{"id":244849,"date":"2017-08-29T22:26:46","date_gmt":"2017-08-29T22:26:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244849"},"modified":"2026-02-04T16:56:04","modified_gmt":"2026-02-04T16:56:04","slug":"deploy360","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/deploy360\/","title":{"rendered":"Technologies Internet"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-70afd3e2 uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop uag-hide-tab\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-1c88c709 animated fadeIn slow\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading\">Technologies Internet<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full uag-hide-desktop\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"660\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling.jpg\" alt=\"Une \u00e9coli\u00e8re posant pour un selfie dans le couloir de l\u2019\u00e9cole\" class=\"wp-image-197982\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling.jpg 1440w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/kyrgyz-girl-smiling-250x115.jpg 250w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Technologies <br>Internet<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-text-align-left has-green-color has-text-color has-link-color has-32-font-size wp-elements-385b2d696c0dbaa37f40ed2c9cdca245\"><strong>Les technologies Internet sont essentielles pour permettre \u00e0 Internet de continuer \u00e0 se d\u00e9velopper, \u00e0 \u00e9voluer et \u00e0 r\u00e9pondre aux attentes changeantes des utilisateurs. Les technologies habilitantes contribuent \u00e0 am\u00e9liorer l\u2019\u00e9volutivit\u00e9, la s\u00e9curit\u00e9, la fiabilit\u00e9 et la disponibilit\u00e9 d\u2019Internet.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-32-font-size\" id=\"connectivity\">Technologies qui favorisent la croissance d\u2019Internet<\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-43f08d82 uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f6a79489\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242380\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Technology_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8987a0a2 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">IPv6<\/h3><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/deploy360\/ipv6\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/ipv6\/\">IPv6<\/a> est la derni\u00e8re version de la norme d\u2019adressage Internet (IP), destin\u00e9e \u00e0 remplacer progressivement IPv4. Chaque appareil connect\u00e9 \u00e0 Internet a besoin d\u2019une adresse IP num\u00e9rique pour communiquer avec les autres appareils. Les num\u00e9ros du syst\u00e8me d\u2019adresses original, nomm\u00e9 IPv4, sont en voie d\u2019\u00e9puisement. <br><br>Internet Society Pulse suit <a href=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\">l\u2019adoption d\u2019IPv6<\/a> dans diff\u00e9rents pays et r\u00e9seaux \u00e0 travers le monde afin de promouvoir une adoption plus large de cette technologie habilitante. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c4ee090f\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242378\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Wireless_community_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-da1bcd41 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Open Fiber Data Standard (OFDS)<\/h3><\/div><p class=\"uagb-ifb-desc\">La disponibilit\u00e9 de donn\u00e9es ad\u00e9quates sur les infrastructures de t\u00e9l\u00e9communications existantes, en particulier sur l\u2019infrastructure en fibre optique, peut appuyer des d\u00e9cisions visant \u00e0 r\u00e9aliser des investissements en infrastructures plus cibl\u00e9s et plus rentables, tant pour les secteurs priv\u00e9 que public.<br><br><a href=\"https:\/\/www.internetsociety.org\/blog\/2025\/04\/the-open-fibre-data-standard\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2025\/04\/the-open-fibre-data-standard\/\">La norme ouverte de donn\u00e9es sur la fibre optique, souvent appel\u00e9e OFDS (Open Fibre Data Standard)<\/a>, r\u00e9pond au probl\u00e8me du manque de donn\u00e9es sur l\u2019infrastructure en fibre optique en proposant une solution visant \u00e0 \u00e9tablir une norme ouverte mondiale pour les donn\u00e9es relatives \u00e0 cette infrastructure. <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<h3 class=\"wp-block-heading has-32-font-size\" id=\"security\">Technologies qui renforcent la s\u00e9curit\u00e9 en ligne<\/h3>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-07b48012 uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e46d814c\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242379\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_TLS_Server_TLS_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-2012b424 