{"id":11594,"date":"2024-05-06T10:48:12","date_gmt":"2024-05-06T10:48:12","guid":{"rendered":"https:\/\/www.e-works.fr\/blog\/?p=11594"},"modified":"2024-05-06T10:48:14","modified_gmt":"2024-05-06T10:48:14","slug":"confidentialite-anonymat-pseudonymat","status":"publish","type":"post","link":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/","title":{"rendered":"Confidentialit\u00e9, anonymat et pseudonymat sur Internet, c&rsquo;est quoi ? D\u00e9finition, enjeux et diff\u00e9rences"},"content":{"rendered":"\n<p>Selon le rapport 2024 de l&rsquo;International Data Protection and Privacy Foundation, il est mentionn\u00e9 l&rsquo;importance d&rsquo;une approche globale de la protection de la vie priv\u00e9e. Une autre \u00e9tude, cette fois dat\u00e9e de 2023, du Pew Research Center, r\u00e9v\u00e8le que 74 % des Am\u00e9ricains pensent que perdre le contr\u00f4le de leurs donn\u00e9es personnelles est un probl\u00e8me majeur. <\/p>\n\n\n\n<p>Les \u00e9tudes r\u00e9centes le prouvent, la <a href=\"https:\/\/www.e-works.fr\/blog\/teletravail-tpe-proteger-donnees-salaries\/\">protection de nos donn\u00e9es personnelles<\/a> devient une pr\u00e9occupation majeure. Entre confidentialit\u00e9, anonymat et pseudonymat, il est important de comprendre les diff\u00e9rences subtiles entre ces concepts pour naviguer en toute s\u00e9curit\u00e9 dans l&rsquo;univers num\u00e9rique. D\u00e9couvrons ensemble ces notions et leurs implications pour la protection de votre vie priv\u00e9e en ligne.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Confidentialit\u00e9 en ligne : prot\u00e9ger vos donn\u00e9es sensibles<\/h2>\n\n\n\n<p>La confidentialit\u00e9 en ligne vise \u00e0 sauvegarder vos informations personnelles lorsque vous surfez sur le web. Cela englobe vos donn\u00e9es priv\u00e9es telles que votre nom, adresse et num\u00e9ro de t\u00e9l\u00e9phone, ainsi que vos activit\u00e9s en ligne, comme les sites visit\u00e9s et les recherches effectu\u00e9es. En somme, elle garantit que vos donn\u00e9es sensibles demeurent inaccessibles aux tiers non autoris\u00e9s.<\/p>\n\n\n\n<p>Pour pr\u00e9server votre confidentialit\u00e9 en ligne, l&rsquo;usage de mots de passe robustes et la v\u00e9rification r\u00e9guli\u00e8re des param\u00e8tres de confidentialit\u00e9 de vos comptes sont essentiels. \u00c9vitez \u00e9galement de partager des informations personnelles avec des sources peu fiables. Il faut pr\u00e9ciser que la confidentialit\u00e9 n&rsquo;implique pas n\u00e9cessairement un anonymat complet, car certains d\u00e9tails peuvent \u00eatre retenus par les sites visit\u00e9s.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Anonymat sur Internet : dissimuler votre identit\u00e9<\/h2>\n\n\n\n<p>L&rsquo;anonymat en ligne consiste \u00e0 dissimuler votre identit\u00e9 r\u00e9elle lors de votre navigation sur Internet. Lorsque vous \u00eates anonyme, les sites web et les services en ligne que vous utilisez ont du mal \u00e0 retracer votre identit\u00e9. Cette protection peut \u00eatre obtenue gr\u00e2ce \u00e0 des outils tels que les r\u00e9seaux priv\u00e9s virtuels (VPN) ou une navigation sans connexion \u00e0 un compte. Cependant, en laissant votre adresse IP r\u00e9elle, vous courez le risque d&rsquo;\u00eatre identifi\u00e9.<\/p>\n\n\n\n<p>L&rsquo;anonymat offre un niveau suppl\u00e9mentaire de protection de la vie priv\u00e9e, mais son usage doit \u00eatre responsable et \u00e9thique pour \u00e9viter les abus. Il est important de noter que m\u00eame lorsque vous \u00eates anonyme, vos actions en ligne peuvent parfois \u00eatre associ\u00e9es \u00e0 votre identit\u00e9 r\u00e9elle via des donn\u00e9es de navigation ou d&rsquo;autres informations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pseudonymat : prot\u00e9ger votre identit\u00e9 durant vos interactions en ligne<\/h2>\n\n\n\n<p>Le pseudonymat constitue une alternative interm\u00e9diaire entre la confidentialit\u00e9 et l&rsquo;anonymat. En utilisant un pseudonyme en ligne, vous ne r\u00e9v\u00e9lez pas votre v\u00e9ritable identit\u00e9, mais utilisez plut\u00f4t un nom ou un surnom fictif pour vos interactions sur Internet. Cette pratique est courante sur les r\u00e9seaux sociaux, les forums en ligne et autres espaces de discussion, comme on peut le trouver sur des forums comme <a href=\"https:\/\/www.e-works.fr\/blog\/x-ex-twitter-desinformation-ue-enquete\/\">X (ex-Twitter)<\/a> ou encore Reddit.<\/p>\n\n\n\n<p>L&rsquo;avantage du pseudonymat est qu&rsquo;il vous permet de communiquer et de participer \u00e0 des communaut\u00e9s en ligne tout en pr\u00e9servant votre identit\u00e9 r\u00e9elle. Cependant, contrairement \u00e0 l&rsquo;anonymat, votre pseudonyme peut \u00eatre associ\u00e9 \u00e0 un compte sp\u00e9cifique, ce qui rend certaines informations accessibles aux administrateurs de sites ou aux autorit\u00e9s si n\u00e9cessaire.