{"id":3153,"date":"2021-04-23T15:12:00","date_gmt":"2021-04-23T13:12:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=3153"},"modified":"2021-04-25T15:15:27","modified_gmt":"2021-04-25T13:15:27","slug":"signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/","title":{"rendered":"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE"},"content":{"rendered":"\n<p>Dans une d\u00e9marche rare pour contrer les menaces de piratage, l&rsquo;application de messagerie Signal a <strong><a href=\"https:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/signal-hack-cellebrite-app-vulnerability-b1835756.html\">pirat\u00e9<\/a><\/strong> le logiciel de Cellebrite et a partag\u00e9 les exploits sur son blog.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/blog.koddos.net\/hackers-party-cellebrite-ufed-now-on-ebay-for-just-100\/\">Cellebrite<\/a><\/strong> est une soci\u00e9t\u00e9 de renseignement num\u00e9rique qui produit des outils de piratage de smartphones utilis\u00e9s par les autorit\u00e9s polici\u00e8res et les soci\u00e9t\u00e9s de renseignement pour p\u00e9n\u00e9trer dans les smartphones confisqu\u00e9s. Le logiciel a r\u00e9cemment \u00e9t\u00e9 utilis\u00e9 dans une affaire de meurtre d&rsquo;enfant au Br\u00e9sil, o\u00f9 il a permis de d\u00e9couvrir l&rsquo;incidence.<\/p>\n\n\n\n<p><strong>Le hacker a \u00e9t\u00e9 pirat\u00e9<\/strong><\/p>\n\n\n\n<p>La plupart des entreprises utilisent Cellebrite pour craquer les codes des appareils. Cependant, le directeur g\u00e9n\u00e9ral de Signal, Moxie Marlinspike, a d\u00e9montr\u00e9 que m\u00eame les syst\u00e8mes de s\u00e9curit\u00e9 de l&rsquo;entreprise peuvent \u00eatre p\u00e9n\u00e9tr\u00e9s.<\/p>\n\n\n\n<p>Marlinspike a d\u00e9clar\u00e9 que le logiciel de Cellibrite peut \u00eatre manipul\u00e9 facilement lorsque quelqu&rsquo;un r\u00e9ussit \u00e0 le craquer. Cela pourrait, selon lui, modifier le r\u00e9sultat des enqu\u00eates criminelles. Pour prouver ses dires, il a charg\u00e9 et int\u00e9gr\u00e9 des fichiers sp\u00e9cifiquement format\u00e9s dans n&rsquo;importe quelle application de l&rsquo;appareil infiltr\u00e9.<\/p>\n\n\n\n<p>Il a \u00e9galement fourni des d\u00e9tails sur ce qu&rsquo;un hacker peut faire lorsqu&rsquo;il parvient \u00e0 contourner la s\u00e9curit\u00e9 de Cellebrite. \u00ab\u00a0Il n&rsquo;y a pratiquement aucune limite au code qui peut \u00eatre ex\u00e9cut\u00e9\u00a0\u00bb, a ajout\u00e9 Marlinspike.<\/p>\n\n\n\n<p>Marlinspike a not\u00e9 que si les mesures de s\u00e9curit\u00e9 sont bris\u00e9es, il est possible d&rsquo;ex\u00e9cuter un code qui modifie les rapports actuels et futurs en supprimant ou en ins\u00e9rant du texte, des fichiers, des contacts, des photos, des courriels et d&rsquo;autres donn\u00e9es, sans d\u00e9faillance de la somme de contr\u00f4le ni changement d&rsquo;horodatage d\u00e9tectable.<\/p>\n\n\n\n<p>Il ajoute que le piratage peut \u00eatre effectu\u00e9 de mani\u00e8re al\u00e9atoire et remettre en question les rapports d&rsquo;int\u00e9grit\u00e9 des donn\u00e9es de l&rsquo;entreprise.<\/p>\n\n\n\n<p><strong>Signal pourrait \u00e9galement avoir des probl\u00e8mes juridiques avec Apple<\/strong><\/p>\n\n\n\n<p>Marlinspike a \u00e9galement publi\u00e9 une courte vid\u00e9o sur Twitter, montrant \u00e0 quel point il \u00e9tait facile d&rsquo;ex\u00e9cuter l&rsquo;ensemble de l&rsquo;op\u00e9ration de piratage sur Cellebrite.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Our latest blog post explores vulnerabilities and possible Apple copyright violations in Cellebrite&#39;s software:<br><br>&quot;Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app&#39;s perspective&quot;<a href=\"https:\/\/t.co\/DKgGejPu62\">https:\/\/t.co\/DKgGejPu62<\/a> <a href=\"https:\/\/t.co\/X3ghXrgdfo\">pic.twitter.com\/X3ghXrgdfo<\/a><\/p>&mdash; Signal (@signalapp) <a href=\"https:\/\/twitter.com\/signalapp\/status\/1384906127360548869?ref_src=twsrc%5Etfw\">April 21, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Il a \u00e9galement publi\u00e9 sur son blog des informations indiquant que certains des codes de l&rsquo;entreprise sont la propri\u00e9t\u00e9 intellectuelle du g\u00e9ant Apple. Si cette r\u00e9v\u00e9lation s&rsquo;av\u00e8re vraie, elle pourrait entra\u00eener une temp\u00eate de probl\u00e8mes juridiques pour la firme intelligente.