{"version":"1.0","provider_name":"Internet Society","provider_url":"https:\/\/www.internetsociety.org\/fr\/","author_name":"Ivana Trbovic","author_url":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/","title":"La proposition du fant\u00f4me - Internet Society","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NZocmdRuF3\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/la-proposition-du-fantome\/\">La proposition du fant\u00f4me<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/la-proposition-du-fantome\/embed\/#?secret=NZocmdRuF3\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La proposition du fant\u00f4me\u00a0\u00bb &#8212; Internet Society\" data-secret=\"NZocmdRuF3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.internetsociety.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Qu\u2019est-ce que la proposition dite \u00ab\u2009du fant\u00f4me\u2009\u00bb, et pourquoi devrions-nous nous en pr\u00e9occuper\u2009? Au moins un gouvernement a r\u00e9cemment propos\u00e9, afin de faciliter l\u2019acc\u00e8s \u00e0 des messages chiffr\u00e9s de bout en bout, une modification des technologies, afin qu\u2019un tiers puisse \u00e9couter des conversations chiffr\u00e9es, sans \u00eatre rep\u00e9r\u00e9. Les partisans de cette mesure affirment qu\u2019elle peut [&hellip;]","thumbnail_url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/02\/isoc-logo-1280x642.jpg","thumbnail_width":1280,"thumbnail_height":642}