{"version":"1.0","provider_name":"Les aventures de Jos\u00e9 ...","provider_url":"https:\/\/joselinformatique.obip.fr","author_name":"pierre","author_url":"https:\/\/joselinformatique.obip.fr\/index.php\/author\/pierre\/","title":"La m\u00e9thode Bart Simpson - Les aventures de Jos\u00e9 ...","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"sanK5JUpDp\"><a href=\"https:\/\/joselinformatique.obip.fr\/index.php\/2021\/10\/10\/la-methode-bart-simpson\/\">La m\u00e9thode Bart Simpson<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/joselinformatique.obip.fr\/index.php\/2021\/10\/10\/la-methode-bart-simpson\/embed\/#?secret=sanK5JUpDp\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La m\u00e9thode Bart Simpson\u00a0\u00bb &#8212; Les aventures de Jos\u00e9 ...\" data-secret=\"sanK5JUpDp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/joselinformatique.obip.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/joselinformatique.obip.fr\/wp-content\/uploads\/2019\/11\/pexels-photo-2122170.jpg","thumbnail_width":1880,"thumbnail_height":1253,"description":"Il est temps de passer \u00e0 la chasse aux faussaires. Certains sont plus difficiles \u00e0 d\u00e9tecter que d\u2019autres, mais il existe de nombreux moyens de rep\u00e9rer et de d\u00e9jouer les apprentis. N\u2019est pas Sandoz qui veut. Mais m\u00eame un n\u00e9ophyte a les capacit\u00e9s de p\u00e9naliser l\u2019activit\u00e9 de ces escrocs de bas niveau. Pour cela, utilisons [&hellip;]"}