{"id":5519,"date":"2020-11-25T09:26:27","date_gmt":"2020-11-25T08:26:27","guid":{"rendered":"http:\/\/journalismes-info.ejdg.fr\/?p=5519"},"modified":"2020-12-09T09:27:10","modified_gmt":"2020-12-09T08:27:10","slug":"twitter-confie-sa-securite-numerique-a-un-ancien-hacker","status":"publish","type":"post","link":"http:\/\/journalismes-info.ejdg.fr\/index.php\/2020\/11\/25\/twitter-confie-sa-securite-numerique-a-un-ancien-hacker\/","title":{"rendered":"Twitter confie sa s\u00e9curit\u00e9 num\u00e9rique \u00e0 un ancien hacker"},"content":{"rendered":"<p>[et_pb_section bb_built=\u00a0\u00bb1&Prime;][et_pb_row][et_pb_column type=\u00a0\u00bb4_4&Prime;][et_pb_post_title _builder_version=\u00a0\u00bb3.0.75&Prime; title=\u00a0\u00bbon\u00a0\u00bb meta=\u00a0\u00bbon\u00a0\u00bb author=\u00a0\u00bbon\u00a0\u00bb date=\u00a0\u00bbon\u00a0\u00bb categories=\u00a0\u00bbon\u00a0\u00bb comments=\u00a0\u00bbon\u00a0\u00bb featured_image=\u00a0\u00bboff\u00a0\u00bb featured_placement=\u00a0\u00bbbelow\u00a0\u00bb text_color=\u00a0\u00bbdark\u00a0\u00bb text_background=\u00a0\u00bboff\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb title_font=\u00a0\u00bb||||\u00a0\u00bb title_text_color=\u00a0\u00bbrgba(0,0,0,0.91)\u00a0\u00bb \/][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\u00a0\u00bb4_4&Prime;][et_pb_text _builder_version=\u00a0\u00bb3.0.75&Prime; background_layout=\u00a0\u00bblight\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb text_font_size=\u00a0\u00bb16&Prime;]<\/p>\n<p>Plus question de se retrouver \u00e0 nouveau face \u00e0 un piratage de grande ampleur pour le r\u00e9seau social Twitter. Apr\u00e8s l\u2019attaque massive qui a touch\u00e9 les comptes de 130 personnalit\u00e9s en <strong><a href=\"https:\/\/www.france24.com\/fr\/20200718-twitter-comptes-pirates-hackers-ont-manipule-employes\">juillet dernier<\/a><\/strong>, l\u2019oiseau bleu cherche \u00e0 renforcer sa s\u00e9curit\u00e9 num\u00e9rique. Comme il l\u2019a confirm\u00e9 ce 16 novembre 2020 sur <strong><a href=\"https:\/\/twitter.com\/dotMudge\/status\/1328421797549780994\">son compte Twitter<\/a><\/strong>, c\u2019est vers Peiter Zatko dit \u00ab Mudge \u00bb que <strong><a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2020\/11\/17\/twitter-recrute-le-celebre-hackeur-mudge-comme-responsable-de-la-securite_6060107_4408996.html\">l\u2019entreprise s\u2019est tourn\u00e9e<\/a><\/strong>. Sa carri\u00e8re a commenc\u00e9 dans les ann\u00e9es 1990, au cours desquelles il a notamment travaill\u00e9 au sein du groupe de hackers \u00ab Cult of the Dead Cow \u00bb pour forcer Microsoft \u00e0 renforcer sa s\u00e9curit\u00e9. Plus r\u00e9cemment, il a supervis\u00e9 la s\u00e9curit\u00e9 du syst\u00e8me de paiement \u00e9lectronique Stripe. D\u2019apr\u00e8s l\u2019ancien chef de s\u00e9curit\u00e9 de Facebook qui a travaill\u00e9 pour Mudge, ce dernier est parfait pour une entreprise comme Twitter, qui n\u2019a pas les moyens financiers de Facebook ou Google. Il a ajout\u00e9 que Twitter aurait besoin des solutions cr\u00e9atives pour lesquelles Mudge est connu dans le domaine. Ce dernier a d\u2019ailleurs d\u00e9clar\u00e9 \u00e0 <a href=\"https:\/\/fr.reuters.com\/article\/idINL1N2I10KL\"><strong><em>Reuters<\/em> <\/strong><\/a>qu\u2019il appr\u00e9ciait l\u2019ouverture de Twitter \u00e0 ses approches non-conventionnelles. Il propose par exemple de modifier les donn\u00e9es que les \u00ab mauvais acteurs \u00bb re\u00e7oivent concernant les interactions autour de leurs posts sur Twitter.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section bb_built=\u00a0\u00bb1&Prime;][et_pb_row][et_pb_column type=\u00a0\u00bb4_4&Prime;][et_pb_post_title _builder_version=\u00a0\u00bb3.0.75&Prime; title=\u00a0\u00bbon\u00a0\u00bb meta=\u00a0\u00bbon\u00a0\u00bb author=\u00a0\u00bbon\u00a0\u00bb date=\u00a0\u00bbon\u00a0\u00bb categories=\u00a0\u00bbon\u00a0\u00bb comments=\u00a0\u00bbon\u00a0\u00bb featured_image=\u00a0\u00bboff\u00a0\u00bb featured_placement=\u00a0\u00bbbelow\u00a0\u00bb text_color=\u00a0\u00bbdark\u00a0\u00bb text_background=\u00a0\u00bboff\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb title_font=\u00a0\u00bb||||\u00a0\u00bb title_text_color=\u00a0\u00bbrgba(0,0,0,0.91)\u00a0\u00bb \/][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\u00a0\u00bb4_4&Prime;][et_pb_text _builder_version=\u00a0\u00bb3.0.75&Prime; background_layout=\u00a0\u00bblight\u00a0\u00bb border_style=\u00a0\u00bbsolid\u00a0\u00bb text_font_size=\u00a0\u00bb16&Prime;] Plus question de se retrouver \u00e0 nouveau face \u00e0 un piratage de grande ampleur pour le r\u00e9seau social Twitter. Apr\u00e8s l\u2019attaque massive qui a touch\u00e9 les comptes de 130 personnalit\u00e9s en [&hellip;]<\/p>\n","protected":false},"author":139,"featured_media":2834,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[573,964,497,116,33],"_links":{"self":[{"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/posts\/5519"}],"collection":[{"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/comments?post=5519"}],"version-history":[{"count":3,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/posts\/5519\/revisions"}],"predecessor-version":[{"id":5795,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/posts\/5519\/revisions\/5795"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/media\/2834"}],"wp:attachment":[{"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/media?parent=5519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/categories?post=5519"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/journalismes-info.ejdg.fr\/index.php\/wp-json\/wp\/v2\/tags?post=5519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}