{"id":13367,"date":"2014-04-08T22:02:03","date_gmt":"2014-04-08T20:02:03","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=13367"},"modified":"2024-06-04T17:24:48","modified_gmt":"2024-06-04T15:24:48","slug":"quand-la-nsa-renforce-lespionnage-sur-facebook","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/","title":{"rendered":"Quand la NSA renforce l&rsquo;espionnage sur Facebook"},"content":{"rendered":"\n<p>Glenn Greenwald, journaliste politique, avocat et blogueur, a travaill\u00e9 avec Edward Snowden sur les r\u00e9v\u00e9lations concernant le programme de surveillance de l&rsquo;Agence am\u00e9ricaine de s\u00e9curit\u00e9 nationale (NSA). C&rsquo;est lui qui a publi\u00e9 <a href=\"http:\/\/www.theguardian.com\/profile\/glenn-greenwald\">dans le journal britannique The Guardian<\/a> les informations recueillies \u00e0 partir des documents de Snowden. Sur son site Internet The Intercept, Greenwald donne une liste des techniques utilis\u00e9es par la NSA pour surveiller les utilisateurs et se livrer \u00e0 l&rsquo;espionnage sur Facebook.<\/p>\n\n\n\n<p>Lors de la s\u00e9rie de conf\u00e9rences du festival South by Southwest (SXSW) donn\u00e9e \u00e0 Austin (Texas, USA) en 2014, Snowden a plaid\u00e9 pour une utilisation du chiffrement (un service <a href=\"https:\/\/mailfence.com\/\">offert gratuitement par certains services de messagerie s\u00e9curis\u00e9e<\/a>) par tous les internautes, afin de se prot\u00e9ger des agences de renseignement. Cependant, Snowden a expliqu\u00e9 que la NSA pouvait cibler un utilisateur particulier, et dans ce cas \u00ab\u00a0infiltrer son ordinateur\u00a0\u00bb.<\/p>\n\n\n\n<p>La NSA est consciente du risque qu&rsquo;elle court avec ces tentatives de protection ; c&rsquo;est pourquoi elle a consacr\u00e9 des fonds importants (l&rsquo;argent des contribuables) pour tenter de mettre sur \u00e9coute \u00e0 grande \u00e9chelle des millions d&rsquo;ordinateurs avec des logiciels malveillants. L&rsquo;ampleur de cette mise sur \u00e9coute est telle, qu&rsquo;elle pourrait \u00e9ventuellement permettre \u00e0 la NSA de \u00ab\u00a0s&rsquo;approprier le net\u00a0\u00bb, <a href=\"http:\/\/www.zerohedge.com\/news\/2014-03-12\/most-evil-and-disturbing-nsa-spy-practices-date-have-just-been-revealed\">selon Zero Hedge<\/a>. \u00ab\u00a0Les techniques de surveillance de la NSA pourraient involontairement mettre en danger la s\u00e9curit\u00e9 d&rsquo;Internet\u00a0\u00bb a averti Mikko Hypponen, un expert en logiciels malveillants.<\/p>\n\n\n\n<p>L&rsquo;Agence a \u00e9largi ses capacit\u00e9s d&rsquo;espionnage sur Facebook en automatisant ses syst\u00e8mes et en r\u00e9duisant la surveillance humaine. Dans certains cas, la NSA a utilis\u00e9 un faux serveur sur le r\u00e9seau social pour le d\u00e9tourner afin de l&rsquo;utiliser comme une \u00ab\u00a0rampe de lancement\u00a0\u00bb lui permettant de mettre sur \u00e9coute les ordinateurs cibl\u00e9s et d&rsquo;extraire des informations de leur mat\u00e9riel. Elle a \u00e9galement envoy\u00e9 des spams avec des \u00ab\u00a0implants de logiciels malveillants\u00a0\u00bb capables de pirater un ordinateur de plusieurs fa\u00e7ons. Ces implants ont \u00e9t\u00e9 d\u00e9velopp\u00e9s dans un programme automatis\u00e9 appel\u00e9 Turbine, qui permet l&rsquo;implantation de logiciels malveillants \u00e0 grande \u00e9chelle. En 2004, nous ne parlions que de 100 \u00e0 150 implants, mais leur nombre a r\u00e9cemment atteint des dizaines de milliers. Les rapports de Snowden indiquent qu&rsquo;entre 85 000 et 100 000 implants avaient d\u00e9j\u00e0 \u00e9t\u00e9 envoy\u00e9s sur des ordinateurs et dans des r\u00e9seaux sociaux \u00e0 travers le monde en 2014. Quelque 67,6 millions de dollars ont \u00e9t\u00e9 investis dans le d\u00e9veloppement du programme Turbine afin de lui permettre de s&rsquo;\u00e9tendre \u00e0 \u00ab\u00a0une grande vari\u00e9t\u00e9 de r\u00e9seaux\u00a0\u00bb.