{"id":374,"date":"2025-01-28T15:36:18","date_gmt":"2025-01-28T15:36:18","guid":{"rendered":"https:\/\/phishia.fr\/?p=374"},"modified":"2025-11-21T14:58:49","modified_gmt":"2025-11-21T14:58:49","slug":"secure-messaging-applications-in-the-enterprise-in-2024","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/secure-messaging-applications-in-the-enterprise-in-2024\/","title":{"rendered":"Enterprise Secure Messaging Applications in 2024"},"content":{"rendered":"<p>Prime Minister Elisabeth Borne recently made a bold move to strengthen the security of government communications. She ordered the installation of Olvid secure messaging on the devices of all members of the government. This decision was taken with the aim of managing sensitive information more securely and protecting data.<\/p>\n\n\n\n<p>Olvid, a French instant messaging application, was chosen because of its reputation for being extremely secure. Designed in 2019 by Thomas Baign\u00e8res and Matthieu Finiasz, two French cybersecurity experts, Olvid received a \"Certification de s\u00e9curit\u00e9 de premier niveau\" from the Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information (ANSSI) in 2020.<\/p>\n\n\n\n<p>From December 8, 2023, ministers, secretaries of state, directors and cabinet members must no longer use conventional messaging applications, such as WhatsApp, Telegram or Signal, on their cell phones or computers. Instead, they must use Olvid. This initiative marks a milestone in the management of sensitive information and data protection within the government.&nbsp;<\/p>\n\n\n\n<p>But what should you use in your business?&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.6hol2ct086sz_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a>End-to-end cryptography: Complete protection<\/h2>\n\n\n\n<p>Visit&nbsp;<strong>end-to-end cryptography<\/strong>&nbsp;is a&nbsp;<strong>security mechanism which ensures that only the sender and recipient of a message can read it, by encrypting the data so that it can only be decrypted by the intended recipient.<\/strong>. Unlike traditional encryption systems, where data can be decrypted at various points along the way, end-to-end cryptography ensures that even messaging service providers cannot access message content.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.rqxqtv831rns_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a>Examples of Encrypted Messaging Applications<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Signal :\u00a0<\/strong>Signal is widely recognized as one of the most secure messaging applications available. It uses end-to-end cryptography for all messages, voice and video calls, guaranteeing total confidentiality of communications. Even metadata is minimized to reduce the amount of information that can be exploited.<\/li>\n\n\n\n<li><strong>WhatsApp:\u00a0<\/strong>Facebook-owned WhatsApp also offers end-to-end encryption for all communications. However, it should be noted that some features, such as chat backups in the cloud, may not be end-to-end encrypted, which can be a point of vulnerability.<\/li>\n\n\n\n<li><strong>Telegram:\u00a0<\/strong>Telegram offers a variety of security features, including secret chats that use end-to-end encryption. However, it's important to note that not all chats on Telegram are automatically end-to-end encrypted, requiring specific use of secret chats for maximum security.<a href=\"\/en\/contact\/\"><\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.qcf9j9lpk14y_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a>Olvid, the French, sovereign and secure player<\/h2>\n\n\n\n<p>Olvid is an instant messaging application that prides itself on being the most secure in the world. It was created in 2019 and received a \"Certification de s\u00e9curit\u00e9 de premier niveau\" by the Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information (ANSSI) in September 2020.<\/p>\n\n\n\n<p>Olvid safety is based on three key principles:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>User authentication :<\/strong>\u00a0Olvid guarantees user authentication, which means you can be sure of the identity of the person you're communicating with.<\/li>\n\n\n\n<li><strong>End-to-end encryption :<\/strong>\u00a0Olvid uses end-to-end encryption algorithms to protect user data. This means that only users involved in a conversation can read the messages exchanged.<\/li>\n\n\n\n<li><strong>No centralized user directory :<\/strong>\u00a0Unlike many other messaging applications, Olvid does not store user information on servers. This eliminates a potential point of vulnerability and reinforces the confidentiality of conversation metadata.<\/li>\n<\/ol>\n\n\n\n<p>In terms of operating mechanism, Olvid uses a series of cryptographic protocols to ensure security. For example, it uses<strong>AES 256 algorithm in CTR mode for encryption<\/strong>. In addition, Olvid uses&nbsp;<strong>cryptographic keys,<\/strong>&nbsp;including&nbsp;<strong>symmetric keys<\/strong>public and private keys, to secure communications. In addition, Olvid also uses Edwards curves for signature key generation and authentication.<\/p>\n\n\n\n<p>It's important to note that Olvid's security relies not only on the cryptographic protocols implemented in the cryptographic engine, but also on the actual connection\/relationship and trust between users. It assumes no trusted third party.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.him7rfg71rub_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/secure-messaging-applications-in-the-enterprise-in-2024\/\"><\/a>What's the right choice between convenience and safety?<\/h2>\n\n\n\n<p>The choice between convenience and security depends on the individual preferences of each user. Some may prefer convenience and accessibility of functionality, while others may opt for enhanced protection of their personal data. Ideally, messaging applications should offer a balance between these two aspects, providing practical functionality while guaranteeing maximum security of communications.