{"id":2127,"date":"2015-01-30T21:38:29","date_gmt":"2015-01-30T20:38:29","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=2127"},"modified":"2015-01-30T21:38:29","modified_gmt":"2015-01-30T20:38:29","slug":"quest-ce-quun-exploit-dans-le-milieu-du-hack","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/","title":{"rendered":"Qu&#8217;est-ce qu&#8217;un &#8220;exploit&#8221; dans le milieu du hack&#8239;?"},"content":{"rendered":"<h4 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Docteur, c'est quoi exploit&#8239;?<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\">D'apr\u00e8s ma d\u00e9finition du lexique PSP&nbsp;:<\/p>\n<p style=\"text-align: justify;\"><div align=\"justify\" class=\"signoff\"><i class=\"fa fa-fw fa-eye\"><\/i><strong>Exploit<\/strong>&nbsp;: vous verrez les d\u00e9veloppeurs devenir fous lorsqu'ils entendront que quelqu'un a trouv\u00e9 un <strong>exploit<\/strong>. Un <strong>exploit<\/strong> est une faille trouv\u00e9e dans un<em> firmware<\/em>, permettant d'y lancer du code. Un des plus grands <strong>exploits<\/strong> par exemple, a \u00e9t\u00e9 la trouvaille d'une faille dans un vieux jeu PSP, <em>GripShift<\/em>, qui montra une vuln\u00e9rabilit\u00e9 des PSP 3000.<\/div>\n<p style=\"text-align: justify;\">En gros, un <strong>exploit<\/strong> peut se pr\u00e9senter sous la forme d'un mini-programme (les <strong>exploits<\/strong> d\u00e9couverts sur PSP et PS Vita sur le jeu <em>Patapon 2<\/em>, par exemple) ou bien d'une image pi\u00e9g\u00e9e (le <em>ChickHEN<\/em>, par exemple), ayant pour but d'exploiter une faille d\u00e9couverte soit dans un programme (un jeu, une application) soit directement dans le syst\u00e8me d'exploitation de la machine.<\/p>\n<p style=\"text-align: justify;\"><div align=\"center\" class=\"alert alert-danger \">Le mot <strong>exploit<\/strong> peut avoir une connotation p\u00e9jorative et d\u00e9signer des programmes\/images pi\u00e9g\u00e9es hostiles. Mais sur<strong> Custom Protocol<\/strong>, soyez certains que nous ne parlons jamais de ces cas-l\u00e0&nbsp;: nous ne traitons que de l'hack \"gentil\".&nbsp;\ud83d\ude00 <\/div>\n<figure id=\"attachment_2128\" aria-describedby=\"caption-attachment-2128\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2128\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack-300x150.jpg\" alt=\"Quels sont les 2 types d'exploi t et leur diff\u00e9rence&#8239;?\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack-300x150.jpg 300w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack-370x184.jpg 370w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack-270x135.jpg 270w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack-570x284.jpg 570w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-2128\" class=\"wp-caption-text\">Quels sont les 2 types d'<strong>exploit<\/strong> et leur diff\u00e9rence&#8239;?<\/figcaption><\/figure>\n<h4 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Et c'est quoi un exploit usermode&#8239;?<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\">Un <strong>exploit usermode<\/strong> d\u00e9signe un <strong>exploit<\/strong> qui n'a pas un acc\u00e8s total \u00e0 la machine. Par exemple, l'<strong>exploit<\/strong> <em>Patapon 2<\/em> est typique d'un <strong>exploit usermode<\/strong>&nbsp;: il est possible gr\u00e2ce \u00e0 lui de lancer les <em>homebrews<\/em>, mais il n'est pas possible d'ex\u00e9cuter des copies de jeux <em>ISO<\/em>\/<em>CSO<\/em>, des <em>plugins<\/em>, etc.<\/p>\n<figure id=\"attachment_1970\" aria-describedby=\"caption-attachment-1970\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/underground\/tuto-installer-le-vhbl-en-3-36-patapon-2\/\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1970 size-medium\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-300x170.png\" alt=\"L'exploit Patapon 2 sur les PS Vita en 3.36\" width=\"300\" height=\"170\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-300x170.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-768x435.png 768w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-370x210.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-270x153.png 270w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-570x323.png 570w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-740x419.png 740w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2.png 960w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/vhbl_patapon2-300x170@2x.png 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-1970\" class=\"wp-caption-text\"><a title=\"TUTO&nbsp;-&nbsp;Installer le VHBL en 3.36 (Patapon 2)\" href=\"https:\/\/www.customprotocol.com\/underground\/tuto-installer-le-vhbl-en-3-36-patapon-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">L'<strong>exploit<\/strong> Patapon 2 sur les PS Vita en 3.36<\/a><\/figcaption><\/figure>\n<h4 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Mais c'est quoi un exploit kernel alors&#8239;?<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\">Un <strong>exploit kernel <\/strong>d\u00e9signe un <strong>exploit<\/strong> ayant un acc\u00e8s total sur la console. Les <em>eCFW <\/em>par exemple se basent sur un <strong>exploit kernel<\/strong>, puisqu'ils ont un acc\u00e8s complet de la PS Vita et \"empruntent\" l'\u00e9mulateur PSP int\u00e9gr\u00e9 \u00e0 la console, pour pouvoir ainsi lancer des <em>homebrews<\/em>, des <em>back-ups<\/em> (<em>ISO<\/em>\/<em>CSO<\/em>), des jeux <em>PS One<\/em>, des <em>plugins<\/em>...<\/p>\n<figure id=\"attachment_2115\" aria-describedby=\"caption-attachment-2115\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2115\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit-300x153.png\" alt=\"Les eCFW se basent sur un exploit kernel\" width=\"300\" height=\"153\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit-300x153.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit-370x188.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit-585x300.png 585w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit-270x137.png 270w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit-570x290.png 570w, https:\/\/www.customprotocol.com\/medias\/2015\/01\/ps_vita_2000_XMB_kernel_exploit.png 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-2115\" class=\"wp-caption-text\">Les <em>eCFW<\/em> se basent sur un <strong>exploit kernel<\/strong><\/figcaption><\/figure>\n<p style=\"text-align: justify;\">J'esp\u00e8re que ce petit article explicatif vous aura servi, si vous ne compreniez pas la signification de ce terme souvent utilis\u00e9 dans mes articles et tutoriels. A bient\u00f4t&#8239;!