{"id":225143,"date":"2025-05-29T13:44:26","date_gmt":"2025-05-29T13:44:26","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=225143"},"modified":"2025-08-06T13:33:45","modified_gmt":"2025-08-06T13:33:45","slug":"soutenir-la-confiance-et-la-securite-en-ligne","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/action-plan\/online-trust-and-safety\/","title":{"rendered":"Soutenir la confiance et la s\u00e9curit\u00e9 en ligne"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Soutenir<br>la confiance et la s\u00e9curit\u00e9 en ligne<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-32-font-size\" id=\"we-will-equip-the-global-encryption-coalition-and-the-internet-society-community-with-the-tools-needed-to-help-increase-awareness-of-the-value-of-encryption\"><strong>Nous travaillons afin d\u2019aider les personnes nouvellement connect\u00e9es \u00e0 avoir une exp\u00e9rience en ligne plus s\u00fbre.<\/strong><\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Lorsqu\u2019ils se connectent pour la premi\u00e8re fois, les nouveaux internautes entrent dans un environnement num\u00e9rique complexe, dans lequel il peut \u00eatre difficile de naviguer en toute s\u00e9curit\u00e9 si l\u2019on ne dispose pas d\u2019une exp\u00e9rience pr\u00e9alable. Il est donc essentiel d\u2019aider ces personnes nouvellement connect\u00e9es \u00e0 acqu\u00e9rir des comp\u00e9tences en mati\u00e8re de confiance et de s\u00e9curit\u00e9 pour construire un Internet plus s\u00fbr, plus digne de confiance et plus inclusif. Ainsi, pour s\u2019assurer que tout et chacun puisse profiter de toutes les opportunit\u00e9s offertes par Internet, l\u2019Internet Society a fait \u00e9quipe avec la communaut\u00e9 pour co-cr\u00e9er un programme de s\u00e9curit\u00e9 en ligne pratique, durable et men\u00e9 par la communaut\u00e9.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5.5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:84%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top is-image-fill-element\" style=\"grid-template-columns:auto 33%\"><div class=\"wp-block-media-text__content\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop uag-hide-tab\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-fbf14fa1 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Icon_Online_Safety_Dark_RGB-150x150.png\" alt=\"a shield and a question mark icon\" width=\"100\" height=\"100\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Ce que nous entendons par \u00ab s\u00e9curit\u00e9 \u00bb<\/h3><\/div><p class=\"uagb-ifb-desc\">La capacit\u00e9 \u00e0 identifier et \u00e9viter les exp\u00e9riences en ligne potentiellement pr\u00e9judiciables.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-3a93a6a6 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-150x150.png\" alt=\"a shield icon\" width=\"100\" height=\"100\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Ce que nous entendons par \u00ab confiance \u00bb<\/h3><\/div><p class=\"uagb-ifb-desc\">La capacit\u00e9 \u00e0 identifier les sites, sources et applications en ligne dignes de confiance et \u00e9viter ceux qui ne le sont pas.<\/p><\/div><\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer.jpg\" alt=\"A person wearing a hoodie sits on a window sill, working on a laptop\" class=\"wp-image-224372 size-large\" style=\"object-position:50% 50%\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer-250x167.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Lutter contre le manque de confiance envers Internet<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Nous voulons que tout le monde puisse acc\u00e9der aux informations, aux ressources et \u00e0 un r\u00e9seau de champions de la s\u00e9curit\u00e9 en ligne pour garantir qu\u2019ils disposent des informations les plus r\u00e9centes sur la mani\u00e8re de rester en toute s\u00e9curit\u00e9 en ligne. En d\u00e9veloppant conjointement des ressources et des supports de formation, nous cherchons \u00e0 doter chaque personne des comp\u00e9tences n\u00e9cessaires pour :<\/p>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>Identifier les communications provenant de sources qui ne sont pas dignes de confiance (tentatives d\u2019hame\u00e7onnage, sites Internet non s\u00e9curis\u00e9s ou faux, tentatives de fraude financi\u00e8re)<\/li>\n\n\n\n<li>Faire des choix \u00e9clair\u00e9s au sujet des outils \u00e0 utiliser pour communiquer de mani\u00e8re s\u00e9curis\u00e9e avec les ami(e)s et la famille, comme les services de messagerie qui offrent un<a href=\"https:\/\/www.internetsociety.org\/issues\/encryption\/what-is\/\"> cryptage de bout en bout<\/a><\/li>\n\n\n\n<li>Comprendre les m\u00e9thodes que les acteurs malveillants utilisent pour inciter les gens \u00e0 r\u00e9v\u00e9ler des informations personnelles, comme les coordonn\u00e9es bancaires, et comprendre pourquoi il est essentiel d\u2019utiliser des mots de passe robustes<\/li>\n\n\n\n<li>\u00c9viter d\u2019installer par inadvertance des logiciels malveillants ou des virus sur les appareils<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">S\u2019impliquer&nbsp;<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event.jpg\" alt=\"A woman in a hijab writes on a poster covered in colorful sticky notes\" class=\"wp-image-224355\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6e38d95b uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"mailto:ots@isoc.org\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Nous contacter<\/h5><\/div><p class=\"uagb-ifb-desc\">Actuellement, nous travaillons avec la communaut\u00e9 au d\u00e9veloppement de ressources et de supports de formation. \u00cates-vous un expert en mati\u00e8re de confiance et de s\u00e9curit\u00e9 en ligne ? Votre organisation, votre universit\u00e9 ou votre chapitre local de l\u2019Internet Society a-t-il d\u00e9velopp\u00e9 du mat\u00e9riel de formation sur la confiance et la s\u00e9curit\u00e9 en ligne ? Nous aimerions vous conna\u00eetre.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event.jpg\" alt=\"A group of people seated at a table, reviewing documents and discussing ideas together.