{"id":84842,"date":"2018-08-08T09:30:28","date_gmt":"2018-08-08T09:30:28","guid":{"rendered":"https:\/\/www.internetsociety.org\/encryption-resources\/"},"modified":"2025-09-16T16:25:46","modified_gmt":"2025-09-16T16:25:46","slug":"encryption-resources","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/issues\/encryption\/resources\/","title":{"rendered":"Ressources \u00e0 propos du cryptage"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-05df2fe8 uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-1c151856\"><div class=\"uagb-column__overlay\"><\/div>\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading headline6 has-neutral-white-color has-text-color\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/encryption\/\">Cryptage<\/a> > Ressources<\/h6>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Ressources de Cryptage\u00a0<\/h1>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Le cryptage est un aspect fondamental d\u2019un Internet s\u00fbr et fiable. Il permet de s\u00e9curiser les informations personnelles et est essentiel pour la s\u00e9curit\u00e9 nationale, en prot\u00e9geant la soci\u00e9t\u00e9 contre les terroristes, les criminels et les gouvernements hostiles.<\/p>\n\n\n\n<p>Cependant, le cryptage est menac\u00e9. Certaines personnes veulent introduire des failles dans les syst\u00e8mes de cryptage, ce qui rend le cryptage moins s\u00fbr pour tout le monde. D\u00e9couvrez comment nous favorisons et prot\u00e9geons le cryptage dans le monde entier et comment vous pouvez plaider en faveur du cryptage dans notre rubrique \u00ab Ressources\u00bb.<\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center has-neutral-putty-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<p class=\"has-depth-blue-color has-text-color has-26-font-size\">L\u2019Internet Society fait partie de la Coalition Mondiale pour le Cryptage (soit la Global Encryption Coalition).\u00a0<br><a href=\"https:\/\/www.globalencryption.org\/\">D\u00e9couvrez comment vous impliquer<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"277\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01.png\" alt=\"Global Encryption Coalition logo\" class=\"wp-image-114433\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01.png 757w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01-450x165.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/04\/GEC-graphics-01-250x91.png 250w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Fiches d\u2019informations\u00a0<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n    <section class=\"component component-table\">\n        <div class=\"content-wrapper\">\n            <ul class=\"table\"><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/comprendre-le-chiffrement-les-liens-avec-la-securite-des-victimes\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Comprendre le chiffrement: les liens avec la s\u00e9curit\u00e9 des victimes<\/a><p class=\"small-text\">Voici quelques exemples de la mani\u00e8re dont le chiffrement de bout en bout et le chiffrement \u00e0 connaissance nulle...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/linformatique-quantique-met-elle-en-danger-notre-securite-numerique\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Fiche d\u2019information: Physique quantique et informatique<\/a><p class=\"small-text\">Un ordinateur quantique peut donc calculer plusieurs valeurs au m\u00eame moment, contrairement \u00e0 un ordinateur classique. Cette capacit\u00e9 est...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/fact-sheet-intermediaries-and-encryption\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Fiche d&rsquo;information: Les interm\u00e9diaires et le cryptage<\/a><p class=\"small-text\">Mettre la pression sur les interm\u00e9diaires pour affaiblir la s\u00e9curit\u00e9 n'est pas la solution \u00e0 la circulation de donn\u00e9es...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/fiche-dinformation-le-piratage-gouvernemental\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Fiche d&rsquo;information: Le\u00a0piratage gouvernemental<\/a><p class=\"small-text\">Le piratage gouvernemental est l'une des techniques utilis\u00e9es par les agences de s\u00e9curit\u00e9 nationale et les forces de l'ordre...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/fact-sheet-machine-in-the-middle-attacks\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Fiche d\u2019information: Les attaques de l&rsquo;homme du milieu<\/a><p class=\"small-text\">Publi\u00e9 initialement: 24 mars 2020Mise \u00e0 jour: 26 septembre 2022 Lorsque nous utilisons Internet, nous nous attendons \u00e0 ce...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/la-proposition-du-fantome\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">La proposition du fant\u00f4me<\/a><p class=\"small-text\">Qu\u2019est-ce que la proposition dite \u00ab\u2009du fant\u00f4me\u2009\u00bb, et pourquoi devrions-nous nous en pr\u00e9occuper\u2009? Au moins un gouvernement a r\u00e9cemment...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/fiche-dinformation-lanalyse-cote-client\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Fiche d\u2019information: L\u2019analyse c\u00f4t\u00e9 client<\/a><p class=\"small-text\">Publi\u00e9 initialement: 24 mars 2020Mise \u00e0 jour: 26 septembre 2022 Le cryptage est une technologie con\u00e7ue pour aider les...