&nbsp;\ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On entend souvent parler de \"exploit\", mais \u00e7a veut dire quoi au juste&#8239;? Et quelle est la diff\u00e9rence entre un exploit \"usermode\" et \"kernel\"&#8239;?<\/p>\n","protected":false},"author":481,"featured_media":2128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71,22,630,30],"tags":[1184,1185],"plateformes":[854,855],"genres":[872,873,1162],"developpeurs":[],"editeurs":[],"types":[859,874,867],"sources":[],"class_list":["post-2127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-outils","category-tutos","category-tutos-underground","category-underground","tag-kernel","tag-usermode","plateformes-ps-vita","plateformes-psp","genres-exploits","genres-exploits-kernel","genres-exploits-usermode","types-hack-vita","types-hack-psp","types-tutos"],"yoast_head":"\n<title>Qu&#039;est-ce qu&#039;un &quot;exploit&quot; dans le milieu du hack ? - Custom Protocol<\/title>\n<meta name=\"description\" content=\"On entend souvent parler de &quot;exploit&quot;, mais \u00e7a veut dire quoi au juste ? Et quelle est la diff\u00e9rence entre un exploit &quot;usermode&quot; et &quot;kernel&quot; ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce qu&#039;un &quot;exploit&quot; dans le milieu du hack ? - Custom Protocol\" \/>\n<meta property=\"og:description\" content=\"On entend souvent parler de &quot;exploit&quot;, mais \u00e7a veut dire quoi au juste ? Et quelle est la diff\u00e9rence entre un exploit &quot;usermode&quot; et &quot;kernel&quot; ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-30T20:38:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wirus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HackerGen\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wirus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\",\"url\":\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\",\"name\":\"Qu'est-ce qu'un \\\"exploit\\\" dans le milieu du hack ? - Custom Protocol\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2015-01-30T20:38:29+00:00\",\"dateModified\":\"2015-01-30T20:38:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\"},\"description\":\"On entend souvent parler de \\\"exploit\\\", mais \u00e7a veut dire quoi au juste ? Et quelle est la diff\u00e9rence entre un exploit \\\"usermode\\\" et \\\"kernel\\\" ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu&#8217;est-ce qu&#8217;un &#8220;exploit&#8221; dans le milieu du hack&#8239;?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\",\"name\":\"Wirus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"caption\":\"Wirus\"},\"description\":\"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.\",\"sameAs\":[\"https:\/\/hackergen.com\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen\",\"https:\/\/www.youtube.com\/user\/Wirusalization\"],\"url\":\"https:\/\/www.customprotocol.com\/auteur\/wirus\/\"}]}<\/script>\n","yoast_head_json":{"title":"Qu'est-ce qu'un \"exploit\" dans le milieu du hack ? - Custom Protocol","description":"On entend souvent parler de \"exploit\", mais \u00e7a veut dire quoi au juste ? Et quelle est la diff\u00e9rence entre un exploit \"usermode\" et \"kernel\" ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/","og_locale":"fr_CA","og_type":"article","og_title":"Qu'est-ce qu'un \"exploit\" dans le milieu du hack ? - Custom Protocol","og_description":"On entend souvent parler de \"exploit\", mais \u00e7a veut dire quoi au juste ? Et quelle est la diff\u00e9rence entre un exploit \"usermode\" et \"kernel\" ?","og_url":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/","og_site_name":"Custom Protocol","article_published_time":"2015-01-30T20:38:29+00:00","og_image":[{"width":600,"height":299,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/01\/PS-Vita-key-cle-custom-bubbles-hack.jpg","type":"image\/jpeg"}],"author":"Wirus","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HackerGen","twitter_misc":{"\u00c9crit par":"Wirus","Estimation du temps de lecture":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/","url":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/","name":"Qu'est-ce qu'un \"exploit\" dans le milieu du hack ? - Custom Protocol","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2015-01-30T20:38:29+00:00","dateModified":"2015-01-30T20:38:29+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9"},"description":"On entend souvent parler de \"exploit\", mais \u00e7a veut dire quoi au juste ? Et quelle est la diff\u00e9rence entre un exploit \"usermode\" et \"kernel\" ?","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"Qu&#8217;est-ce qu&#8217;un &#8220;exploit&#8221; dans le milieu du hack&#8239;?"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9","name":"Wirus","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","caption":"Wirus"},"description":"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.","sameAs":["https:\/\/hackergen.com","https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen","https:\/\/www.youtube.com\/user\/Wirusalization"],"url":"https:\/\/www.customprotocol.com\/auteur\/wirus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/2127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=2127"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/2127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/2128"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=2127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=2127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=2127"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=2127"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=2127"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=2127"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=2127"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=2127"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=2127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}