{"version":"1.0","provider_name":"Les aventures de Jos\u00e9 ...","provider_url":"https:\/\/joselinformatique.obip.fr","author_name":"pierre","author_url":"https:\/\/joselinformatique.obip.fr\/index.php\/author\/pierre\/","title":"Usurpation - Les aventures de Jos\u00e9 ...","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jUZvWWAxqe\"><a href=\"https:\/\/joselinformatique.obip.fr\/index.php\/2025\/05\/01\/usurpation\/\">Usurpation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/joselinformatique.obip.fr\/index.php\/2025\/05\/01\/usurpation\/embed\/#?secret=jUZvWWAxqe\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Usurpation\u00a0\u00bb &#8212; Les aventures de Jos\u00e9 ...\" data-secret=\"jUZvWWAxqe\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/joselinformatique.obip.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/joselinformatique.obip.fr\/wp-content\/uploads\/2020\/03\/pexels-photo-3711243.jpg","thumbnail_width":1880,"thumbnail_height":1253,"description":"Dans la m\u00e9thode Bart Simpson, je conseille de fausser les bases de donn\u00e9es des escrocs. En aucun cas, je ne conseillerai de menacer, l\u2019exp\u00e9diteur. Depuis peu, les escrocs usurpent les num\u00e9ros de t\u00e9l\u00e9phone de personnes r\u00e9elles pour faire parvenir leurs faux liens. Je vous renvoie au message de Sandoz sur X. Si vous r\u00e9pondez de [&hellip;]"}