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Transport Layer Security (TLS)<\/h3><\/div><p class=\"uagb-ifb-desc\">De nombreuses applications populaires sur Internet, telles que la messagerie \u00e9lectronique et les navigateurs Internet, utilisent la <a href=\"https:\/\/www.internetsociety.org\/deploy360\/tls\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/tls\/\">technologie Transport Layer Security (TLS)<\/a> ou \u00ab S\u00e9curit\u00e9 de la couche de transport \u00bb pour s\u00e9curiser le trafic contre les intrus et la falsification des donn\u00e9es lors des communications entre les clients et les serveurs. Les gens connaissent g\u00e9n\u00e9ralement le TLS gr\u00e2ce au \u00ab\u202fhttps\u202f\u00bb et aux ic\u00f4nes de cadenas visibles dans les navigateurs Web.<br><br>La derni\u00e8re version, <a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/08\/deploying-tls-1-3\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2018\/08\/deploying-tls-1-3\/\">TLS 1.3<\/a>, offre une s\u00e9curit\u00e9 renforc\u00e9e et r\u00e9duit les possibilit\u00e9s pour les attaquants de d\u00e9couvrir de nouvelles vuln\u00e9rabilit\u00e9s. Il a \u00e9galement \u00e9t\u00e9 d\u00e9montr\u00e9 qu\u2019il am\u00e9liore les performances, les connexions s\u00e9curis\u00e9es s\u2019\u00e9tablissant plus rapidement. <br><br>Internet Society Pulse suit l\u2019adoption mondiale de <a href=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\">chaque version de TLS<\/a> afin de mettre en \u00e9vidence l\u2019am\u00e9lioration de la s\u00e9curit\u00e9 sur Internet. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-675e8465\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB.png\" alt=\"\" class=\"wp-image-125734\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB.png 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB-450x450.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB-150x150.png 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Security-Dark-RGB-250x250.png 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6d9929c1 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">DNS Security Extensions (DNSSEC)<\/h3><\/div><p class=\"uagb-ifb-desc\">Le DNS est un \u00e9l\u00e9ment essentiel de l\u2019infrastructure d\u2019Internet, qui traduit la forme ergonomique des noms de domaine (internetsociety.org) en donn\u00e9es chiffr\u00e9es mieux adapt\u00e9es \u00e0 l\u2019usage informatique (p. ex. 2001:41c8:20::b31a). <a href=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/\">Le protocole de s\u00e9curit\u00e9 DNS (DNSSEC)<\/a> a \u00e9t\u00e9 con\u00e7u pour authentifier les donn\u00e9es de r\u00e9ponse DNS.<br><br><a href=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\">Internet Society Pulse<\/a> pr\u00e9sente des indicateurs d\u2019adoption de DNSSEC par les registres de noms de domaine de code pays (ccTLD) ainsi qu\u2019une mesure de l\u2019utilisation de la validation DNSSEC par les h\u00f4tes Internet dans le monde entier. <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-0e87a3a2 uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-850aaad9\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB.png\" alt=\"a globe\" class=\"wp-image-189123\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB.png 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB-150x150.png 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/04\/Icon-Globe-Dark-RGB-250x250.png 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6873faaa uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">HTTP\/3<\/h3><\/div><p class=\"uagb-ifb-desc\">Hypertext Transfer Protocol (HTTP) est un protocole fondamental du <a href=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\" type=\"link\" id=\"https:\/\/webfoundation.org\/about\/vision\/history-of-the-web\/\">World Wide Web<\/a>, utilis\u00e9 pour le transfert de donn\u00e9es entre diff\u00e9rents appareils connect\u00e9s \u00e0 Internet. La derni\u00e8re version du HTTP (HTTP\/3) marque une rupture radicale avec le pass\u00e9, en adoptant le tout nouveau protocole de transport (QUIC). <br><br>Le fait qu\u2019Internet soit capable d\u2019adopter HTTP\/3 t\u00e9moigne de sa grande capacit\u00e9 d\u2019\u00e9volution et de sa capacit\u00e9 \u00e0 prendre en charge de nouvelles applications. Vous pouvez suivre son adoption via <a href=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/fr\/technologies\/\">Internet Society Pulse<\/a>. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-6b9307d9\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"144\" height=\"144\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/12\/Icon-Privacy-Dark-RGB.png\" alt=\"A padlock icon\" class=\"wp-image-218165\" style=\"aspect-ratio:1;object-fit:cover;width:80px\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-9045487f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Confidentialit\u00e9 du syst\u00e8me de noms de domaine (DNS)<\/h3><\/div><p class=\"uagb-ifb-desc\">Le <a href=\"https:\/\/www.internetsociety.org\/fr\/tag\/domain-name-system-dns-2\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/fr\/tag\/domain-name-system-dns-2\/\">syst\u00e8me de noms de domaine (DNS)<\/a> a \u00e9t\u00e9 initialement d\u00e9velopp\u00e9 sans tenir compte de la confidentialit\u00e9 des utilisateurs et peut donc divulguer des informations relatives aux requ\u00eates et aux r\u00e9ponses DNS, pouvant \u00eatre corr\u00e9l\u00e9es \u00e0 une activit\u00e9 r\u00e9seau sp\u00e9cifique. <br><br>D\u00e9couvrez <a href=\"https:\/\/www.internetsociety.org\/deploy360\/dns-privacy\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/dns-privacy\/\">comment nous pouvons att\u00e9nuer les implications sur la confidentialit\u00e9 li\u00e9es au DNS.<\/a> <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-3ae2be7a uagb-columns__columns-2 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-0295a10d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB.png\" alt=\"a shield icon\" class=\"wp-image-125737\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB.png 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-450x450.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-150x150.png 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-250x250.png 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-66fa7b90 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Anti-usurpation<\/h3><\/div><p class=\"uagb-ifb-desc\">Les attaques par d\u00e9ni de service distribu\u00e9 (DDoS) repr\u00e9sentent une menace croissante pour la disponibilit\u00e9 d\u2019Internet. Les technologies de lutte contre l\u2019usurpation d\u2019adresse (anti-spoofing) sont l\u2019un des moyens que les op\u00e9rateurs r\u00e9seau peuvent mettre en \u0153uvre pour se prot\u00e9ger contre ces attaques.<br><br><a href=\"https:\/\/manrs.org\/about\/\" type=\"link\" id=\"https:\/\/manrs.org\/about\/\">L\u2019initiative MANRS<\/a> d\u00e9finit des actions concr\u00e8tes que les r\u00e9seaux doivent entreprendre pour emp\u00eacher le trafic provenant d\u2019adresses IP source usurp\u00e9es. <\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e8ac1f5f\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-resized is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"288\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB.jpg\" alt=\"\" class=\"wp-image-242381\" style=\"aspect-ratio:1;object-fit:cover;width:80px\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB.jpg 288w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Standard-JPG-Icon_Router_Dark_RGB-250x250.jpg 250w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6c48df4e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Protocole de passerelle frontali\u00e8re (BGP)<\/h3><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/deploy360\/securing-bgp\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/deploy360\/securing-bgp\/\">Border Gateway Protocol (BGP)<\/a> est la langue parl\u00e9e par les routeurs sur Internet qui permet de d\u00e9finir la mani\u00e8re dont les paquets peuvent \u00eatre envoy\u00e9s d\u2019un routeur \u00e0 un autre et ainsi atteindre leur destination finale. <br><br>Le probl\u00e8me avec le BGP est qu\u2019il n\u2019int\u00e8gre pas directement de m\u00e9canismes de s\u00e9curit\u00e9 et repose en grande partie sur la confiance entre les op\u00e9rateurs r\u00e9seau, qui doivent s\u00e9curiser correctement leurs syst\u00e8mes et ne pas transmettre de donn\u00e9es incorrectes. Des erreurs se produisent cependant et des probl\u00e8mes peuvent survenir si des personnes mal intentionn\u00e9es tentent d\u2019intervenir sur les tableaux de routage utilis\u00e9s par le BGP. <br><br>Nous soutenons <a href=\"https:\/\/manrs.org\/\" type=\"link\" id=\"https:\/\/manrs.org\/\">l\u2019initiative MANRS<\/a>, qui pr\u00e9conise des actions simples mais concr\u00e8tes pour r\u00e9duire les menaces de routage les plus courantes, y compris le d\u00e9tournement de BGP. <\/p><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-18-font-size\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Parcourez les actualit\u00e9s et ressources sur les technologies Internet. Vous pouvez \u00e9galement consulter le <a href=\"https:\/\/pulse.internetsociety.org\/fr\/blog\/?category=Technology\" type=\"link\" id=\"https:\/\/pulse.internetsociety.org\/fr\/blog\/?category=Technology\">blog Internet Society Pulse<\/a> pour trouver davantage d\u2019actualit\u00e9s et d\u2019analyses bas\u00e9es sur les donn\u00e9es. