":"2025-01-08T09:39:18","modified_gmt":"2025-01-08T08:39:18","slug":"cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine","status":"publish","type":"post","link":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/","title":{"rendered":"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine"},"content":{"rendered":"<section class=\"indy-block-section has-white-background-color\">\n      <div class=\"indy-block-section-content\">\n\n<p>Deux rapports traitent des cyber-attaques et de l&rsquo;espionnage de la diaspora tib\u00e9taine qui ont lieu depuis au moins 20 ans.<\/p>\n\n\n\n<p><strong>Institut d&rsquo;action pour le Tibet<\/strong><\/p>\n\n\n\n<p>Le rapport du Tibet Action Institute analyse l&rsquo;histoire et la m\u00e9thodologie technique de ces attaques via des ordinateurs, des logiciels malveillants, mais aussi plus r\u00e9cemment via la t\u00e9l\u00e9phonie mobile, et pr\u00e9sente des cas individuels de personnes touch\u00e9es au fil des ann\u00e9es. Il est frappant de constater que des vagues d&rsquo;attaques ont \u00e9t\u00e9 lanc\u00e9es \u00e0 chaque fois autour de dates et d&rsquo;heures \u00ab\u00a0sensibles\u00a0\u00bb, comme par exemple avant et pendant les Jeux olympiques d&rsquo;\u00e9t\u00e9 de P\u00e9kin en 2008, pendant le pic des auto-immolations entre 2011 et 2014, et pendant le lockdown au plus fort de la pand\u00e9mie. <\/p>\n\n\n\n<p>Certaines des attaques cibl\u00e9es sur des individus ont r\u00e9v\u00e9l\u00e9 une connaissance d\u00e9taill\u00e9e de ces derniers. Il semblerait que des recherches pr\u00e9alables sur les personnes concern\u00e9es aient \u00e9t\u00e9 effectu\u00e9es dans les m\u00e9dias sociaux ou les rapports des m\u00e9dias publics, ce qui a \u00e9galement permis aux destinataires de savoir que les exp\u00e9diteurs s&rsquo;\u00e9taient donn\u00e9 beaucoup de mal pour les espionner. <\/p>\n\n\n\n<p>En 2007, la directrice de campagne de Students for a Free Tibet (SFT) de l&rsquo;\u00e9poque a re\u00e7u plusieurs messages via Skype \u00e0 son nom de code, lui demandant o\u00f9 elle se trouvait et quelles \u00e9taient ses activit\u00e9s. Les messages \u00e9taient r\u00e9dig\u00e9s d&rsquo;une mani\u00e8re qui laissait penser que les exp\u00e9diteurs \u00e9taient d\u00e9j\u00e0 connus d&rsquo;elle et qu&rsquo;ils connaissaient m\u00eame la personne derri\u00e8re son nom de code. <\/p>\n\n\n\n<p>Pendant la s\u00e9rie d&rsquo;immolations, la directrice de l&rsquo;Institut d&rsquo;action pour le Tibet de l&rsquo;\u00e9poque a re\u00e7u des demandes d\u00e9taill\u00e9es, envoy\u00e9es sous l&rsquo;adresse d&rsquo;un journaliste connu, soi-disant pour r\u00e9diger un article et une pr\u00e9sentation de congr\u00e8s sur les immolations. Les fichiers joints contenant des documents \u00e0 examiner \u00e9taient infect\u00e9s. <\/p>\n\n\n\n<p>Pendant la pand\u00e9mie, des messages ont \u00e9t\u00e9 diffus\u00e9s qui contenaient soi-disant, dans des documents joints, des conseils issus de la strat\u00e9gie de confinement chinoise ou des conseils adress\u00e9s \u00e0 l&rsquo;h\u00f4pital Delek de l&rsquo;exil tib\u00e9tain \u00e0 Dharamsala.<\/p>\n\n\n\n<p>Des attaques massives ont \u00e9galement \u00e9t\u00e9 lanc\u00e9es contre des serveurs et des sites web d&rsquo;ONG et d&rsquo;organisations en exil, bloquant les serveurs, contenant des fichiers infect\u00e9s ou m\u00eame des liens, ces derniers \u00e9tant cens\u00e9s nettoyer les syst\u00e8mes informatiques infect\u00e9s par des virus.<\/p>\n\n\n\n<p><strong>\u00c9quipe d&rsquo;intervention d&rsquo;urgence informatique du Tibet<\/strong><\/p>\n\n\n\n<p>En raison de ces attaques, l&rsquo;\u00e9quipe d&rsquo;urgence informatique du Tibet (TibCERT) a \u00e9t\u00e9 cr\u00e9\u00e9e en 2018. Dans leur rapport, les auteurs ont recens\u00e9 et r\u00e9pertori\u00e9 un total de 63 attaques signal\u00e9es, en commen\u00e7ant par les attaques contre la diaspora tib\u00e9taine \u00e0 Dharamsala depuis 2009. Les courriels infect\u00e9s \u00e9taient envoy\u00e9s sous un nom d&rsquo;exp\u00e9diteur sugg\u00e9rant que le courriel avait \u00e9t\u00e9 envoy\u00e9, par exemple, du bureau priv\u00e9 du Dala\u00ef Lama. Plus tard, les serveurs ont \u00e9t\u00e9 infect\u00e9s par GhostNet, un logiciel malveillant qui a infect\u00e9 des installations informatiques dans le monde entier et dont l&rsquo;origine a pu \u00eatre retrac\u00e9e en Chine.   <\/p>\n\n\n\n<p>Le plus souvent, les op\u00e9rations d&rsquo;espionnage ont vis\u00e9 des ONG tib\u00e9taines, des militants tib\u00e9tains individuels ou le gouvernement tib\u00e9tain en exil. Les attaques pr\u00e9sentaient un certain nombre de caract\u00e9ristiques communes : l&rsquo;indication de l&rsquo;exp\u00e9diteur simulait un nom connu des destinataires, et le contenu et l&rsquo;objet faisaient r\u00e9f\u00e9rence \u00e0 un sujet pertinent pour les destinataires, un rapport r\u00e9cemment publi\u00e9 ou un \u00e9v\u00e9nement d&rsquo;actualit\u00e9. <\/p>\n\n\n\n<p><em>Rapport Tibet Action Institute : <\/em><a href=\"https:\/\/blog.tibcert.org\/posts\/cyber-espionage-against-tibetans-an-analysis-of-over-two-decades-of-publicly-available-data\/\"><em>Cyberespionnage contre les Tib\u00e9tains<\/em><\/a> \/\/ <em>Rapport TibCERT <\/em>: <a href=\"https:\/\/digital-disruption.tibcert.org\"><em>Disruption num\u00e9rique<\/em><\/a> \/\/ Dr. Uwe Meya<\/p>\n\n\n\n<p>Photo : TibCERT<\/p>\n\n<\/div>\n  <\/section>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":7358,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[99],"tags":[],"class_list":["post-7360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generalites"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine - GSTF<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine - GSTF\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/\" \/>\n<meta property=\"og:site_name\" content=\"GSTF\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-08T08:38:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T08:39:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gstf.org\/wp-content\/uploads\/2025\/01\/Cyberattacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"322\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"GS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"GS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/\"},\"author\":{\"name\":\"GS\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/33bf26005cf77590c905b4c1c3ba65a4\"},\"headline\":\"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine\",\"datePublished\":\"2025-01-08T08:38:53+00:00\",\"dateModified\":\"2025-01-08T08:39:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/\"},\"wordCount\":652,\"image\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Cyberattacks.png\",\"articleSection\":[\"G\u00e9n\u00e9ralit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/\",\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/\",\"name\":\"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine - GSTF\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Cyberattacks.png\",\"datePublished\":\"2025-01-08T08:38:53+00:00\",\"dateModified\":\"2025-01-08T08:39:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/33bf26005cf77590c905b4c1c3ba65a4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Cyberattacks.png\",\"contentUrl\":\"https:\\\/\\\/gstf.org\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Cyberattacks.png\",\"width\":624,\"height\":322},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/gstf.org\\\/fr\\\/page-daccueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/\",\"name\":\"GSTF\",\"description\":\"Gesellschaft Schweizerisch-Tibetische Freundschaft\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gstf.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gstf.org\\\/fr\\\/#\\\/schema\\\/person\\\/33bf26005cf77590c905b4c1c3ba65a4\",\"name\":\"GS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8546b49f3c694d3705079c42c736bcafa5061cb5c69b427c6dec74f97077f191?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8546b49f3c694d3705079c42c736bcafa5061cb5c69b427c6dec74f97077f191?