<\/p>\n\n\n\n<p>L&rsquo;implant au nom de code Unitedrake\u00a0\u00bb peut \u00eatre utilis\u00e9 avec une vari\u00e9t\u00e9 de plugins, des modules d&rsquo;extensions logicielles qui permettent un contr\u00f4le total de l&rsquo;ordinateur infect\u00e9. \u00ab\u00a0Captivatedaudience\u00a0\u00bb enregistre les conversations \u00e0 partir du microphone de l&rsquo;ordinateur. \u00ab\u00a0Gumfish\u00a0\u00bb prend des photos \u00e0 partir de la webcam. \u00ab\u00a0Foggybottom\u00a0\u00bb enregistre tout l&rsquo;historique de la navigation et recueille des informations sur les connexions et les mots de passe. \u00ab\u00a0Grok\u00a0\u00bb est utilis\u00e9 pour enregistrer les frappes et toutes les activit\u00e9s de l&rsquo;utilisateur. \u00ab\u00a0Salvagerabbit\u00a0\u00bb vole des donn\u00e9es gr\u00e2ce \u00e0 des disques amovibles connect\u00e9s \u00e0 l&rsquo;ordinateur infect\u00e9.<\/p>\n\n\n\n<p>En outre, ces implants pourraient \u00e9galement permettre \u00e0 la NSA de contourner les outils de chiffrement utilis\u00e9s pour surfer anonymement sur le web et de chiffrer le contenu des emails. L&rsquo;Agence dispose de cette facult\u00e9 parce que son malware lui donne un acc\u00e8s illimit\u00e9 \u00e0 l&rsquo;ordinateur cibl\u00e9 tant que l&rsquo;utilisateur ne prot\u00e8ge pas ses communications en les chiffrant. \u00ab\u00a0Quantumsky\u00a0\u00bb, un malware d\u00e9velopp\u00e9 en 2004, permet de bloquer l&rsquo;acc\u00e8s de l&rsquo;ordinateur \u00e0 certains sites web et \u00ab\u00a0Quantumcopper\u00a0\u00bb test\u00e9 en 2008, est utilis\u00e9 pour corrompre les fichiers t\u00e9l\u00e9charg\u00e9s de la cible.<\/p>\n\n\n\n<p>Ces techniques d&rsquo;espionnage sur Facebook et d&rsquo;autres r\u00e9seaux sociaux n&rsquo;ont pas \u00e9t\u00e9 utilis\u00e9es uniquement pour traquer des suspects dans des affaires de terrorisme. Des logiciels malveillants ont \u00e9galement \u00e9t\u00e9 utilis\u00e9s contre les administrateurs de syst\u00e8mes de fournisseurs de services t\u00e9l\u00e9phoniques et Internet afin d&rsquo;acc\u00e9der aux communications secr\u00e8tes de l&rsquo;entreprise ou de les espionner. Selon <a href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/03\/12\/thousands-implants\/\">un document top secret de 2012<\/a>, pour d\u00e9ployer ces implants, la NSA a envoy\u00e9 des milliers de spams invitant les utilisateurs \u00e0 cliquer sur des liens qui activent le logiciel malveillant. Une fois activ\u00e9, l&rsquo;ordinateur est infect\u00e9 dans les 8 secondes qui suivent. La <a href=\"https:\/\/blog.mailfence.com\/fr\/modele-mailfence-menaces\/\">technique d&rsquo;attaque de \u00ab\u00a0l&rsquo;homme du milieu\u00a0\u00bb <\/a>redirige le navigateur Internet de l&rsquo;utilisateur vers les serveurs de la NSA qui tentent de mettre l&rsquo;ordinateur sous \u00e9coute. La tactique de \u00ab\u00a0<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Karsten_Nohl#Attaque_sur_Electronic_Cash_Protocoles\">l&rsquo;attaque de canal lat\u00e9ral<\/a>\u00ab\u00a0, dont le nom de code est \u00ab\u00a0Quantumhand\u00a0\u00bb, permet \u00e0 la NSA de se d\u00e9guiser en faux serveur Facebook et de transf\u00e9rer des donn\u00e9es malveillantes lorsque la cible tente de se connecter au r\u00e9seau social. En utilisant ce logiciel malveillant qui ressemble \u00e0 une page Facebook ordinaire, la NSA peut pirater l&rsquo;ordinateur de l&rsquo;utilisateur, acc\u00e9der aux donn\u00e9es stock\u00e9es sur le mat\u00e9riel, et modifier la communication. Tout cela a consid\u00e9rablement renforc\u00e9 l&rsquo;espionnage sur Facebook par le biais de tactiques aussi sophistiqu\u00e9es.<\/p>\n\n\n\n<p>Les pare-feu et autres mesures de s\u00e9curit\u00e9 conventionnelles ne semblent pas d\u00e9ranger la NSA. En fait, les pirates de l&rsquo;agence semblent convaincus de pouvoir contourner toutes les protections et d&rsquo;infecter n&rsquo;importe quel ordinateur ou r\u00e9seau. \u00ab\u00a0Si nous pouvons nous d\u00e9brouiller pour que l&rsquo;ordinateur cibl\u00e9 nous rende visite dans une sorte de navigateur Web, nous pouvons probablement le contr\u00f4ler\u00a0\u00bb, a d\u00e9clar\u00e9 l&rsquo;un des pirates de l&rsquo;agence cit\u00e9 dans l&rsquo;un des documents secrets.