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1715' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1715\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (63)<\/span><\/option><option value=\"events-type\" >\u00c9v\u00e9nements<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"news-type\" >Actualit\u00e9s<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Communiqu\u00e9s de presse<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (3)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"afrique\" >Afrique<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"asie-pacifique\" >Asie Pacifique<span class=\"cvp-count\"> (7)<\/span><\/option><option value=\"europe\" >Europe<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (57)<\/span><\/option><option value=\"amerique-latine-et-les-caraibes\" >Am\u00e9rique Latine et les Caraibes<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"moyen-orient\" >Moyen Orient<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (0)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_post_tag\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_post_tag\"><option value=\"\">Th\u00e8me<\/option><option value=\"domain-name-system-dns-2\" >Domain Name System (DNS)<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"extensions-de-securite-dns-dnssec\" >Extensions de s\u00e9curit\u00e9 DNS (DNSSEC)<span class=\"cvp-count\"> (8)<\/span><\/option><option value=\"ipv6\" >IPv6<span class=\"cvp-count\"> (14)<\/span><\/option><option value=\"open-fibre-data-standard-ofds\" >Open Fibre Data Standard (OFDS)<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"protocole-bgp-border-gateway-protocol\" >Protocole BGP (Border Gateway Protocol)<span class=\"cvp-count\"> (9)<\/span><\/option><option value=\"transport-layer-security-tls\" >Protocole TLS<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"securite-du-routage\" >S\u00e9curit\u00e9 du routage<span class=\"cvp-count\"> (52)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-3z0n3m62\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"234975\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/renforcer-la-resilience-des-infrastructures-internet-sous%e2%80%91marines\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail cvp-substitute skip-lazy  cvplazy\" alt=\"Description: Carte du monde pr\u00e9sentant les principaux c\u00e2bles sous-marins. Source : TeleGeography.\" title=\"\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/10\/undersea-fibre-optic-cables\u2014570-as-of-2025.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-13T19:13:09+00:00\">13 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/renforcer-la-resilience-des-infrastructures-internet-sous%e2%80%91marines\/\" class=\"_self\" target=\"_self\" aria-label=\"Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0\">Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0<\/a><\/h2><div class=\"pt-cv-content\">Synth\u00e8se \u00c0 mesure que la d\u00e9pendance aux services num\u00e9riques s\u2019intensifie, la r\u00e9silience et la s\u00e9curit\u00e9 des syst\u00e8mes de c\u00e2bles sous-marins &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230521\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 septembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\">Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0<\/a><\/h2><div class=\"pt-cv-content\">L\u2019Internet Society encourage les d\u00e9cideurs politiques \u00e0 privil\u00e9gier les solutions qui s\u2019attaquent aux contenus pr\u00e9judiciables \u00e0 la source, plut\u00f4t que &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"203060\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/11\/les-manrs-atteignent-de-nouveaux-sommets\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Les MANRS atteignent de nouveaux sommets\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a mountain peak covered with snow seen through colorful prayer flags\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1.jpg 1440w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-11-02T15:00:00+00:00\">2 novembre 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/11\/les-manrs-atteignent-de-nouveaux-sommets\/\" class=\"_self\" target=\"_self\" aria-label=\"Les MANRS atteignent de nouveaux sommets\">Les MANRS atteignent de nouveaux sommets<\/a><\/h2><div class=\"pt-cv-content\">En nous associant \u00e0 la Global Cyber Alliance (GCA), nous pensons que les MANRS continueront \u00e0 s&rsquo;imposer comme la r\u00e9f\u00e9rence &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"164931\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/02\/manrs-en-2021-une-annee-de-croissance-et-de-changement\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"MANRS en 2021 : Une ann\u00e9e de croissance et de changement\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"MANRS en 2021 : Une ann\u00e9e de croissance et de changement\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-02-15T13:45:59+00:00\">15 f\u00e9vrier 