{"id":1395,"date":"2019-11-16T06:34:17","date_gmt":"2019-11-16T05:34:17","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1395"},"modified":"2019-11-18T06:37:15","modified_gmt":"2019-11-18T05:37:15","slug":"une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/","title":{"rendered":"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE"},"content":{"rendered":"\n<p>La\nfaille d\u00e9couverte dans les gadgets Bluetooth Low Energy (BLE) signifie que les\nhackers auront plus de facilit\u00e9 \u00e0 s&rsquo;y introduire. Ces r\u00e9sultats sont tir\u00e9s\nd&rsquo;une \u00e9tude men\u00e9e par des chercheurs de l&rsquo;Ohio State University.<\/p>\n\n\n\n<p>Depuis\nson lancement en 2012, la technologie Bluetooth Low Energy (BLE) est devenue un\nchoix populaire sur plusieurs appareils. Cette technologie permet aux appareils\nde communiquer avec un niveau d&rsquo;efficacit\u00e9 plus \u00e9lev\u00e9 par rapport aux anciennes\nversions de la technologie.<\/p>\n\n\n\n<p>Les\nappareils conventionnels et quotidiens qui l&rsquo;utilisent, comme les traqueurs de\nforme physique et de sant\u00e9 portables, les syst\u00e8mes sonores intelligents et les\nthermostats intelligents se relieront d&rsquo;abord aux applications logicielles de\nl&rsquo;appareil mobile. Cela se fait via la diffusion en utilisant ce que l&rsquo;on\nappelle un identifiant unique universel.<\/p>\n\n\n\n<p>Dans\nla conception des syst\u00e8mes, l&rsquo;identificateur en question est incorpor\u00e9 dans le\ncode de l&rsquo;application mobile. Dans le cas contraire, les applications mobiles\nne pourront en aucun cas se connecter les unes aux autres. Mais il y a un autre\nc\u00f4t\u00e9 sinistre \u00e0 cette caract\u00e9ristique tr\u00e8s importante. Les m\u00eames identifiants\ndans les applications rendent \u00e9galement les appareils vuln\u00e9rables aux <strong><a href=\"https:\/\/koddos.net\/blog\/oneplus-7-fingerprint-scanner-hacked-with-one-simple-trick-anyone-could-do\/\">attaques\npar empreintes digitales<\/a><\/strong>. C&rsquo;est ce que les scientifiques de\nl&rsquo;Ohio State University ont d\u00e9couvert dans leurs recherches.<\/p>\n\n\n\n<p>Zhigiang\nLin est un professeur agr\u00e9g\u00e9 et a dirig\u00e9 le groupe de recherche. Tout cela est\nd\u00fb au fait qu&rsquo;il y a une faille fondamentale qui rend ces dispositifs\nvuln\u00e9rables aux attaques. La premi\u00e8re est quand ils sont li\u00e9s \u00e0 une application\nmobile et une autre quand les appareils sont en mode de fonctionnement. La\ngravit\u00e9 de la vuln\u00e9rabilit\u00e9 diff\u00e8re. Cependant, elle est r\u00e9currente avec les\np\u00e9riph\u00e9riques BLE et cela se remarque chaque fois qu&rsquo;il y a une communication\navec des applications mobiles.<\/p>\n\n\n\n<p>Un\nhacker peut d\u00e9terminer si vous utilisez ou non un p\u00e9riph\u00e9rique Bluetooth\nsp\u00e9cifique, tel qu&rsquo;un haut-parleur intelligent. Cela peut \u00eatre fait simplement\nen v\u00e9rifiant si votre appareil intelligent fonctionne en utilisant\nl&rsquo;identifiant provenant d&rsquo;applications mobiles particuli\u00e8res. Mais en fait,\ncela peut empirer. Dans certains cas o\u00f9 il n&rsquo;y a pas de cryptage, le hacker\npeut simplement \u00e9couter votre conversation et <strong><a href=\"https:\/\/koddos.net\/blog\/the-biggest-leak-in-ecuadors-history-over-20-million-user-records-leaked-from-a-misconfigured-database\/\">r\u00e9colter\ndes donn\u00e9es<\/a><\/strong> de cette fa\u00e7on. Cela peut \u00e9galement \u00eatre fait dans\nles cas o\u00f9 il existe un cryptage mais que l&rsquo;utilisation est d\u00e9fectueuse.<\/p>\n\n\n\n<p>Lin\na \u00e9galement expliqu\u00e9 que la bonne nouvelle est que le probl\u00e8me peut \u00eatre r\u00e9solu\nfacilement. Le groupe de chercheurs a \u00e9galement adress\u00e9 des recommandations aux\nd\u00e9veloppeurs d&rsquo;applications et aux \u00e9quipes de l&rsquo;industrie Bluetooth. Lorsque la\nfaille a \u00e9t\u00e9 remarqu\u00e9e, les chercheurs \u00e9taient impatients de savoir comment\nelle allait fonctionner dans le monde r\u00e9el. Ils ont donc construit un\nrenifleur, un <strong><a href=\"https:\/\/koddos.net\/blog\/chinese-hackers-used-nsa-hacking-tools-for-a-full-year-before-shadow-brokers-leak\/\">outil\nde piratage<\/a><\/strong> capable de localiser les gadgets Bluetooth \u00e0 l&rsquo;aide\ndes messages de diffusion envoy\u00e9s par les appareils.<\/p>\n\n\n\n<p>En\nutilisant cet outil, ils ont pu localiser pr\u00e8s de 6 000 appareils BLE dans une\nzone de moins de 5 km\u00b2. Pr\u00e8s de 95% de ces personnes ont \u00e9t\u00e9 identifi\u00e9es comme\nutilisant des attaques et plus de 7% \u00e9taient clairement vuln\u00e9rables aux hackers\net \u00e0 toutes sortes d&rsquo;entr\u00e9es non autoris\u00e9es.