{"id":180127,"date":"2022-11-07T17:08:01","date_gmt":"2022-11-07T17:08:01","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=180127"},"modified":"2025-09-16T16:19:53","modified_gmt":"2025-09-16T16:19:53","slug":"a-joint-call-to-world-leaders-for-a-secure-and-trusted-digital-economy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/open-letters\/g7\/","title":{"rendered":"Appel conjoint aux dirigeants mondiaux en faveur d\u2019une \u00e9conomie num\u00e9rique s\u00fbre et fiable"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-20 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"550\" class=\"wp-block-cover__image-background wp-image-146938\" alt=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1-450x248.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1-768x422.png 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1-250x138.png 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"has-text-align-center has-72-font-size wp-block-heading\">Appel conjoint aux dirigeants mondiaux <br>en faveur d\u2019une \u00e9conomie num\u00e9rique s\u00fbre et fiable<\/h1>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column has-ground-navy-color has-white-background-color has-text-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Ao\u00fbt 2019<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Dirigeants du monde, nous d\u00e9fendons les principes inh\u00e9rents \u00e0 une&nbsp;<a href=\"https:\/\/g20openletter.org\/\">soci\u00e9t\u00e9 num\u00e9rique saine<\/a>&nbsp;et nous vous exhortons \u00e0 faire de m\u00eame. En particulier, nous vous demandons de prot\u00e9ger et de promouvoir un cryptage fiable et solide, fondement de nos \u00e9conomies num\u00e9riques, de nos soci\u00e9t\u00e9s num\u00e9riques et de nos vies interd\u00e9pendantes.<\/p>\n\n\n\n<p><strong>Toute mesure compromettant le cryptage fragilise la s\u00e9curit\u00e9 de tous.<\/strong><\/p>\n\n\n\n<p>En avril 2019,&nbsp;<a href=\"http:\/\/www.g7.utoronto.ca\/justice\/2019-internet.pdf\">les ministres de l\u2019Int\u00e9rieur du G7<\/a>&nbsp;se sont engag\u00e9s \u00e0 encourager les soci\u00e9t\u00e9s Internet \u00e0 mettre en place des solutions d\u2019acc\u00e8s l\u00e9gal<sup><a href=\"#_ftn1\">[1]<\/a><\/sup>&nbsp;aux contenus crypt\u00e9s. Ils souhaitent que les entreprises puissent transmettre le contenu qui est communiqu\u00e9 ou stock\u00e9 sur leurs services, m\u00eame si ce contenu est crypt\u00e9.<\/p>\n\n\n\n<p>Cette approche constitue une menace grave pour la s\u00e9curit\u00e9 des communications sur Internet<a href=\"#_ftn2\"><sup>[2]<\/sup><\/a>&nbsp;et pour toutes les personnes qui d\u00e9pendent de ces services. Elle met en p\u00e9ril la confiance que les citoyens accordent aux produits et aux services num\u00e9riques, car elle remet en question leur volont\u00e9 de communiquer, d\u2019investir et d\u2019innover.<\/p>\n\n\n\n<p><strong>Ce que nous vous demandons<\/strong><\/p>\n\n\n\n<p>Nous vous demandons de consid\u00e9rer la s\u00e9curit\u00e9 num\u00e9rique comme une priorit\u00e9 et de vous engager explicitement \u00e0 renoncer \u00e0 contraindre les fabricants d\u2019appareils et les fournisseurs d\u2019applications et de services \u00e0:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>modifier leurs produits ou leurs services, ou retarder la correction d\u2019une erreur ou d\u2019une vuln\u00e9rabilit\u00e9 informatique, dans le but de fournir un acc\u00e8s l\u00e9gal \u00e0 du contenu crypt\u00e9\u2009;<\/li>\n\n\n\n<li>d\u00e9sactiver le cryptage par d\u00e9faut\u2009;<\/li>\n\n\n\n<li>cesser de proposer des services de cryptage de bout \u00e0 bout\u2009;<\/li>\n\n\n\n<li>compromettre de quelque autre moyen que ce soit la s\u00e9curit\u00e9 des services crypt\u00e9s.<\/li>\n<\/ul>\n\n\n\n<p>La s\u00e9curit\u00e9 num\u00e9rique n\u2019est pas une option. Elle est \u00e0 la base de nos \u00e9conomies et de nos soci\u00e9t\u00e9s connect\u00e9es. Sans s\u00e9curit\u00e9 num\u00e9rique, nous ne pouvons ni faire confiance aux d\u00e9veloppements technologiques, ni en fa\u00e7onner de nouveaux.<\/p>\n\n\n\n<p><strong>La fiabilit\u00e9 du cryptage est indissociable de la s\u00e9curit\u00e9 num\u00e9rique.