<\/p>\n\n\n\n<p>Signal ajoute qu&rsquo;il est hautement improbable qu&rsquo;Apple accorde une licence aussi importante pour la redistribution et l&rsquo;incorporation des DLL d&rsquo;Apple dans son produit.<\/p>\n\n\n\n<p><strong>Des repr\u00e9sailles ou Marlinspike s&rsquo;amuse-t-il simplement ?<\/strong><\/p>\n\n\n\n<p>Selon certains observateurs, les actions de Marlinspike montrent qu&rsquo;il souhaite vivement discr\u00e9diter l&rsquo;entreprise. Il a rendu public la r\u00e9v\u00e9lation du piratage et a signal\u00e9 d&rsquo;autres probl\u00e8mes critiques qui auraient pu \u00eatre trait\u00e9s en priv\u00e9.<\/p>\n\n\n\n<p>Certains disent que son action pourrait \u00eatre une r\u00e9ponse au billet de blog de Cellebrite en d\u00e9cembre de l&rsquo;ann\u00e9e derni\u00e8re. Dans ce billet, l&rsquo;entreprise de haute technologie expliquait comment elle avait exploit\u00e9 Signal sur un appareil Android dont l&rsquo;\u00e9cran \u00e9tait verrouill\u00e9.<\/p>\n\n\n\n<p>Cependant, certains observateurs estiment que ses actions ne sont li\u00e9es \u00e0 aucun \u00e9v\u00e9nement ant\u00e9rieur et que Marlinspike pourrait faire cela pour le plaisir.<\/p>\n\n\n\n<p>Cellebrite fabrique deux produits majeurs : l&rsquo;analyseur physique et l&rsquo;UFED. Ces produits ont \u00e9t\u00e9 utilis\u00e9s dans le pass\u00e9 par le FBI aux \u00c9tats-Unis pour <strong><a href=\"https:\/\/blog.koddos.net\/new-graykey-can-unlock-encrypted-iphones\/\">craquer les iPhones<\/a><\/strong>. Ils ont \u00e9galement \u00e9t\u00e9 utilis\u00e9s par des r\u00e9gimes autoritaires dans plusieurs r\u00e9gions du monde, en Bi\u00e9lorussie et en Russie, ainsi que par la police du Myanmar.<\/p>\n\n\n\n<p>Le Physical Analyzer analyse les fichiers pirat\u00e9s qui seront lisibles ou consultables par les utilisateurs. L&rsquo;UFED, quant \u00e0 lui, sauvegarde l&rsquo;appareil sur un ordinateur Windows.<\/p>\n\n\n\n<p>Il semble que Signal ait r\u00e9ussi \u00e0 ex\u00e9cuter du code en utilisant un \u00ab\u00a0fichier sp\u00e9cifiquement format\u00e9 mais inoffensif dans une application d\u00e9j\u00e0 analys\u00e9e par Cellebrite\u00a0\u00bb.<\/p>\n\n\n\n<p><strong>Les utilisateurs de Cellebrite sont expos\u00e9s au danger de vuln\u00e9rabilit\u00e9<\/strong><\/p>\n\n\n\n<p>Le blog r\u00e9it\u00e8re que les utilisateurs du logiciel Cellebrite risquent d&rsquo;exposer leurs syst\u00e8mes \u00e0 des acteurs malveillants s&rsquo;ils continuent \u00e0 scanner des fichiers avec le logiciel Cellebrite. Selon Marlinspike, les utilisateurs ne sont en s\u00e9curit\u00e9 que lorsqu&rsquo;ils ne scannent pas les fichiers, et ce jusqu&rsquo;\u00e0 ce que Cellebrite ait pu trouver express\u00e9ment des correctifs pour toutes les vuln\u00e9rabilit\u00e9s.<\/p>\n\n\n\n<p>Selon Marlinspike, trouver et fournir des correctifs pour toutes les vuln\u00e9rabilit\u00e9s prendra \u00e9galement du temps, ce qui ne laisse pas d&rsquo;autre choix \u00e0 l&rsquo;utilisateur que d&rsquo;\u00e9viter d&rsquo;analyser les fichiers du logiciel.<\/p>\n\n\n\n<p>Cependant, Signal se dit pr\u00eat \u00e0 divulguer toutes les vuln\u00e9rabilit\u00e9s qu&rsquo;il a trouv\u00e9es \u00e0 Cellebrite si celle-ci souhaite \u00e9galement divulguer toutes les vuln\u00e9rabilit\u00e9s de son extraction physique \u00e0 ses fournisseurs. Au moment de la r\u00e9daction de cet article, Cellebrite n&rsquo;a pas encore r\u00e9pondu \u00e0 l&rsquo;article de blog ni r\u00e9pondu \u00e0 Signal pour sa proposition de divulgation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans une d\u00e9marche rare pour contrer les menaces de piratage, l&rsquo;application de messagerie Signal a