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bien comprendre les nuances entre ces 3 approches<\/h2>\n\n\n\n<p>L&rsquo;id\u00e9e est simple, la confidentialit\u00e9, l&rsquo;anonymat et le pseudonymat repr\u00e9sentent des approches distinctes pour prot\u00e9ger votre vie priv\u00e9e en ligne. La principale diff\u00e9rence entre la confidentialit\u00e9, l&rsquo;anonymat et le pseudonymat r\u00e9side dans le degr\u00e9 de divulgation de vos informations personnelles. Il faut savoir que chaque situation est unique, et vos choix en mati\u00e8re de gestion de la confidentialit\u00e9, de l&rsquo;anonymat et du pseudonymat en ligne d\u00e9pendront de vos objectifs et pr\u00e9occupations sp\u00e9cifiques, tout en gardant \u00e0 l&rsquo;esprit que chaque approche a des avantages et des inconv\u00e9nients en mati\u00e8re de protection de la vie priv\u00e9e.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selon le rapport 2024 de l&rsquo;International Data Protection and Privacy Foundation, il est mentionn\u00e9 l&rsquo;importance d&rsquo;une approche globale de la protection de la vie priv\u00e9e.<\/p>\n","protected":false},"author":1,"featured_media":11479,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"class_list":["post-11594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lexique-du-digital"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Confidentialit\u00e9, anonymat &amp; pseudonymat : d\u00e9finition et diff\u00e9rences<\/title>\n<meta name=\"description\" content=\"Les \u00e9tudes r\u00e9centes le prouvent, la protection des donn\u00e9es devient une pr\u00e9occupation majeure. D\u00e9finition, enjeux &amp; diff\u00e9rences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confidentialit\u00e9, anonymat &amp; pseudonymat : d\u00e9finition et diff\u00e9rences\" \/>\n<meta property=\"og:description\" content=\"Les \u00e9tudes r\u00e9centes le prouvent, la protection des donn\u00e9es devient une pr\u00e9occupation majeure. D\u00e9finition, enjeux &amp; diff\u00e9rences.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog E-Works\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-06T10:48:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-06T10:48:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/02\/piratage-info.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sma\u00efl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sma\u00efl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/\"},\"author\":{\"name\":\"Sma\u00efl\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#\\\/schema\\\/person\\\/1d16b2d9fb38e8d6412bc3e852ab02c6\"},\"headline\":\"Confidentialit\u00e9, anonymat et pseudonymat sur Internet, c&rsquo;est quoi ? D\u00e9finition, enjeux et diff\u00e9rences\",\"datePublished\":\"2024-05-06T10:48:12+00:00\",\"dateModified\":\"2024-05-06T10:48:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/\"},\"wordCount\":674,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/piratage-info.jpg\",\"articleSection\":[\"Lexique du digital\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/\",\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/\",\"name\":\"Confidentialit\u00e9, anonymat & pseudonymat : d\u00e9finition et diff\u00e9rences\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/piratage-info.jpg\",\"datePublished\":\"2024-05-06T10:48:12+00:00\",\"dateModified\":\"2024-05-06T10:48:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#\\\/schema\\\/person\\\/1d16b2d9fb38e8d6412bc3e852ab02c6\"},\"description\":\"Les \u00e9tudes r\u00e9centes le prouvent, la protection des donn\u00e9es devient une pr\u00e9occupation majeure. D\u00e9finition, enjeux & diff\u00e9rences.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/piratage-info.jpg\",\"contentUrl\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/piratage-info.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Protection des donn\u00e9es\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/confidentialite-anonymat-pseudonymat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lexique du digital\",\"item\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/category\\\/lexique-du-digital\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Confidentialit\u00e9, anonymat et pseudonymat sur Internet, c&rsquo;est quoi ? D\u00e9finition, enjeux et diff\u00e9rences\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/\",\"name\":\"Blog E-Works\",\"description\":\"Emploi dans le Webmarketing et le