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/02\/manrs-en-2021-une-annee-de-croissance-et-de-changement\/\" class=\"_self\" target=\"_self\" aria-label=\"MANRS en 2021 : Une ann\u00e9e de croissance et de changement\">MANRS en 2021 : Une ann\u00e9e de croissance et de changement<\/a><\/h2><div class=\"pt-cv-content\">Voici quelques points forts du rapport 2021 de la communaut\u00e9 MANRS et un aper\u00e7u de nos projets pour 2022 &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"152522\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/10\/comite-directeur-des-manrs-appel-a-candidatures\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Comit\u00e9 directeur des MANRS : Appel \u00e0 candidatures\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Comit\u00e9 directeur des MANRS : Appel \u00e0 candidatures\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-10-07T11:00:00+00:00\">7 octobre 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/10\/comite-directeur-des-manrs-appel-a-candidatures\/\" class=\"_self\" target=\"_self\" aria-label=\"Comit\u00e9 directeur des MANRS : Appel \u00e0 candidatures\">Comit\u00e9 directeur des MANRS : Appel \u00e0 candidatures<\/a><\/h2><div class=\"pt-cv-content\">La communaut\u00e9 des MANRS recherche des volontaires pour si\u00e9ger \u00e0 son nouveau comit\u00e9 directeur et accepte les candidatures en pr\u00e9vision &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"151967\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/09\/lancement-dun-nouveau-programme-de-fournisseur-dequipement-manrs-pour-ameliorer-la-securite-du-routage-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Lancement d&#039;un nouveau programme de fournisseur d&#039;\u00e9quipement MANRS pour am\u00e9liorer la s\u00e9curit\u00e9 du routage Internet\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Lancement d&#039;un nouveau programme de fournisseur d&#039;\u00e9quipement MANRS pour am\u00e9liorer la s\u00e9curit\u00e9 du routage Internet\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-09-15T22:01:00+00:00\">15 septembre 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/09\/lancement-dun-nouveau-programme-de-fournisseur-dequipement-manrs-pour-ameliorer-la-securite-du-routage-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Lancement d&#039;un nouveau programme de fournisseur d&#039;\u00e9quipement MANRS pour am\u00e9liorer la s\u00e9curit\u00e9 du routage Internet\">Lancement d&rsquo;un nouveau programme de fournisseur d&rsquo;\u00e9quipement MANRS pour am\u00e9liorer la s\u00e9curit\u00e9 du routage Internet<\/a><\/h2><div class=\"pt-cv-content\">L&rsquo;activation de fonctions de s\u00e9curit\u00e9 du routage sur les \u00e9quipements de r\u00e9seau, ainsi que l&rsquo;assistance et la formation y aff\u00e9rents, &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"149385\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/07\/nouveaux-guides-sur-la-securite-du-routage-des-manrs-pour-les-decideurs\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Nouveaux guides sur la s\u00e9curit\u00e9 du routage des MANRS pour les d\u00e9cideurs\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Nouveaux guides sur la s\u00e9curit\u00e9 du routage des MANRS pour les d\u00e9cideurs\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_2-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-07-28T13:09:42+00:00\">28 juillet 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/07\/nouveaux-guides-sur-la-securite-du-routage-des-manrs-pour-les-decideurs\/\" class=\"_self\" target=\"_self\" aria-label=\"Nouveaux guides sur la s\u00e9curit\u00e9 du routage des MANRS pour les d\u00e9cideurs\">Nouveaux guides sur la s\u00e9curit\u00e9 du routage des MANRS pour les d\u00e9cideurs<\/a><\/h2><div class=\"pt-cv-content\">En tant que d\u00e9cideur ou dirigeant, craignez-vous que vos donn\u00e9es soient vol\u00e9es ou intercept\u00e9es ? Ou que votre site Web &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"139016\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/04\/charte-de-la-communaute-manrs-votre-avis-nous-importe\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Charte de la communaut\u00e9 MANRS, votre avis nous importe\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Charte de la communaut\u00e9 MANRS, votre avis nous importe\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-300x129.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/08\/0004_MANRS_Hero_Images_R6_1-250x107.