{"id":244763,"date":"2025-12-01T18:05:59","date_gmt":"2025-12-01T18:05:59","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244763"},"modified":"2026-02-27T19:11:13","modified_gmt":"2026-02-27T19:11:13","slug":"security","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/our-work\/security\/","title":{"rendered":"S\u00e9curit\u00e9"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-ffc93ebd uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-tab uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c95947c4\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">S\u00e9curit\u00e9<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f5da99 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-bf6c64fb\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>Une s\u00e9curit\u00e9 solide renforce la confiance dans Internet, lui permettant de stimuler l\u2019innovation \u00e9conomique et sociale.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong>Une s\u00e9curit\u00e9 solide renforce la confiance dans Internet, lui permettant de stimuler l\u2019innovation \u00e9conomique et sociale.<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Il est de notre responsabilit\u00e9 collective de maintenir un Internet s\u00fbr et s\u00e9curis\u00e9 tout en pr\u00e9servant ses propri\u00e9t\u00e9s fondamentales et son caract\u00e8re mondial. <\/p>\n\n\n\n<p class=\"has-18-font-size\">La conception et la mise en \u0153uvre des solutions de s\u00e9curit\u00e9 doivent tenir compte de leur impact potentiel sur ces principes fondamentaux, notamment l\u2019accessibilit\u00e9, la collaboration, l\u2019interop\u00e9rabilit\u00e9 et la d\u00e9centralisation.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">S\u00e9curit\u00e9<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>Une s\u00e9curit\u00e9 solide renforce la confiance dans Internet, lui permettant de stimuler l\u2019innovation \u00e9conomique et sociale.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1500\" height=\"816\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg\" alt=\"Un jeune enfant parle avec enthousiasme au t\u00e9l\u00e9phone portable\" class=\"wp-image-239465\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg 1500w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-450x245.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-1024x557.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-768x418.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-250x136.jpg 250w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Il est de notre responsabilit\u00e9 collective de maintenir un Internet s\u00fbr et s\u00e9curis\u00e9 tout en pr\u00e9servant ses propri\u00e9t\u00e9s fondamentales et son caract\u00e8re mondial.<\/p>\n\n\n\n<p class=\"has-18-font-size\">La conception et la mise en \u0153uvre des solutions de s\u00e9curit\u00e9 doivent tenir compte de leur impact potentiel sur ces principes fondamentaux, notamment l\u2019accessibilit\u00e9, la collaboration, l\u2019interop\u00e9rabilit\u00e9 et la d\u00e9centralisation.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Liens essentiels sur la s\u00e9curit\u00e9<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Liens essentiels sur la s\u00e9curit\u00e9<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS2025_hallway-chats_banner-1.jpeg\" alt=\"Deux hommes, debout sur un toit, regardent attentivement un objet hors-champ\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/ndss-symposium\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Symposium NDSS<\/h3><\/div><p class=\"uagb-ifb-desc\">Le symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s (NDSS) favorise l\u2019\u00e9change d\u2019informations entre chercheurs et experts m\u00e9tier.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"562\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3.jpg\" alt=\"Un groupe de personnes assises autour d\u2019une table lors d\u2019un atelier sur le chiffrement \u00e0 Bruxelles.\" class=\"wp-image-227469\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3-450x253.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3-768x432.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/07\/Encryption-Workshop-3-250x141.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8987a0a2 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Chiffrement<\/h3><\/div><p class=\"uagb-ifb-desc\">Le chiffrement est un outil de s\u00e9curit\u00e9 essentiel pour prot\u00e9ger vos informations personnelles et naviguer en ligne en toute s\u00e9curit\u00e9.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"564\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training.jpg\" alt=\"Des femmes sont assises devant des ordinateurs lors d\u2019une formation organis\u00e9e par le chapitre du Tchad\" class=\"wp-image-234904\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training-450x254.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training-768x433.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Chad-Chapter-Training-250x141.