<\/p>\n\n\n\n<p>Les\nappareils qui \u00e9taient <strong><a href=\"https:\/\/koddos.net\/blog\/a-hacking-attack-involving-wordpress-plugins-is-targeting-vulnerable-websites\/\">vuln\u00e9rables<\/a><\/strong>\naux entr\u00e9es non autoris\u00e9es \u00e9taient li\u00e9s \u00e0 l&#8217;empreinte digitale initiale qui se\nproduit entre le gadget et l&rsquo;application mobile dont les hackers ont tir\u00e9\nparti. Les chercheurs ont mis au point un outil permettant d&rsquo;\u00e9valuer toutes les\napplications BLE du Google Play Store \u2013 il y en avait plus de 18 000 au total.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La faille d\u00e9couverte dans les gadgets Bluetooth Low Energy (BLE) signifie que les hackers auront plus de facilit\u00e9 \u00e0 s&rsquo;y introduire. Ces r\u00e9sultats sont tir\u00e9s d&rsquo;une \u00e9tude men\u00e9e par des chercheurs de l&rsquo;Ohio State University. Depuis son lancement en 2012, la technologie Bluetooth Low Energy (BLE) est devenue un choix populaire sur plusieurs appareils. Cette &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1396,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-1395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"La faille d\u00e9couverte dans les gadgets Bluetooth Low Energy (BLE) signifie que les hackers auront plus de facilit\u00e9 \u00e0 s&rsquo;y introduire. Ces r\u00e9sultats sont tir\u00e9s d&rsquo;une \u00e9tude men\u00e9e par des chercheurs de l&rsquo;Ohio State University. Depuis son lancement en 2012, la technologie Bluetooth Low Energy (BLE) est devenue un choix populaire sur plusieurs appareils. Cette &hellip; Continue reading UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-16T05:34:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-18T05:37:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE\",\"datePublished\":\"2019-11-16T05:34:17+00:00\",\"dateModified\":\"2019-11-18T05:37:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/\"},\"wordCount\":629,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/\",\"name\":\"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1\",\"datePublished\":\"2019-11-16T05:34:17+00:00\",\"dateModified\":\"2019-11-18T05:37:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1\",\"width\":800,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/","og_locale":"fr_FR","og_type":"article","og_title":"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE - Blog KoDDoS","og_description":"La faille d\u00e9couverte dans les gadgets Bluetooth Low Energy (BLE) signifie que les hackers auront plus de facilit\u00e9 \u00e0 s&rsquo;y introduire. Ces r\u00e9sultats sont tir\u00e9s d&rsquo;une \u00e9tude men\u00e9e par des chercheurs de l&rsquo;Ohio State University. Depuis son lancement en 2012, la technologie Bluetooth Low Energy (BLE) est devenue un choix populaire sur plusieurs appareils. Cette &hellip; Continue reading UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE","og_url":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-11-16T05:34:17+00:00","article_modified_time":"2019-11-18T05:37:15+00:00","og_image":[{"width":800,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE","datePublished":"2019-11-16T05:34:17+00:00","dateModified":"2019-11-18T05:37:15+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/"},"wordCount":629,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/","url":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/","name":"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1","datePublished":"2019-11-16T05:34:17+00:00","dateModified":"2019-11-18T05:37:15+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1","width":800,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/une-faille-dans-la-technologie-bluetooth-expose-les-appareils-intelligents-au-piratage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UNE FAILLE DANS LA TECHNOLOGIE BLUETOOTH EXPOSE LES APPAREILS INTELLIGENTS AU PIRATAGE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/11\/BlueBorne-Puts-Over-5-Billion-Bluetooth-Devices-at-Risk-for-Hacking.jpg?fit=800%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-mv","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1395"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1395\/revisions"}],"predecessor-version":[{"id":1397,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1395\/revisions\/1397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1396"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}