{"id":171443,"date":"2022-06-03T14:21:27","date_gmt":"2022-06-03T14:21:27","guid":{"rendered":"https:\/\/www.internetsociety.org\/extension-du-cryptage\/"},"modified":"2025-07-25T21:19:50","modified_gmt":"2025-07-25T21:19:50","slug":"extension-du-cryptage","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/action-plan\/encryption\/","title":{"rendered":"Extension du cryptage"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">\u00c9tendre <br>le cryptage<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-32-font-size\" id=\"we-will-equip-the-global-encryption-coalition-and-the-internet-society-community-with-the-tools-needed-to-help-increase-awareness-of-the-value-of-encryption\">Le cryptage habilite les gens et les garde en s\u00e9curit\u00e9. Nous avons besoin de cryptage pour tout le monde, n\u2019importe o\u00f9.<\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Le cryptage est un outil essentiel \u00e0 notre protection dans une soci\u00e9t\u00e9 num\u00e9rique. Cependant, les autorit\u00e9s cherchent de plus en plus \u00e0 compromettre cet outil essentiel, nous exposant tous \u00e0 des menaces.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Du matin au soir, \u00e0 chaque connexion, nous nous en remettons au cryptage. Il pr\u00e9serve la s\u00e9curit\u00e9 personnelle de milliards de personnes dans le monde et la s\u00e9curit\u00e9 nationale de tous les pays. Qu&rsquo;il s&rsquo;agisse de nos messages priv\u00e9s, des services bancaires en ligne, du contr\u00f4le du trafic a\u00e9rien, des donn\u00e9es m\u00e9dicales ou du v\u00f4te \u00e9lectronique, nos informations en ligne doivent \u00eatre prot\u00e9g\u00e9es contre les \u00e9coutes illicites et le piratage.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Nous travaillons dans le monde entier pour prot\u00e9ger le cryptage en aidant les d\u00e9cideurs politiques \u00e0 comprendre les propositions qui pourraient mettre en peril notre s\u00e9curit\u00e9 en ligne.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5.5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:89%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top is-image-fill-element\" style=\"grid-template-columns:auto 33%\"><div class=\"wp-block-media-text__content\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop uag-hide-tab\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d4c7b3e1 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comment le cryptage fonctionne-t-il?<\/h3><\/div><p class=\"uagb-ifb-desc\">Le cryptage est le processus de brouillage ou de codage de l\u2019information de sorte qu\u2019elle ne puisse \u00eatre comprise que par une personne ayant les moyens de la restituer \u00e0 son \u00e9tat d\u2019origine. Il prot\u00e8ge la confidentialit\u00e9 des donn\u00e9es conserv\u00e9es ou transmises en les rendant incompr\u00e9hensibles : Une tierce partie peut toujours y avoir acc\u00e8s, mais ne serait en mesure de les interpr\u00e9ter. Certaines formes de cryptage, comme la navigation Web s\u00e9curis\u00e9e, ne prot\u00e8gent les donn\u00e9es que le temps de leur transmission : sur le site Web et dans votre navigateur, les informations ne sont pas crypt\u00e9es. D\u2019autres formes de cryptage, comme la messagerie s\u00e9curis\u00e9e, prot\u00e8gent les donn\u00e9es jusqu\u2019\u00e0 ce que le destinataire ouvre le message, m\u00eame si cela prend des jours ou des semaines apr\u00e8s son arriv\u00e9e. <br><br>Lorsque les messages sont crypt\u00e9s m\u00eame lorsqu\u2019ils sont trait\u00e9s par des interm\u00e9diaires (comme un serveur de messagerie) et ne sont lisibles que par l\u2019exp\u00e9diteur et le destinataire, nous parlons de cryptage \u00ab&nbsp;de bout en bout&nbsp;\u00bb. Le cryptage de bout en bout prot\u00e8ge les donn\u00e9es ind\u00e9pendamment des protocoles utilis\u00e9s pour les transmettre, alors que la navigation sur le Web repose sur des protocoles de communication s\u00e9curis\u00e9s pour son cryptage. <\/p><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-vertical is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-41619b2b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-green-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.internetsociety.org\/issues\/encryption\/what-is\/\"><strong>En savoir plus sur le fonctionnement de l&rsquo;Internet<\/strong><\/a><\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"476\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium.jpg\" alt=\"Une femme est assise avec deux enfants et regarde une tablette.\" class=\"wp-image-214340 size-large\" style=\"object-position:50% 50%\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium.jpg 900w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium-450x238.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium-768x406.