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/learning\/internet-security\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Cours en ligne sur la s\u00e9curit\u00e9 Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Approfondissez vos connaissances en s\u00e9curit\u00e9 Internet gr\u00e2ce \u00e0 notre cours en ligne gratuit\u202f! D\u00e9couvrez les aspects sp\u00e9cifiques de la cybers\u00e9curit\u00e9 li\u00e9s \u00e0 l\u2019Internet mondial.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"550\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House.jpg\" alt=\"L\u2019ext\u00e9rieur de la Maison-Blanche\" class=\"wp-image-218658\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House.jpg 1200w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/US-White-House-250x115.jpg 250w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4fea2dee uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/security\/security-policy\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Politique de s\u00e9curit\u00e9<\/h3><\/div><p class=\"uagb-ifb-desc\">Les d\u00e9cideurs peuvent renforcer ou affaiblir la s\u00e9curit\u00e9 d\u2019Internet. D\u00e9couvrez comment la politique influence l\u2019\u00e9cosyst\u00e8me de la s\u00e9curit\u00e9 en ligne.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"441\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-1024x441.jpg\" alt=\"Un jeune absorb\u00e9 par son t\u00e9l\u00e9phone.\" class=\"wp-image-224362\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-1024x441.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-450x194.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-768x331.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-250x108.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg 1278w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-7475369c uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/deploy360\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Technologies Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Les technologies Internet \u00e9voluent constamment pour offrir des exp\u00e9riences en ligne plus rapides et plus s\u00fbres.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1.jpg\" alt=\"Plusieurs personnes assises autour d\u2019une table, en pleine discussion.\" class=\"wp-image-239453\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1.jpg 800w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Discussion-at-table-1-250x167.jpg 250w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/collaborativesecurity\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">S\u00e9curit\u00e9 collaborative<\/h3><\/div><p class=\"uagb-ifb-desc\">Ce sont les individus qui, en fin de compte, maintiennent Internet. La coop\u00e9ration et la collaboration sont essentielles pour garantir sa s\u00e9curit\u00e9 et sa prosp\u00e9rit\u00e9.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Pas de recherches, pas d\u2019Internet<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Pas de recherches, pas d\u2019Internet<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Depuis plus de trois d\u00e9cennies, nous organisons le symposium sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes distribu\u00e9s (NDSS) afin de r\u00e9unir les personnes qui contribuent \u00e0 rendre nos interactions en ligne s\u00fbres et s\u00e9curis\u00e9es.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Du maintien de l\u2019anonymat de nos pens\u00e9es \u00e0 la pr\u00e9vention des arnaques par hame\u00e7onnage, le symposium NDSS 2025 a pr\u00e9sent\u00e9 des recherches de pointe issues de l\u2019industrie et du milieu universitaire.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.internetsociety.org\/blog\/2025\/06\/no-research-no-internet\/\"><strong>Lire l&rsquo;article de blog<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"470\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-1024x470.jpg\" alt=\"Personnes assises dans le public du NDSS, concentr\u00e9es sur la conf\u00e9rence\" class=\"wp-image-225220\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-1024x470.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-450x207.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-768x353.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/06\/Audience-at-NDSS.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1182' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1182\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (148)<\/span><\/option><option value=\"events-type\" >\u00c9v\u00e9nements<span class=\"cvp-count\"> (15)<\/span><\/option><option value=\"news-type\" >Actualit\u00e9s<span class=\"cvp-count\"> (13)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Communiqu\u00e9s de presse<span class=\"cvp-count\"> (10)<\/span><\/option><option value=\"statements-type\" >&nbsp;&nbsp;&nbsp;D\u00e9clarations<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (32)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"speeches-type\" >&nbsp;&nbsp;&nbsp;Discours<span class=\"cvp-count\"> (1)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Th\u00e8me<\/option><option value=\"deploy360-fr\" >Technologies Internet<span class=\"cvp-count\"> (74)<\/span><\/option><option value=\"cryptage\" >Cryptage<span