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2019\/encryption-factsheet-essential-for-lgbtq-community\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Le cryptage : Essentiel pour la communaut\u00e9 LGBTQ+<\/a><p class=\"small-text\">Pour certaines communaut\u00e9s, comme les communaut\u00e9s LGBTQ+, le cryptage est particuli\u00e8rement crucial pour assurer la s\u00e9curit\u00e9 des personnes en...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2019\/factsheet-for-policymakers-6-ways-lawful-access-puts-everyones-security-at-risk\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">6 Moyens par Lesquels \u00ab l\u2019Acc\u00e8s L\u00e9gal \u00bb au Cryptage Compromet la S\u00e9curit\u00e9<\/a><p class=\"small-text\">Le cryptage est un processus qui consiste \u00e0 brouiller ou \u00e0 cacher des informations afin qu\u2019elles ne puissent \u00eatre...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/policybriefs\/encryption\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Briefing sur la politique publique: Cryptage<\/a><p class=\"small-text\">Les technologies de chiffrement permettent aux internautes de prot\u00e9ger la confidentialit\u00e9 de leurs donn\u00e9es et communications contre des observations...<\/p>\n                <\/li>\n            <\/ul>\n        <\/div>\n    <\/section>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-depth-blue-color has-text-color has-48-font-size\">Reports<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n    <section class=\"component component-table\">\n        <div class=\"content-wrapper\">\n            <ul class=\"table\"><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2021\/limpact-economique-des-lois-qui-affaiblissent-le-cryptage\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">L&rsquo;impact \u00e9conomique des lois qui affaiblissent le cryptage<\/a><p class=\"small-text\">En 2018, le Parlement australien a adopt\u00e9 la loi corrective de TOLA sur les t\u00e9l\u00e9communications et autres (assistance et...<\/p>\n                <\/li><li class=\"table-item\">\n                 <a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2020\/tracabilite-et-cybersecurite-serie-dateliers-dexperts-sur-le-chiffrement-en-inde\/\" class=\"has-neutral-white-color has-26-font-size\" style=\"text-decoration:none\">Tra\u00e7abilit\u00e9 et cybers\u00e9curit\u00e9<\/a><p class=\"small-text\">La tra\u00e7abilit\u00e9 ou la capacit\u00e9 de retrouver le cr\u00e9ateur d&rsquo;un contenu ou d&rsquo;un message particulier est au centre du...<\/p>\n                <\/li>\n            <\/ul>\n        <\/div>\n    <\/section>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-depth-blue-color has-text-color has-48-font-size\">Webcasts and Events<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-26-font-size\">Archive of past encryption-related events.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-65f00886     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"1\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/events\/global-encryption-day\/2022\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Journ\u00e9e mondiale du cryptage 2022<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<b>Un cryptage fort nous prot\u00e8ge en ligne, et m\u00eame hors ligne. <\/b>\n<br>Au cours de cette Journ\u00e9e mondiale du cryptage, des personnes dans monde entier se&#8230;\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/events\/global-encryption-day\/2021\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Journ\u00e9e mondiale du cryptage<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<b>Un cryptage fort assure la s\u00e9curit\u00e9 des personnes et des nations en ligne.<\/b>\n<br>Reprenez la s\u00e9curit\u00e9 et la confidentialit\u00e9 entre vos mains et adoptez d\u00e8s aujourd\u2019hui&#8230;\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/events\/chatham-house-roundtable-encryption-lawful-access\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Chatham House Roundtable: Le cryptage et l&rsquo;acc\u00e8s l\u00e9gal<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>Le cryptage est aspect technique tr\u00e8s important qui compte pour la confiance dans l&rsquo;\u00e9conomie num\u00e9rique. Il est d\u00e9cisif de s\u00e9curiser l&rsquo;infrastructure, les communications et l&rsquo;information&#8230;\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Open Letters, Statements and Submissions<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Open letters, statements and submissions that the Internet Society has authored or contributed to.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-eb3fc860 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Submission-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/03\/ISOC-EU-DMA-interoperability-encrypted-messaging-20220311.pdf\">Comments to EU on Digital Markets Act (DMA) and Interoperability of Encrypted Messaging<\/a>, 11 March 2022<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-de010418 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Statements-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/ged.globalencryption.org\/statement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Global Encryption Day Statement<\/a>, 21 October 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-2ae27083 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><br><a href=\"https:\/\/www.globalencryption.org\/wp-content\/uploads\/2021\/06\/IWN-UK-open-letter-20210607-Final.pdf\">Open Letter to&nbsp;Members of&nbsp;UK&nbsp;Parliament:&nbsp;End-to-End&nbsp;Encryption&nbsp;Keeps&nbsp;Us&nbsp;Safe<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 15 June 