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-04-20T14:39:37+00:00\">20 avril 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/04\/charte-de-la-communaute-manrs-votre-avis-nous-importe\/\" class=\"_self\" target=\"_self\" aria-label=\"Charte de la communaut\u00e9 MANRS, votre avis nous importe\">Charte de la communaut\u00e9 MANRS, votre avis nous importe<\/a><\/h2><div class=\"pt-cv-content\">Bien que les MANRS aient gagn\u00e9 en force depuis leur d\u00e9but en 2014, en attirant l&rsquo;attention, en suscitant l&rsquo;int\u00e9r\u00eat et &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"134235\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/03\/les-bourses-manrs-2021-sont-maintenant-ouvertes\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Les bourses MANRS 2021 sont maintenant ouvertes\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Les bourses MANRS 2021 sont maintenant ouvertes\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/03\/manrs-fellowship.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2021-03-03T13:00:00+00:00\">3 mars 2021<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/03\/les-bourses-manrs-2021-sont-maintenant-ouvertes\/\" class=\"_self\" target=\"_self\" aria-label=\"Les bourses MANRS 2021 sont maintenant ouvertes\">Les bourses MANRS 2021 sont maintenant ouvertes<\/a><\/h2><div class=\"pt-cv-content\">Le programme de bourses MANRS (Mutually Agreed Norms for Routing Security) 2021 accepte d\u00e9sormais les candidatures. Si vous \u00eates un &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"9\" data-currentpage=\"1\" data-sid=\"3z0n3m62\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244849\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244849\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">\u2026<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244849\/?_page=9\">9<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244849\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Chargement\u2026\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-3z0n3m62 {text-align: left}\n#pt-cv-view-3z0n3m62 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-3z0n3m62 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-3z0n3m62 .pt-cv-meta-fields {  }#pt-cv-view-3z0n3m62 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-3z0n3m62 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-3z0n3m62 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-3z0n3m62 .pt-cv-thumb-wrapper {  }#pt-cv-view-3z0n3m62[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-3z0n3m62:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-3z0n3m62 .pt-cv-thumbnail {  }#pt-cv-view-3z0n3m62 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-3z0n3m62 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-rmwrap {  }#pt-cv-view-3z0n3m62 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-3z0n3m62 .pt-cv-taxoterm {  }#pt-cv-view-3z0n3m62 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='3z0n3m62']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='3z0n3m62']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-3z0n3m62 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-3z0n3m62 .pt-cv-title a {  }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { font-size: 16px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-3z0n3m62 .pt-cv-title a {  }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { font-size: 16px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dit photo principal\u00a0:<br>\u00a9 Nyani Quarmyne<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acc\u00e9dez \u00e0 des ressources faciles \u00e0 comprendre sur les technologies Internet telles que IPv6, TLS, DNSSEC, HTTP\/3, la confidentialit\u00e9 DNS, l\u2019anti-usurpation d\u2019identit\u00e9, la s\u00e9curisation de BGP, et bien plus encore.<\/p>\n","protected":false},"author":46,"featured_media":133275,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6187],"tags":[],"region_news_regions":[6029],"content_category":[6105],"ppma_author":[4057],"class_list":["post-244849","page","type-page","status-publish","has-post-thumbnail","hentry","category-comment-fonctionne-internet","region_news_regions-mondial","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/02\/internet-shutdowns-undermine-trust-network.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Acc\u00e9dez \u00e0 des ressources faciles \u00e0 comprendre sur les technologies Internet telles que IPv6, TLS, DNSSEC, HTTP\/3, la confidentialit\u00e9 DNS, l\u2019anti-usurpation d\u2019identit\u00e9, la s\u00e9curisation de BGP, et bien plus encore.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=244849"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244849\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/133275"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=244849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=244849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=244849"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=244849"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=244849"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=244849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}