class=\"cvp-count\"> (62)<\/span><\/option><option value=\"securite-fr\" >S\u00e9curit\u00e9<span class=\"cvp-count\"> (151)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"afrique\" >Afrique<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"asie-pacifique\" >Asie Pacifique<span class=\"cvp-count\"> (19)<\/span><\/option><option value=\"europe\" >Europe<span class=\"cvp-count\"> (25)<\/span><\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (141)<\/span><\/option><option value=\"amerique-latine-et-les-caraibes\" >Am\u00e9rique Latine et les Caraibes<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"moyen-orient\" >Moyen Orient<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (17)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"247553\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2026\/04\/dns-blocking-mind-the-unintended-consequences\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Blocage DNS : attention aux cons\u00e9quences inattendues\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A screen displays a repeated error message\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-04-03T13:00:00+00:00\">3 avril 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2026\/04\/dns-blocking-mind-the-unintended-consequences\/\" class=\"_self\" target=\"_self\" aria-label=\"Blocage DNS : attention aux cons\u00e9quences inattendues\">Blocage DNS : attention aux cons\u00e9quences inattendues<\/a><\/h2><div class=\"pt-cv-content\">Avec la multiplication des mandats de blocage DNS, les inqui\u00e9tudes concernant la s\u00e9curit\u00e9, l&rsquo;ouverture d&rsquo;Internet et la fragmentation augmentent \u00e9galement &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242756\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\">Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne<\/a><\/h2><div class=\"pt-cv-content\">Les politiques exigeant des v\u00e9rifications d\u2019\u00e2ge, bien qu\u2019elles partent souvent d\u2019une bonne intention, cr\u00e9ent des risques pour les personnes en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230521\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 septembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\">Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0<\/a><\/h2><div class=\"pt-cv-content\">L\u2019Internet Society encourage les d\u00e9cideurs politiques \u00e0 privil\u00e9gier les solutions qui s\u2019attaquent aux contenus pr\u00e9judiciables \u00e0 la source, plut\u00f4t que &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"226001\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/news\/declarations\/2025\/lancement-du-fonds-common-good-cyber-pour-renforcer-la-securite-dinternet-a-lechelle-mondiale\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Lancement du Fonds Common Good Cyber pour renforcer la s\u00e9curit\u00e9 d\u2019Internet \u00e0 l\u2019\u00e9chelle mondiale\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Lancement du Fonds Common Good Cyber pour renforcer la s\u00e9curit\u00e9 d\u2019Internet \u00e0 l\u2019\u00e9chelle mondiale\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/news-type\/' title='Actualit\u00e9s' class='pt-cv-tax-news-type'>Actualit\u00e9s<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/statements-type\/' title='D\u00e9clarations' class='pt-cv-tax-statements-type'>D\u00e9clarations<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-06-23T13:07:39+00:00\">23 juin 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/news\/declarations\/2025\/lancement-du-fonds-common-good-cyber-pour-renforcer-la-securite-dinternet-a-lechelle-mondiale\/\" class=\"_self\" target=\"_self\" aria-label=\"Lancement du Fonds Common Good Cyber pour renforcer la s\u00e9curit\u00e9 d\u2019Internet \u00e0 l\u2019\u00e9chelle mondiale\">Lancement du Fonds Common Good Cyber pour renforcer la s\u00e9curit\u00e9 d\u2019Internet \u00e0 l\u2019\u00e9chelle mondiale<\/a><\/h2><div class=\"pt-cv-content\">L\u2019Internet Society (ISOC) et la Global Cyber Alliance (GCA) annoncent le lancement du Fonds Common Good Cyber, une initiative visant &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"227162\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A bit of light spills out of a dark door.\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-05-02T17:59:50+00:00\">2 mai 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self\" target=\"_self\" aria-label=\"Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?\">Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?