<\/strong><\/p>\n\n\n\n<p>Les technologies de cryptage assurent la s\u00e9curit\u00e9 des personnes en ligne en prot\u00e9geant l\u2019int\u00e9grit\u00e9 et la confidentialit\u00e9 de leurs donn\u00e9es et de leurs communications num\u00e9riques. Elles prot\u00e8gent la navigation en ligne, les op\u00e9rations bancaires et les services publics cruciaux comme l\u2019\u00e9lectricit\u00e9, les \u00e9lections, les h\u00f4pitaux et les transports. Tous les citoyens ont besoin de ces services et comptent sur eux.<\/p>\n\n\n\n<p>Si les communications sur Internet sont plus s\u00fbres aujourd\u2019hui, c\u2019est parce qu\u2019elles sont crypt\u00e9es. De plus en plus de gens font le choix d\u2019utiliser des applications de messagerie offrant un cryptage de bout \u00e0 bout pour discuter, partager des images, mener leurs activit\u00e9s professionnelles ou parler par vid\u00e9oconf\u00e9rence. En 2018, plus de 72&nbsp;% de tout le flux quotidien sur les r\u00e9seaux \u00e9tait crypt\u00e9, et plus de 1,7&nbsp;milliard de personnes ont utilis\u00e9 des services de messagerie crypt\u00e9s de bout \u00e0 bout pour prot\u00e9ger leurs communications. Ces chiffres indiquent clairement \u00e0 quel point les gens comptent d\u00e9sormais sur le cryptage s\u00e9curis\u00e9.<a href=\"#_ftn3\"><sup>[3]<\/sup><\/a><\/p>\n\n\n\n<p>On pr\u00e9voit qu\u2019Internet contribuera \u00e0 environ 7&nbsp;milliards de dollars aux \u00e9conomies du G20 en 2020.<a href=\"#_ftn4\"><sup>[4]<\/sup><\/a>&nbsp;La possibilit\u00e9 de mandats d\u2019acc\u00e8s l\u00e9gal met ce montant en p\u00e9ril. Le cryptage est un \u00e9l\u00e9ment vital dans la protection des nouvelles entreprises num\u00e9riques, celles-l\u00e0 m\u00eames qui fa\u00e7onneront l\u2019avenir de l\u2019\u00e9conomie mondiale, et de toutes les personnes qui en d\u00e9pendent.<\/p>\n\n\n\n<p>Les m\u00e9thodes d\u2019acc\u00e8s l\u00e9gal \u00e0 l\u2019\u00e9chelle nationale pourraient pousser les clients qui d\u00e9pendent de logiciels de cryptage de haute fiabilit\u00e9 \u00e0 aller chercher des solutions \u00e0 l\u2019\u00e9tranger. Elles pourraient \u00e9galement entra\u00eener le r\u00e9tr\u00e9cissement des march\u00e9s locaux de la s\u00e9curit\u00e9 num\u00e9rique et causer la perte d\u2019innovations pr\u00e9cieuses dans les technologies relatives \u00e0 la s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Alors que vous vous efforcerez de vous attaquer aux in\u00e9galit\u00e9s mondiales pendant le Sommet des dirigeants du G7, nous vous demandons de reconna\u00eetre l\u2019importance particuli\u00e8re de la s\u00e9curit\u00e9 num\u00e9rique pour nos \u00e9conomies et nos soci\u00e9t\u00e9s num\u00e9riques.<\/p>\n\n\n\n<p><strong>Pour rester des dirigeants mondiaux de l\u2019innovation et du d\u00e9veloppement num\u00e9riques, aucune place ne doit \u00eatre laiss\u00e9e \u00e0 l\u2019affaiblissement de la s\u00e9curit\u00e9 num\u00e9rique. <\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.accessnow.org\/\">Accessnow<\/a><br><a href=\"https:\/\/adc.org.ar\/\">ADC<\/a><br><a href=\"https:\/\/www.apc.org\/\">Association for Progressive Communications &#8211; APC<\/a><br><a href=\"https:\/\/ccaoi.in\/UI\/\">CCAOI<sup>TM<\/sup><\/a><br><a href=\"https:\/\/cdt.org\/\">Center for Democracy &amp; Technology &#8211; CDT<\/a><br><a href=\"https:\/\/cira.ca\/\">CIRA<\/a><br><a href=\"https:\/\/cybertechaccord.org\/\">Cybersecurity Tech Accord<\/a><br><a href=\"https:\/\/datosprotegidos.org\/\">Datos Protegidos<\/a><br><a href=\"https:\/\/www.derechosdigitales.org\/\">Derechos Digitales<\/a><br><a href=\"https:\/\/international.eco.de\/\">ECO &#8211; Association of the Internet Industry <\/a><br><a href=\"https:\/\/www.efa.org.au\/\">Electronic Frontiers Australia<\/a><br><a href=\"https:\/\/web.karisma.org.co\/\">Fundacion Karisma<\/a><br><a href=\"https:\/\/gi.de\/\">German Informatics Society<\/a><br><a href=\"https:\/\/www.gp-digital.org\/\">Global Partners Digital<\/a> <br><a href=\"https:\/\/www.anchorfree.com\/\">Hotspot Shield<\/a><br><a href=\"https:\/\/nupef.org.br\/\">Instituto Nupef<\/a><br><a href=\"https:\/\/www.internet.org.au\/\">Internet Australia<\/a><br><a href=\"https:\/\/www.internetsociety.org\/fr\/\">Internet Society<\/a><br><a href=\"https:\/\/isoc.org.br\/\">Internet Society Brazil Chapter<\/a><br><a href=\"https:\/\/isoc.fr\/\">Internet Society France Chapter<\/a><br><a href=\"https:\/\/isoc.de\/\">Internet Society German