pirat\u00e9 le logiciel de Cellebrite et a partag\u00e9 les exploits sur son blog. Cellebrite est une soci\u00e9t\u00e9 de renseignement num\u00e9rique qui produit des outils de piratage de smartphones utilis\u00e9s par les autorit\u00e9s polici\u00e8res et les soci\u00e9t\u00e9s de renseignement pour p\u00e9n\u00e9trer &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":870,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-3153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Dans une d\u00e9marche rare pour contrer les menaces de piratage, l&rsquo;application de messagerie Signal a pirat\u00e9 le logiciel de Cellebrite et a partag\u00e9 les exploits sur son blog. Cellebrite est une soci\u00e9t\u00e9 de renseignement num\u00e9rique qui produit des outils de piratage de smartphones utilis\u00e9s par les autorit\u00e9s polici\u00e8res et les soci\u00e9t\u00e9s de renseignement pour p\u00e9n\u00e9trer &hellip; Continue reading SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-23T13:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-25T13:15:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE\",\"datePublished\":\"2021-04-23T13:12:00+00:00\",\"dateModified\":\"2021-04-25T13:15:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/\"},\"wordCount\":911,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/\",\"name\":\"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1\",\"datePublished\":\"2021-04-23T13:12:00+00:00\",\"dateModified\":\"2021-04-25T13:15:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1\",\"width\":880,\"height\":543},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/","og_locale":"fr_FR","og_type":"article","og_title":"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE - Blog KoDDoS","og_description":"Dans une d\u00e9marche rare pour contrer les menaces de piratage, l&rsquo;application de messagerie Signal a pirat\u00e9 le logiciel de Cellebrite et a partag\u00e9 les exploits sur son blog. Cellebrite est une soci\u00e9t\u00e9 de renseignement num\u00e9rique qui produit des outils de piratage de smartphones utilis\u00e9s par les autorit\u00e9s polici\u00e8res et les soci\u00e9t\u00e9s de renseignement pour p\u00e9n\u00e9trer &hellip; Continue reading SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE","og_url":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2021-04-23T13:12:00+00:00","article_modified_time":"2021-04-25T13:15:27+00:00","og_image":[{"width":880,"height":543,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE","datePublished":"2021-04-23T13:12:00+00:00","dateModified":"2021-04-25T13:15:27+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/"},"wordCount":911,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/","url":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/","name":"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1","datePublished":"2021-04-23T13:12:00+00:00","dateModified":"2021-04-25T13:15:27+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1","width":880,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/signal-revele-les-failles-de-securite-de-la-societe-dintelligence-numerique-cellebrite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"SIGNAL R\u00c9V\u00c8LE LES FAILLES DE S\u00c9CURIT\u00c9 DE LA SOCI\u00c9T\u00c9 D\u2019INTELLIGENCE NUM\u00c9RIQUE CELLEBRITE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/06\/hacker-1944688_1280.jpg?fit=880%2C543&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-OR","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=3153"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3153\/revisions"}],"predecessor-version":[{"id":3154,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/3153\/revisions\/3154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/870"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=3153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=3153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=3153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}