{"id":3714,"date":"2021-02-28T11:54:59","date_gmt":"2021-02-28T10:54:59","guid":{"rendered":"http:\/\/entropie.org\/3615\/?p=3714"},"modified":"2021-02-28T17:15:24","modified_gmt":"2021-02-28T16:15:24","slug":"extensions-firefox-securite-et-vie-privee","status":"publish","type":"post","link":"https:\/\/entropie.org\/3615\/index.php\/2021\/02\/28\/extensions-firefox-securite-et-vie-privee\/","title":{"rendered":"Extensions Firefox (s\u00e9curit\u00e9 et vie priv\u00e9e)"},"content":{"rendered":"<p><a href=\"http:\/\/entropie.org\/3615\/wp-content\/uploads\/2021\/02\/extensions-firefox.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/entropie.org\/3615\/wp-content\/uploads\/2021\/02\/extensions-firefox.png\" alt=\"\" width=\"672\" height=\"348\" class=\"alignnone size-full wp-image-3713\" srcset=\"https:\/\/entropie.org\/3615\/wp-content\/uploads\/2021\/02\/extensions-firefox.png 672w, https:\/\/entropie.org\/3615\/wp-content\/uploads\/2021\/02\/extensions-firefox-300x155.png 300w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.eff.org\/https-everywhere\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eff.org\/https-everywhere<\/a><br \/>\n<a href=\"https:\/\/noscript.net\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/noscript.net<\/a><br \/>\n<a href=\"https:\/\/privacybadger.org\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/privacybadger.org<\/a><br \/>\n<a href=\"https:\/\/ublockorigin.com\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/ublockorigin.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.eff.org\/https-everywhere https:\/\/noscript.net https:\/\/privacybadger.org https:\/\/ublockorigin.com<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46,30],"tags":[],"class_list":["post-3714","post","type-post","status-publish","format-standard","hentry","category-securite-informatique","category-web"],"_links":{"self":[{"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/posts\/3714"}],"collection":[{"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/comments?post=3714"}],"version-history":[{"count":6,"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/posts\/3714\/revisions"}],"predecessor-version":[{"id":3722,"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/posts\/3714\/revisions\/3722"}],"wp:attachment":[{"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/media?parent=3714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/categories?post=3714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entropie.org\/3615\/index.php\/wp-json\/wp\/v2\/tags?post=3714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}