Chapter<\/a><br><a href=\"https:\/\/www.isocindiadelhi.in\/\">Internet Society India Delhi Chapter<\/a><br><a href=\"https:\/\/isoc.ng\/\">Internet Society Nigeria Chapter<\/a> <br><a href=\"https:\/\/isoc.rs\/\">Internet Society Serbia Belgrade Chapter<\/a> <br><a href=\"https:\/\/isoc-e.org\/\">Internet Society UK England Chapter<\/a><br><a href=\"https:\/\/internetwithoutborders.org\/\">Internet Sans Frontier<\/a> <br><a href=\"https:\/\/internetnz.nz\/\">Internet NZ<\/a><br><a href=\"https:\/\/libraryfreedomproject.org\/\">Library Freedom Project<\/a> <br><a href=\"https:\/\/www.m3aawg.org\/\">Messaging Malware Mobile Anti-Abuse Working Group &#8211; M<sup>3<\/sup>AAWG<\/a><br><a href=\"https:\/\/netblocks.org\/about\">Netblocks<\/a>  <br><a href=\"https:\/\/oiste.org\/\">Oiste Foundation <\/a><br><a href=\"https:\/\/www.newamerica.org\/oti\/\">Open Technology Institute<\/a> <br><a href=\"https:\/\/www.privateinternetaccess.com\/\">Private Internet Access<\/a><br><a href=\"https:\/\/www.reformgovernmentsurveillance.com\/\">Reform Government Surveillance<\/a><br><a href=\"https:\/\/www.top10vpn.com\/\">Top10VPN<\/a><br>Unwanted Witness<br><a href=\"https:\/\/webfoundation.org\/\">World Wide Web Foundation<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-18-font-size\">Notes:<\/p>\n\n\n\n<p class=\"has-18-font-size\"><a id=\"_ftn1\" href=\"#_ftnref1\">[1]<\/a>&nbsp;Acc\u00e8s \u00e0 caract\u00e8re exceptionnel, aussi appel\u00e9 \u201cacc\u00e8s l\u00e9gal\u201d, fait r\u00e9f\u00e9rence \u00e0 l\u2019acc\u00e8s par voie crypt\u00e9e de communications pour les forces de l\u2019ordre et les services de renseignement.<\/p>\n\n\n\n<p class=\"has-18-font-size\"><a id=\"_ftn2\" href=\"#_ftnref2\">[2]<\/a>&nbsp;Voir&nbsp;:&nbsp;<em><a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/97690\/MIT-CSAIL-TR-2015-026.pdf\">Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications<\/a><\/em>&nbsp;\u2013 et&nbsp;<a href=\"https:\/\/newamericadotorg.s3.amazonaws.com\/documents\/Coalition_Letter_to_GCHQ_on_Ghost_Proposal_-_May_22_2019.pdf\">la lettre ouverte au GCHQ du Royaume-Uni<\/a><\/p>\n\n\n\n<p class=\"has-18-font-size\"><a id=\"_ftn3\" href=\"#_ftnref3\">[3]<\/a><a href=\"https:\/\/www.networkcomputing.com\/network-security\/encrypted-traffic-reaches-new-threshold\"> https:\/\/www.networkcomputing.com\/network-security\/encrypted-traffic-reaches-new-threshold<\/a>&nbsp;et&nbsp;<a href=\"https:\/\/techcrunch.com\/2018\/01\/31\/whatsapp-hits-1-5-billion-monthly-users-19b-not-so-bad\/\">https:\/\/techcrunch.com\/2018\/01\/31\/whatsapp-hits-1-5-billion-monthly-users-19b-not-so-bad\/<\/a>&nbsp;et&nbsp;<a href=\"https:\/\/telegram.org\/blog\/200-million\">https:\/\/telegram.org\/blog\/200-million<\/a><\/p>\n\n\n\n<p class=\"has-18-font-size\"><a id=\"_ftn4\" href=\"#_ftnref4\">[4]<\/a><a href=\"https:\/\/www.bcg.com\/publications\/2015\/infrastructure-needs-of-the-digital-economy.aspx\">https:\/\/www.bcg.com\/publications\/2015\/infrastructure-needs-of-the-digital-economy.aspx<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5%\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1720,"featured_media":104193,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[148],"tags":[],"region_news_regions":[6029],"content_category":[6125],"ppma_author":[5657],"class_list":["post-180127","page","type-page","status-publish","has-post-thumbnail","hentry","category-developpment","region_news_regions-mondial","content_category-open-letters"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",600,258,false]},"uagb_author_info":{"display_name":"Jelena Mirkovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/180127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1720"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=180127"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/180127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/104193"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=180127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=180127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=180127"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=180127"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=180127"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=180127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}