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/keeping-kids-safe-online-medium-250x132.jpg 250w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Lutter contre le manque de confiance \u00e0 l\u2019\u00e9gard de l\u2019Internet<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Pour maintenir la s\u00e9curit\u00e9 de l\u2019Internet, nous :<\/p>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>sensibilisons les d\u00e9cideurs politiques \u00e0 l&rsquo;importance de la protection et de la promotion de l&rsquo;utilisation d&rsquo;un cryptage fort<\/li>\n\n\n\n<li>collaborons avec des d\u00e9fenseurs du monde entier pour d\u00e9fendre un cryptage fort<\/li>\n\n\n\n<li>collaborons avec nos partenaires pour att\u00e9nuer les menaces contre le cryptage \u00e0 travers le monde<\/li>\n\n\n\n<li>poursuivons le d\u00e9veloppement de la Global Encryption Coalition afin de renforcer les efforts des d\u00e9fenseurs du monde entier visant \u00e0 promouvoir et \u00e0 prot\u00e9ger un Internet plus s\u00fbr et plus fiable<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Participer<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-4 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-4\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/padlocks.jpeg\" alt=\"plusieurs cadenas sur un mur\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6e38d95b uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/learning\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Suivez notre cours gratuit sur le cryptage et ses avantages<\/h5><\/div><p class=\"uagb-ifb-desc\">D\u00e9couvrez ce qu&rsquo;est le cryptage, pourquoi il est important pour tous et comment vous pouvez le prot\u00e9ger dans ce cours en ligne gratuit.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/GEC_background.jpg\" alt=\"carr\u00e9s de diff\u00e9rentes couleurs\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-9c79d4e5 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.globalencryption.org\/about\/members\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Rejoignez la Global Encryption Coalition<\/h5><\/div><p class=\"uagb-ifb-desc\">Rejoignez le puissant r\u00e9seau de d\u00e9fense des int\u00e9r\u00eats des organisations, des entreprises et des experts en cybers\u00e9curit\u00e9.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Encryption_video.png\" alt=\"illustration de quatre personnes lors d'un appel vid\u00e9o\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-e9550508 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.globalencryption.org\/about\/friends\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Devenez un ami de la Global Encryption Coalition<\/h5><\/div><p class=\"uagb-ifb-desc\">Inscrivez-vous pour ne rien manquer de l&rsquo;actualit\u00e9 et acc\u00e9der aux bo\u00eetes \u00e0 outils pens\u00e9es pour vous aider \u00e0 d\u00e9fendre le cryptage.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a0aa6064\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/ged-words.jpg\" alt=\"Journ\u00e9e mondiale du chiffrement\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-5088b11f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.globalencryption.org\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_blank\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Participez \u00e0 la Journ\u00e9e mondiale du cryptage 2024<\/h5><\/div><p class=\"uagb-ifb-desc\">Suivez l&rsquo;actualit\u00e9 pour plus de d\u00e9tails, tr\u00e8s bient\u00f4t !<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Actualit\u00e9s<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-a8fd20a7     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"8\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/bernardi\/\" title=\"Articles par Paula Bernardi\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Paula Bernardi<\/a>, <a href=\"https:\/\/www.internetsociety.org\/fr\/author\/richardson\/\" title=\"Articles par Celia Richardson\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Celia Richardson<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-05-02T17:59:50+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t2 mai 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/hall\/\" title=\"Articles par Joseph Lorenzo Hall\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Joseph Lorenzo Hall<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-04-17T20:08:44+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t17 avril 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/schonfeld\/\" title=\"Articles par Sebasti\u00e1n Schonfeld\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Sebasti\u00e1n Schonfeld<\/a>, <a href=\"https:\/\/www.internetsociety.org\/fr\/author\/ncampbell\/\" title=\"Articles par Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2023-05-03T23:43:29+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t3 mai 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/05\/le-cryptage-assure-la-securite-des-enfants-en-ligne\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Le cryptage assure la s\u00e9curit\u00e9 des enfants en ligne<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/jmorris\/\" title=\"Articles par John Morris\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">John Morris<\/a>, <a href=\"https:\/\/www.internetsociety.org\/fr\/author\/ncampbell\/\" title=\"Articles par Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2022-11-22T21:48:45+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t22 novembre 