\" class=\"wp-image-224368\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/sigs\/online-safety\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Rejoignez le groupe d\u2019int\u00e9r\u00eat sp\u00e9cial sur la s\u00e9curit\u00e9 en ligne<\/h5><\/div><p class=\"uagb-ifb-desc\">Voulez-vous nous aider \u00e0 sensibiliser les gens \u00e0 propos des menaces en ligne \u00e9mergentes, telles que la cyberintimidation, l\u2019usurpation d\u2019identit\u00e9 et le harc\u00e8lement en ligne, tout en fournissant des conseils pratiques sur la mani\u00e8re d\u2019att\u00e9nuer les risques et de prot\u00e9ger les informations personnelles ? Rejoignez le groupe d\u2019int\u00e9r\u00eat sp\u00e9cial (SIG) de l\u2019Internet Society sur la s\u00e9curit\u00e9 en ligne<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"613\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training.jpg\" alt=\"A group of men and women sit in a training\" class=\"wp-image-223500\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training-450x276.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training-768x471.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training-250x153.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d9cd8911 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/learning\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">D\u00e9couvrir<\/h5><\/div><p class=\"uagb-ifb-desc\">D\u00e9veloppez vos comp\u00e9tences et vos connaissances gr\u00e2ce \u00e0 ces cours de formation gratuits disponibles sur la plateforme de formation de l\u2019Internet Society :<br><br>Empreintes num\u00e9riques, Confidentialit\u00e9, Cryptage, Ce dont Internet a besoin pour exister, Ce dont Internet a besoin pour prosp\u00e9rer<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color has-link-color wp-elements-bb58c3d1118a71cae8a8f9f4ab960775\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Informations et ressources<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-a8fd20a7     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"1\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/isoc\/\" title=\"Articles par Internet Society\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Internet Society<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2026-02-10T17:10:20+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t10 f\u00e9vrier 2026\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2026\/02\/safer-internet-initiative\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Initiative pour un Internet plus s\u00fbr<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/bernardi\/\" title=\"Articles par Paula Bernardi\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Paula Bernardi<\/a>, <a href=\"https:\/\/www.internetsociety.org\/fr\/author\/richardson\/\" title=\"Articles par Celia Richardson\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Celia Richardson<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-05-02T17:59:50+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t2 mai 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/hall\/\" title=\"Articles par Joseph Lorenzo Hall\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Joseph Lorenzo Hall<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-04-17T20:08:44+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t17 avril 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/author\/schonfeld\/\" title=\"Articles par Sebasti\u00e1n Schonfeld\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Sebasti\u00e1n Schonfeld<\/a>, <a href=\"https:\/\/www.internetsociety.org\/fr\/author\/ncampbell\/\" title=\"Articles par Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2023-05-03T23:43:29+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t3 mai 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/05\/le-cryptage-assure-la-securite-des-enfants-en-ligne\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Le cryptage assure la s\u00e9curit\u00e9 des enfants en ligne<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-link-color has-12-font-size wp-elements-713fcb8a2c1c5c2ccfe762e75ea7e7e4\">Droits d&rsquo;auteur des images:<br>Creative Commons (deux photos du haut), \u00a9 Berke Aksoz, \u00a9 Berke Aksoz, \u00a9 Internet Society Cameroon Chapter<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nous travaillons afin d\u2019aider les personnes nouvellement connect\u00e9es \u00e0 avoir une exp\u00e9rience en ligne plus s\u00fbre gr\u00e2ce \u00e0 un programme de s\u00e9curit\u00e9 en ligne pratique, durable et men\u00e9 par la communaut\u00e9.<\/p>\n","protected":false},"author":46,"featured_media":246946,"parent":223219,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4909],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-225143","page","type-page","status-publish","has-post-thumbnail","hentry","category-renforcer-internet"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",1278,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-450x194.jpg",450,194,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-768x331.jpg",768,331,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-1024x441.jpg",1024,441,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",1278,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",1278,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-250x108.jpg",250,108,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Nous travaillons afin d\u2019aider les personnes nouvellement connect\u00e9es \u00e0 avoir une exp\u00e9rience en ligne plus s\u00fbre gr\u00e2ce \u00e0 un programme de s\u00e9curit\u00e9 en ligne pratique, durable et men\u00e9 par la communaut\u00e9.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/225143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=225143"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/225143\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/223219"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/246946"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=225143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=225143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=225143"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=225143"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=225143"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=225143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}