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8546b49f3c694d3705079c42c736bcafa5061cb5c69b427c6dec74f97077f191?s=96&d=mm&r=g\",\"caption\":\"GS\"},\"url\":\"https:\\\/\\\/gstf.org\\\/fr\\\/author\\\/bettina-eckert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine - GSTF","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine - GSTF","og_url":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/","og_site_name":"GSTF","article_published_time":"2025-01-08T08:38:53+00:00","article_modified_time":"2025-01-08T08:39:18+00:00","og_image":[{"width":624,"height":322,"url":"https:\/\/gstf.org\/wp-content\/uploads\/2025\/01\/Cyberattacks.png","type":"image\/png"}],"author":"GS","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"GS","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#article","isPartOf":{"@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/"},"author":{"name":"GS","@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/33bf26005cf77590c905b4c1c3ba65a4"},"headline":"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine","datePublished":"2025-01-08T08:38:53+00:00","dateModified":"2025-01-08T08:39:18+00:00","mainEntityOfPage":{"@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/"},"wordCount":652,"image":{"@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#primaryimage"},"thumbnailUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2025\/01\/Cyberattacks.png","articleSection":["G\u00e9n\u00e9ralit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/","url":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/","name":"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine - GSTF","isPartOf":{"@id":"https:\/\/gstf.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#primaryimage"},"image":{"@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#primaryimage"},"thumbnailUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2025\/01\/Cyberattacks.png","datePublished":"2025-01-08T08:38:53+00:00","dateModified":"2025-01-08T08:39:18+00:00","author":{"@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/33bf26005cf77590c905b4c1c3ba65a4"},"breadcrumb":{"@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#primaryimage","url":"https:\/\/gstf.org\/wp-content\/uploads\/2025\/01\/Cyberattacks.png","contentUrl":"https:\/\/gstf.org\/wp-content\/uploads\/2025\/01\/Cyberattacks.png","width":624,"height":322},{"@type":"BreadcrumbList","@id":"https:\/\/gstf.org\/fr\/cyberattaques-et-cyberespionnage-contre-la-diaspora-tibetaine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/gstf.org\/fr\/page-daccueil\/"},{"@type":"ListItem","position":2,"name":"Cyberattaques et cyberespionnage contre la diaspora tib\u00e9taine"}]},{"@type":"WebSite","@id":"https:\/\/gstf.org\/fr\/#website","url":"https:\/\/gstf.org\/fr\/","name":"GSTF","description":"Gesellschaft Schweizerisch-Tibetische Freundschaft","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gstf.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/gstf.org\/fr\/#\/schema\/person\/33bf26005cf77590c905b4c1c3ba65a4","name":"GS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8546b49f3c694d3705079c42c736bcafa5061cb5c69b427c6dec74f97077f191?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8546b49f3c694d3705079c42c736bcafa5061cb5c69b427c6dec74f97077f191?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8546b49f3c694d3705079c42c736bcafa5061cb5c69b427c6dec74f97077f191?s=96&d=mm&r=g","caption":"GS"},"url":"https:\/\/gstf.org\/fr\/author\/bettina-eckert\/"}]}},"_links":{"self":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/7360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/comments?post=7360"}],"version-history":[{"count":1,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/7360\/revisions"}],"predecessor-version":[{"id":7361,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/posts\/7360\/revisions\/7361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/media\/7358"}],"wp:attachment":[{"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/media?parent=7360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/categories?post=7360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gstf.org\/fr\/wp-json\/wp\/v2\/tags?post=7360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}