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/11\/les-deux-mesures-que-les-etats-unis-devraient-prendre-pour-proteger-linternet-et-la-securite-de-milliards-de-personnes-en-ligne\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Les deux mesures que les \u00c9tats-Unis devraient prendre pour prot\u00e9ger l&rsquo;Internet et la s\u00e9curit\u00e9 de milliards de personnes en ligne<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/ncampbell\/\" title=\"Articles par Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2022-02-08T15:20:52+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t8 f\u00e9vrier 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/02\/un-internet-plus-sur-commence-par-plus-de-cryptage\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Un Internet plus s\u00fbr commence par plus de cryptage<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/voge\/\" title=\"Articles par Callum Voge\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Callum Voge<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2022-01-19T21:38:48+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t19 janvier 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/01\/le-projet-de-loi-britannique-sur-la-securite-en-ligne-risque-daffaiblir-le-cryptage-et-de-mettre-les-internautes-britanniques-en-danger\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Le projet de loi britannique sur la s\u00e9curit\u00e9 en ligne risque d&rsquo;affaiblir le cryptage et de mettre les internautes britanniques en danger<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/6\/\">6<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/7\/\">7<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/8\/\">8<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Ressources<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-950df4b8     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"6\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2024-09-24T13:00:25+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t24 septembre 2024\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/etude-de-cas-la-loi-canadienne-sur-les-nouvelles-en-ligne-nuit-au-journalisme-a-la-concurrence-et-a-linternet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2023-12-13T15:05:02+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t13 d\u00e9cembre 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/lanalyse-cote-client\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">L&rsquo;analyse c\u00f4t\u00e9 client<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2021-10-12T16:45:40+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t12 octobre 2021\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2021\/le-cryptage-comment-il-peut-proteger-les-groupes-de-pression-et-les-mouvements-sociaux\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Le cryptage : Comment il peut prot\u00e9ger les groupes de pression et les mouvements sociaux<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/6\/\">6<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-link-color has-12-font-size wp-elements-0f9c338fd4082dd2535d9dff9bf89b4f\">Droits d\u2019auteur : <br>\u00a9 <a href=\"https:\/\/unsplash.com\/photos\/a-close-up-of-a-padlock-on-a-door-KrPulSdUetk\">Unsplash<\/a>, \u00a9 <a href=\"https:\/\/www.pexels.com\/photo\/anonymous-asian-woman-with-grandchildren-watching-video-on-tablet-5693013\/\">Pexels<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le cryptage est indispensable au bon fonctionnement d&rsquo;un monde s\u00fbr et s\u00e9curis\u00e9.<\/p>\n","protected":false},"author":46,"featured_media":214343,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4316,40,118,4898,4909],"tags":[669,6066,5939],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-171443","page","type-page","status-publish","has-post-thumbnail","hentry","category-cryptage","category-encryption","category-qui-sommes-nous","category-strong-internet","category-renforcer-internet","tag-actionplan","tag-actionplan-fr","tag-plan-daction"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-450x229.jpg",450,229,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-768x391.jpg",768,391,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",960,489,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-250x127.jpg",250,127,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner-600x489.jpg",600,489,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",300,153,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",400,204,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/09\/Encryption-banner.jpg",600,306,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Le cryptage est indispensable au bon fonctionnement d'un monde s\u00fbr et s\u00e9curis\u00e9.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=171443"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/214343"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=171443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=171443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=171443"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=171443"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=171443"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=171443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}