<\/p>\n\n\n\n<p>La NSA a ni\u00e9 avoir utilis\u00e9 les r\u00e9seaux sociaux pour <a href=\"http:\/\/thenextweb.com\/insider\/2014\/03\/13\/nsa-denies-reports-impersonating-facebook-infect-pcs-malware\/?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A%20TheNextWeb%20%28The%20Next%20Web%20All%20Stories%29#!Agmcd\">infecter plusieurs milliers d&rsquo;ordinateurs<\/a> avec des logiciels malveillants. Selon l&rsquo;Agence, ses capacit\u00e9s techniques sont utilis\u00e9es pour des op\u00e9rations appropri\u00e9es et l\u00e9gitimes portant sur le renseignement \u00e9tranger.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glenn Greenwald, journaliste politique, avocat et blogueur, a travaill\u00e9 avec Edward Snowden sur les r\u00e9v\u00e9lations concernant le programme de surveillance de l&rsquo;Agence am\u00e9ricaine de s\u00e9curit\u00e9 nationale (NSA). C&rsquo;est lui qui a publi\u00e9 dans le journal britannique The Guardian les informations recueillies \u00e0 partir des documents de Snowden. Sur son site Internet The Intercept, Greenwald donne [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":85970,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"link","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":["post-13367","post","type-post","status-publish","format-link","has-post-thumbnail","hentry","category-securite","post_format-post-format-link"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NSA et espionnage sur Facebook. Le blog de Mailfence, l&#039;email s\u00e9curis\u00e9<\/title>\n<meta name=\"description\" content=\"Quand la NSA se livre \u00e0 l&#039;espionnage sur Facebook : d\u00e9couvrez les techniques d\u00e9ploy\u00e9es pour vous surveiller sur les r\u00e9seaux sociaux.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quand la NSA renforce l&#039;espionnage sur Facebook | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Quand la NSA renforce l&#039;espionnage sur Facebook | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-08T20:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-04T15:24:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick De Schutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pdeschutter\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick De Schutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/\"},\"author\":{\"name\":\"Patrick De Schutter\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\"},\"headline\":\"Quand la NSA renforce l&rsquo;espionnage sur Facebook\",\"datePublished\":\"2014-04-08T20:02:03+00:00\",\"dateModified\":\"2024-06-04T15:24:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/\"},\"wordCount\":1002,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/\",\"name\":\"NSA et espionnage sur Facebook. Le blog de Mailfence, l'email s\u00e9curis\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"datePublished\":\"2014-04-08T20:02:03+00:00\",\"dateModified\":\"2024-06-04T15:24:48+00:00\",\"description\":\"Quand la NSA se livre \u00e0 l'espionnage sur Facebook : d\u00e9couvrez les techniques d\u00e9ploy\u00e9es pour vous surveiller sur les r\u00e9seaux sociaux.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/NSA_bugs_FB_spying1.png\",\"width\":600,\"height\":600,\"caption\":\"facebook app icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/quand-la-nsa-renforce-lespionnage-sur-facebook\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/category\\\/securite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quand la NSA renforce l&#8217;espionnage sur Facebook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/20a0c25f4ff87b6c5510971559c01c28\",\"name\":\"Patrick De Schutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g\",\"caption\":\"Patrick De