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-f2cb2e46 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Submission-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2021\/mauritius-igf-and-internet-society-response-to-mauritius-icta-consultation-paper\/\">Mauritius IGF and Internet Society Response to Mauritius ICTA Consultation Paper<\/a>, 21 May 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-a99a36dc uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Statements-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/news\/statements\/2021\/internet-society-uk-online-public-safety-bill-is-trying-to-legislate-the-impossible-a-safe-internet-without-strong-encryption\/\">UK Online Public Safety Bill is trying to legislate the impossible \u2013 a safe Internet without strong encryption<\/a>, 12 May 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-a5a0a93a uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Submission-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/ec.europa.eu\/info\/law\/better-regulation\/have-your-say\/initiatives\/12974-Media-Commission-recommendation-on-ensuring-safety-of-journalists-in-the-European-Union\/F2324536_en\">EU&nbsp;Commission&nbsp;Recommendation on&nbsp;Ensuring&nbsp;Safety of&nbsp;Journalists in the European Union<\/a>, 12 May 2021<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-06b559ae uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-Statements-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.globalencryption.org\/2020\/10\/cdt-gpd-and-internet-society-reject-time-worn-argument-for-encryption-backdoors\/\">CDT, GPD and Internet Society Reject Time-Worn Argument for Encryption Backdoors<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 30 October 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-0db50155 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/edri.org\/wp-content\/uploads\/2020\/10\/20201020-EDRi-Open-letter-CSAM-and-encryption-FINAL.pdf\">EDRi &#8211;&nbsp;Civil&nbsp;Society&nbsp;Views on&nbsp;Defending&nbsp;Privacy&nbsp;While&nbsp;Preventing&nbsp;Criminal&nbsp;Acts<\/a>, 20 October 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-9d7d541c uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.globalencryption.org\/2020\/10\/cdt-gpd-and-internet-society-reject-time-worn-argument-for-encryption-backdoors\/\">Open Letter Against Lawful Access to Encrypted Data Act<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 7 July 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8b96e6fd uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/newamericadotorg.s3.amazonaws.com\/documents\/Coalition_letter_opposing_EARN_IT_3-6-20.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Open Letter Opposing EARN IT bill<\/a> &#8211; <em>Global Encryption Coalition<\/em>, 6 March 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d9d28f12 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB-150x150.png\" alt=\"\" width=\"30\" height=\"30\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/www.internetsociety.org\/open-letters\/india-intermediary-guidelines\/\" target=\"_blank\" rel=\"noreferrer noopener\">Concerns with Amendments to India\u2019s Information Technology (Intermediaries Guidelines) Rules under the Information Technology Act<\/a>, 9 January 2020<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-693e7246 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/Iconography-OpenLetters-Dark-RGB.png\" alt=\"\" width=\"30\" height=\"29\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\"><a href=\"https:\/\/cdt.org\/insights\/open-letter-facebooks-end-to-end-encryption-plans\/\" target=\"_blank\" rel=\"noreferrer noopener\">Open Letter: Facebook\u2019s End-to-End Encryption Plans<\/a>, 4 October 2019<\/p><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-d3d37fe7 uagb-faq-icon-row-reverse uagb-faq-layout-accordion uagb-faq-expand-first-false uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height     \" data-faqtoggle=\"true\" role=\"tablist\"><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-0764c797 \" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<h3 class=\"uagb-question\">Read more <\/h3><\/div><div class=\"uagb-faq-content\"><p><a href=\"https:\/\/www.alai.lat\/por-el-derecho-a-la-privacidad\/\">LAC Technical Community Letter on Encryption<\/a>, 24 October 2019<br><br><a href=\"https:\/\/www.g7openletter.org\/\">A Joint Call to\u00a0G7\u00a0World Leaders for a Secure and Trusted Digital Economy,<\/a> 23 August 2019<a href=\"https:\/\/www.g7openletter.org\/\"><br><\/a><br><a href=\"https:\/\/www.internetsociety.org\/news\/statements\/2019\/internet-society-concerns-kazakhstan-encryption\">Statement on\u00a0Government Action in Kazakhstan Regarding Encrypted Internet Traffic<\/a>, 23 July 2019<br><br><a href=\"https:\/\/g20openletter.org\/\">Joint Call to G20 World Leaders for a Healthy Digital Society<\/a>, 30 November 2018<br><br><a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/07\/encryption-is-critical-for-the-australian-economy\/\">Call for Australian Government to Abandon Plans to Introduce Legislation That Undermines Strong Encryption<\/a>, 17 July 2018<br><br><a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2018\/internet-society-chatham-house-roundtable-on-encryption-and-lawful-access\/\">Internet Society-Chatham House Roundtable on Encryption and Lawful Access<\/a>, 19 April 2018<br><br><a href=\"https:\/\/securetheinternet.org\/\">Secure the Internet: An Open Letter to the Leaders of the World&rsquo;s Governments<\/a>, 15 February 2016<br><br><a href=\"https:\/\/www.ohchr.org\/Documents\/Issues\/Opinion\/Communications\/InternetSociety.pdf\">Internet Society submission to the UN Special Rapporteur on the Protection and Promotion of the Right to Freedom of\u00a0Expression\u00a0and Opinion regarding the use of encryption and anonymity in digital communications<\/a>, 10 February 2015<\/p><\/div><\/div><\/div>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left has-depth-blue-color has-text-color has-48-font-size\">In the Press<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Articles written by Internet Society staff.