{"id":8187,"date":"2007-12-27T17:57:36","date_gmt":"2007-12-27T16:57:36","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=8187"},"modified":"2007-12-27T17:57:36","modified_gmt":"2007-12-27T16:57:36","slug":"apple-prepare-un-dispositif-dauthentification-de-ses-logiciels","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=8187","title":{"rendered":"Apple pr\u00e9pare un dispositif d&rsquo;authentification de ses logiciels"},"content":{"rendered":"<p>Apple pr\u00e9pare un dispositif d&rsquo;authentification de ses logiciels.<\/p>\n<p>C&rsquo;est une technologie qui lui permettrait de contr\u00f4ler ses logiciels, \u00e0 la mani\u00e8re de Microsoft avec son programme Windows Genuine Advantage (WGA), tr\u00e8s controvers\u00e9.<\/p>\n<p>Pour rappel, Windows Genuine Advantage, apr\u00e8s v\u00e9rification de leur authenticit\u00e9, valide les copies de Windows install\u00e9es sur des postes.<\/p>\n<p>Dans la pr\u00e9sentation de sa demande de brevet &#8211; \u00abRun-time Code Injection to Perform Checks\u00bb -, Apple parle d&rsquo;un syst\u00e8me de gestion num\u00e9rique des droits susceptible de limiter l&rsquo;ex\u00e9cution d&rsquo;une application sur une machine.<\/p>\n<p>Ces contr\u00f4les, pr\u00e9cise Apple, seraient imperceptibles pour l&rsquo;utilisateur et difficiles \u00e0 contourner, gr\u00e2ce \u00e0 l&#8217;emploi d&rsquo;un syst\u00e8me de chiffrement.<\/p>\n<p>Fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple pr\u00e9pare un dispositif d&rsquo;authentification de ses logiciels. C&rsquo;est une technologie qui lui permettrait de contr\u00f4ler ses logiciels, \u00e0 la mani\u00e8re de Microsoft avec son programme Windows Genuine Advantage (WGA), tr\u00e8s controvers\u00e9. Pour rappel, Windows Genuine Advantage, apr\u00e8s v\u00e9rification de leur authenticit\u00e9, valide les copies de Windows install\u00e9es sur des postes. Dans la pr\u00e9sentation de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-8187","post","type-post","status-publish","format-standard","hentry","category-hackers"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/8187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8187"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/8187\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}