<\/p>\n\n\n\n<p>In business, it's important to ask yourself how critical the exchanges you have with your colleagues are. If it's difficult for you to judge, it's a good idea to turn to players like Phishia, who can help you choose secure messaging applications tailored to your needs.<\/p>","protected":false},"excerpt":{"rendered":"<p>Prime Minister Elisabeth Borne recently made a bold move to strengthen the security of government communications. She ordered the installation of Olvid secure messaging on the devices of all members of the government. This decision was taken with the aim of managing sensitive information more securely and [...].<\/p>","protected":false},"author":2,"featured_media":375,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/secure-messaging-applications-in-the-enterprise-in-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024 - Phishia\" \/>\n<meta property=\"og:description\" content=\"La Premi\u00e8re ministre, Elisabeth Borne, a r\u00e9cemment fait un choix audacieux pour renforcer la s\u00e9curit\u00e9 des communications gouvernementales. Elle a ordonn\u00e9 l&rsquo;installation de la messagerie s\u00e9curis\u00e9e Olvid sur les appareils de tous les membres du gouvernement. Cette d\u00e9cision a \u00e9t\u00e9 prise dans le but de g\u00e9rer de mani\u00e8re plus s\u00e9curis\u00e9e les informations sensibles et de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/secure-messaging-applications-in-the-enterprise-in-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T15:36:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T14:58:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-12.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pauline Desmarets\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pauline Desmarets\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/\"},\"author\":{\"name\":\"Pauline Desmarets\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/9206c7bdf32a01c09611a465d7d83c88\"},\"headline\":\"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024\",\"datePublished\":\"2025-01-28T15:36:18+00:00\",\"dateModified\":\"2025-11-21T14:58:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/\"},\"wordCount\":988,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-12.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/\",\"name\":\"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-12.jpg\",\"datePublished\":\"2025-01-28T15:36:18+00:00\",\"dateModified\":\"2025-11-21T14:58:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-12.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-12.jpg\",\"width\":1280,\"height\":719},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/les-applications-de-messageries-securisees-en-entreprise-en-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/9206c7bdf32a01c09611a465d7d83c88\",\"name\":\"Pauline Desmarets\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Messaging Applications in the Enterprise in 2024 - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/secure-messaging-applications-in-the-enterprise-in-2024\/","og_locale":"en_US","og_type":"article","og_title":"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024 - Phishia","og_description":"La Premi\u00e8re ministre, Elisabeth Borne, a r\u00e9cemment fait un choix audacieux pour renforcer la s\u00e9curit\u00e9 des communications gouvernementales. Elle a ordonn\u00e9 l&rsquo;installation de la messagerie s\u00e9curis\u00e9e Olvid sur les appareils de tous les membres du gouvernement. Cette d\u00e9cision a \u00e9t\u00e9 prise dans le but de g\u00e9rer de mani\u00e8re plus s\u00e9curis\u00e9e les informations sensibles et de [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/secure-messaging-applications-in-the-enterprise-in-2024\/","og_site_name":"Phishia","article_published_time":"2025-01-28T15:36:18+00:00","article_modified_time":"2025-11-21T14:58:49+00:00","og_image":[{"width":1280,"height":719,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-12.jpg","type":"image\/jpeg"}],"author":"Pauline Desmarets","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pauline Desmarets","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/"},"author":{"name":"Pauline Desmarets","@id":"https:\/\/phishia.fr\/#\/schema\/person\/9206c7bdf32a01c09611a465d7d83c88"},"headline":"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024","datePublished":"2025-01-28T15:36:18+00:00","dateModified":"2025-11-21T14:58:49+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/"},"wordCount":988,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-12.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/","name":"Secure Messaging Applications in the Enterprise in 2024 - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-12.jpg","datePublished":"2025-01-28T15:36:18+00:00","dateModified":"2025-11-21T14:58:49+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-12.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-12.jpg","width":1280,"height":719},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/les-applications-de-messageries-securisees-en-entreprise-en-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"Les Applications de Messageries S\u00e9curis\u00e9es en entreprise en 2024"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/9206c7bdf32a01c09611a465d7d83c88","name":"Pauline Desmarets"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":7,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/374\/revisions"}],"predecessor-version":[{"id":2401,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/374\/revisions\/2401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/375"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}