Schutter\"},\"description\":\"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/pdeschutter\\\/\",\"https:\\\/\\\/x.com\\\/pdeschutter\"],\"gender\":\"male\",\"knowsLanguage\":[\"English\",\"French\",\"Dutch\",\"Swedish\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/author\\\/patrick\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NSA et espionnage sur Facebook. Le blog de Mailfence, l'email s\u00e9curis\u00e9","description":"Quand la NSA se livre \u00e0 l'espionnage sur Facebook : d\u00e9couvrez les techniques d\u00e9ploy\u00e9es pour vous surveiller sur les r\u00e9seaux sociaux.","robots":{"index":"noindex","follow":"follow"},"og_locale":"fr_FR","og_type":"article","og_title":"Quand la NSA renforce l'espionnage sur Facebook | Mailfence Blog","og_description":"Quand la NSA renforce l'espionnage sur Facebook | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2014-04-08T20:02:03+00:00","article_modified_time":"2024-06-04T15:24:48+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","type":"image\/png"}],"author":"Patrick De Schutter","twitter_card":"summary_large_image","twitter_creator":"@pdeschutter","twitter_site":"@mailfence","twitter_misc":{"\u00c9crit par":"Patrick De Schutter","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/"},"author":{"name":"Patrick De Schutter","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28"},"headline":"Quand la NSA renforce l&rsquo;espionnage sur Facebook","datePublished":"2014-04-08T20:02:03+00:00","dateModified":"2024-06-04T15:24:48+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/"},"wordCount":1002,"publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/","url":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/","name":"NSA et espionnage sur Facebook. Le blog de Mailfence, l'email s\u00e9curis\u00e9","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","datePublished":"2014-04-08T20:02:03+00:00","dateModified":"2024-06-04T15:24:48+00:00","description":"Quand la NSA se livre \u00e0 l'espionnage sur Facebook : d\u00e9couvrez les techniques d\u00e9ploy\u00e9es pour vous surveiller sur les r\u00e9seaux sociaux.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2014\/04\/NSA_bugs_FB_spying1.png","width":600,"height":600,"caption":"facebook app icon"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/fr\/quand-la-nsa-renforce-lespionnage-sur-facebook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/blog.mailfence.com\/fr\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Quand la NSA renforce l&#8217;espionnage sur Facebook"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/fr\/#website","url":"https:\/\/blog.mailfence.com\/fr\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/fr\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/20a0c25f4ff87b6c5510971559c01c28","name":"Patrick De Schutter","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/504fce782c4af8c40497b54807c4ba30bf391c917fdf953ac6392cb55dfb078e?s=96&d=blank&r=g","caption":"Patrick De Schutter"},"description":"Patrick is the co-founder of Mailfence. He's a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Allmansland, IP Netvertising or Express.be. He is a strong believer and advocate of encryption and privacy.","sameAs":["https:\/\/www.linkedin.com\/in\/pdeschutter\/","https:\/\/x.com\/pdeschutter"],"gender":"male","knowsLanguage":["English","French","Dutch","Swedish"],"url":"https:\/\/blog.mailfence.com\/fr\/author\/patrick\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/13367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/comments?post=13367"}],"version-history":[{"count":6,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/13367\/revisions"}],"predecessor-version":[{"id":21677,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/13367\/revisions\/21677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media\/85970"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media?parent=13367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/categories?post=13367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/tags?post=13367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}