e-Commerce\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/#\\\/schema\\\/person\\\/1d16b2d9fb38e8d6412bc3e852ab02c6\",\"name\":\"Sma\u00efl\",\"sameAs\":[\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/\"],\"url\":\"https:\\\/\\\/www.e-works.fr\\\/blog\\\/author\\\/gqy4a\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confidentialit\u00e9, anonymat & pseudonymat : d\u00e9finition et diff\u00e9rences","description":"Les \u00e9tudes r\u00e9centes le prouvent, la protection des donn\u00e9es devient une pr\u00e9occupation majeure. D\u00e9finition, enjeux & diff\u00e9rences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/","og_locale":"fr_FR","og_type":"article","og_title":"Confidentialit\u00e9, anonymat & pseudonymat : d\u00e9finition et diff\u00e9rences","og_description":"Les \u00e9tudes r\u00e9centes le prouvent, la protection des donn\u00e9es devient une pr\u00e9occupation majeure. D\u00e9finition, enjeux & diff\u00e9rences.","og_url":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/","og_site_name":"Blog E-Works","article_published_time":"2024-05-06T10:48:12+00:00","article_modified_time":"2024-05-06T10:48:14+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/02\/piratage-info.jpg","type":"image\/jpeg"}],"author":"Sma\u00efl","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Sma\u00efl","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#article","isPartOf":{"@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/"},"author":{"name":"Sma\u00efl","@id":"https:\/\/www.e-works.fr\/blog\/#\/schema\/person\/1d16b2d9fb38e8d6412bc3e852ab02c6"},"headline":"Confidentialit\u00e9, anonymat et pseudonymat sur Internet, c&rsquo;est quoi ? D\u00e9finition, enjeux et diff\u00e9rences","datePublished":"2024-05-06T10:48:12+00:00","dateModified":"2024-05-06T10:48:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/"},"wordCount":674,"commentCount":0,"image":{"@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/02\/piratage-info.jpg","articleSection":["Lexique du digital"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/","url":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/","name":"Confidentialit\u00e9, anonymat & pseudonymat : d\u00e9finition et diff\u00e9rences","isPartOf":{"@id":"https:\/\/www.e-works.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#primaryimage"},"image":{"@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/02\/piratage-info.jpg","datePublished":"2024-05-06T10:48:12+00:00","dateModified":"2024-05-06T10:48:14+00:00","author":{"@id":"https:\/\/www.e-works.fr\/blog\/#\/schema\/person\/1d16b2d9fb38e8d6412bc3e852ab02c6"},"description":"Les \u00e9tudes r\u00e9centes le prouvent, la protection des donn\u00e9es devient une pr\u00e9occupation majeure. D\u00e9finition, enjeux & diff\u00e9rences.","breadcrumb":{"@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#primaryimage","url":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/02\/piratage-info.jpg","contentUrl":"https:\/\/www.e-works.fr\/blog\/wp-content\/uploads\/2024\/02\/piratage-info.jpg","width":1200,"height":800,"caption":"Protection des donn\u00e9es"},{"@type":"BreadcrumbList","@id":"https:\/\/www.e-works.fr\/blog\/confidentialite-anonymat-pseudonymat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.e-works.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Lexique du digital","item":"https:\/\/www.e-works.fr\/blog\/category\/lexique-du-digital\/"},{"@type":"ListItem","position":3,"name":"Confidentialit\u00e9, anonymat et pseudonymat sur Internet, c&rsquo;est quoi ? D\u00e9finition, enjeux et diff\u00e9rences"}]},{"@type":"WebSite","@id":"https:\/\/www.e-works.fr\/blog\/#website","url":"https:\/\/www.e-works.fr\/blog\/","name":"Blog E-Works","description":"Emploi dans le Webmarketing et le e-Commerce","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.e-works.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.e-works.fr\/blog\/#\/schema\/person\/1d16b2d9fb38e8d6412bc3e852ab02c6","name":"Sma\u00efl","sameAs":["https:\/\/www.e-works.fr\/blog\/"],"url":"https:\/\/www.e-works.fr\/blog\/author\/gqy4a\/"}]}},"_links":{"self":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts\/11594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/comments?post=11594"}],"version-history":[{"count":1,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts\/11594\/revisions"}],"predecessor-version":[{"id":11595,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/posts\/11594\/revisions\/11595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/media\/11479"}],"wp:attachment":[{"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/media?parent=11594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/categories?post=11594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.e-works.fr\/blog\/wp-json\/wp\/v2\/tags?post=11594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}