{"version":"1.0","provider_name":"Internet Society","provider_url":"https:\/\/www.internetsociety.org\/fr\/","author_name":"Ivana Trbovic","author_url":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/","title":"Chatham House Roundtable: Le cryptage et l'acc\u00e8s l\u00e9gal - Internet Society","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Hr7mm8KdFq\"><a href=\"https:\/\/www.internetsociety.org\/fr\/events\/chatham-house-roundtable-encryption-lawful-access\/\">Chatham House Roundtable: Le cryptage et l&rsquo;acc\u00e8s l\u00e9gal<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.internetsociety.org\/fr\/events\/chatham-house-roundtable-encryption-lawful-access\/embed\/#?secret=Hr7mm8KdFq\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Chatham House Roundtable: Le cryptage et l&rsquo;acc\u00e8s l\u00e9gal\u00a0\u00bb &#8212; Internet Society\" data-secret=\"Hr7mm8KdFq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.internetsociety.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Le cryptage est aspect technique tr\u00e8s important qui compte pour la confiance dans l&rsquo;\u00e9conomie num\u00e9rique. Il est d\u00e9cisif de s\u00e9curiser l&rsquo;infrastructure, les communications et l&rsquo;information pour soutenir notre soci\u00e9t\u00e9 num\u00e9rique. Le cryptage est \u00e9galement un moyen de cr\u00e9er des communications priv\u00e9es dans un monde num\u00e9rique o\u00f9 la vie priv\u00e9e dispara\u00eet rapidement. Pourtant, le cryptage reste [&hellip;]","thumbnail_url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/02\/isoc-logo-1280x642.jpg","thumbnail_width":1280,"thumbnail_height":642}