<\/a><\/h2><div class=\"pt-cv-content\">Une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage est une forme d\u2019acc\u00e8s exceptionnel qu\u2019une plateforme accorde \u00e0 des tiers &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"223403\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"hands typing on a keyboard\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-04-17T20:08:44+00:00\">17 avril 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self\" target=\"_self\" aria-label=\"Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir\">Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir<\/a><\/h2><div class=\"pt-cv-content\">Int\u00e9ressons-nous de plus pr\u00e8s \u00e0 la confiance en ligne, \u00e0 ce qui fait que l\u2019Internet est digne de confiance et &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"214874\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/etude-de-cas-la-loi-canadienne-sur-les-nouvelles-en-ligne-nuit-au-journalisme-a-la-concurrence-et-a-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-09-24T13:00:25+00:00\">24 septembre 2024<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/etude-de-cas-la-loi-canadienne-sur-les-nouvelles-en-ligne-nuit-au-journalisme-a-la-concurrence-et-a-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet\">\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">De nombreux pays envisagent d\u2019adopter de nouvelles lois pour soutenir les organes de presse en difficult\u00e9 face \u00e0 la concurrence &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"205178\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/lanalyse-cote-client\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"L&#039;analyse c\u00f4t\u00e9 client\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"L&#039;analyse c\u00f4t\u00e9 client\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-12-13T15:05:02+00:00\">13 d\u00e9cembre 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/lanalyse-cote-client\/\" class=\"_self\" target=\"_self\" aria-label=\"L&#039;analyse c\u00f4t\u00e9 client\">L&rsquo;analyse c\u00f4t\u00e9 client<\/a><\/h2><div class=\"pt-cv-content\">D\u00e9couvrez les recommandations de l&rsquo;Internet Society au projet de r\u00e8glement du Parlement europ\u00e9en sur la pr\u00e9vention et la lutte contre &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"203060\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/11\/les-manrs-atteignent-de-nouveaux-sommets\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Les MANRS atteignent de nouveaux sommets\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a mountain peak covered with snow seen through colorful prayer flags\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1.jpg 1440w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-11-02T15:00:00+00:00\">2 novembre 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/11\/les-manrs-atteignent-de-nouveaux-sommets\/\" class=\"_self\" target=\"_self\" aria-label=\"Les MANRS atteignent de nouveaux sommets\">Les MANRS atteignent de nouveaux sommets<\/a><\/h2><div class=\"pt-cv-content\">En nous associant \u00e0 la Global Cyber Alliance (GCA), nous pensons que les MANRS continueront \u00e0 s&rsquo;imposer comme la r\u00e9f\u00e9rence &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"24\" data-currentpage=\"1\" data-sid=\"bu5bn556\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">\u2026<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763\/?_page=24\">24<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Chargement\u2026\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dit photo :<br>\u00a9 Sagar Biswas from Pixabay, \u00a9 Wes Hardaker, \u00a9 Nicolas Olivier, \u00a9 Internet Society Chad Chapter, creative commons (two photos), \u00a9 Flawless Events, \u00a9 Wes Hardaker<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il est de notre responsabilit\u00e9 collective de maintenir un Internet s\u00fbr et s\u00e9curis\u00e9 tout en pr\u00e9servant ses propri\u00e9t\u00e9s fondamentales et son caract\u00e8re mondial. <\/p>\n","protected":false},"author":1898,"featured_media":239465,"parent":47369,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244763","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",1500,816,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-450x245.jpg",450,245,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-768x418.jpg",768,418,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-1024x557.jpg",1024,557,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",1500,816,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",1500,816,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-250x136.jpg",250,136,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",300,163,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",400,218,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/boy-1946347_1920-1.jpg",600,326,false]},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Il est de notre responsabilit\u00e9 collective de maintenir un Internet s\u00fbr et s\u00e9curis\u00e9 tout en pr\u00e9servant ses propri\u00e9t\u00e9s fondamentales et son caract\u00e8re mondial.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=244763"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/47369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/239465"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=244763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=244763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=244763"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=244763"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=244763"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=244763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}