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/news.trust.org\/item\/20211117102104-mp3t4\/\">From LGBT+ People to Journalists, Strong Encryption is Crucial for Making the Internet Safer for Everyone<\/a> &#8211; Thomson Reuters Foundation News, 17 November, 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.computerweekly.com\/opinion\/Encryption-protects-the-marginalised-and-its-under-threat\" target=\"_blank\" rel=\"noreferrer noopener\">Encryption Protects the Marginalised \u2013 and It\u2019s Under Threat<\/a> &#8211; <em>Computer Weekly<\/em>, 14 October, 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/10\/ed_FEATURE_SAY-SOMETHING_Sidebar.pdf\">If You See Something, Say Something<\/a> &#8211; <a href=\"http:\/\/www.maskmatters.org\">maskmatters.org<\/a>, September 2021 (originally published in subscription-only publication)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.euractiv.com\/section\/data-protection\/opinion\/i-confess-ive-got-things-to-hide\/\">I Confess I\u2019ve Got Things to Hide<\/a> &#8211; <em>EurActiv<\/em>, 19 August 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/beta.darkreading.com\/endpoint\/the-role-of-encryption-in-protecting-lgbtq-community-members\">The Role of Encryption in Protecting LGBTQ+ Community Members<\/a> &#8211; <em>Dark Reading<\/em>, 28 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.politicshome.com\/members\/article\/draft-online-safety-bill-undermines-duty-of-care-to-constituents\">The Online Safety Bill Puts the Security of All Citizens and Communities at Risk<\/a> &#8211; <em>The House<\/em>, 15 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.dqindia.com\/whatsapp-complying-traceability-provision-will-create-technical-vulnerabilities-can-exploited-internet-society\/\" rel=\"noreferrer noopener\" target=\"_blank\">WhatsApp Complying with Traceability Will Create Technical Vulnerabilities that Can be Exploited<\/a> &#8211; <em>DataQuest India<\/em>, 3 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ciol.com\/new-it-rules-undermine-end-to-end-encryption-neeti-biyani-internet-society\/\">The New IT Rules would undermine end-to-end encryption<\/a> &#8211; CIOL, 2 June 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/apolitical.co\/en\/solution_article\/what-public-servants-need-to-know-about-securing-their-communications\">What&nbsp;Public&nbsp;Servants&nbsp;Need to&nbsp;Know&nbsp;About&nbsp;Securing their&nbsp;Communications<\/a> &#8211; <em>Apolitical<\/em>, 6 May 2021<\/li>\n\n\n\n<li><a href=\"https:\/\/www.wired.com\/story\/the-false-promise-of-lawful-access-to-private-data\/\">The False Promise of Lawful Access to Private Data<\/a> &#8211; <em>Wired<\/em>, 16 May 2019<\/li>\n\n\n\n<li><a href=\"https:\/\/www.lemonde.fr\/idees\/article\/2019\/05\/16\/laisser-les-etats-decrypter-et-filtrer-internet-peut-creer-un-prejudice-pour-les-citoyens-et-l-economie_5462763_3232.html\">Laisser les Etats d\u00e9crypter et filtrer Internet peut cr\u00e9er un pr\u00e9judice pour les citoyens et l\u2019\u00e9conomie<\/a> (<em>Allowing States to Decipher and Filter the Internet Can Harm Citizens and the Economy<\/em>) &#8211; <em>Le Monde<\/em>, 16 May 2019<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Blog Posts<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Our latest blog posts on encryption.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-b52c2950     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"8\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-05-02T17:59:50+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t2 mai 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-04-17T20:08:44+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t17 avril 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/05\/le-cryptage-assure-la-securite-des-enfants-en-ligne\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Le cryptage assure la s\u00e9curit\u00e9 des enfants en ligne<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2023-05-03T23:43:29+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t3 mai 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/11\/les-deux-mesures-que-les-etats-unis-devraient-prendre-pour-proteger-linternet-et-la-securite-de-milliards-de-personnes-en-ligne\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Les deux mesures que les \u00c9tats-Unis devraient prendre pour prot\u00e9ger l&rsquo;Internet et la s\u00e9curit\u00e9 de milliards de personnes en ligne<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2022-11-22T21:48:45+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t22 novembre 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/02\/un-internet-plus-sur-commence-par-plus-de-cryptage\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Un Internet plus s\u00fbr commence par plus de cryptage<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2022-02-08T15:20:52+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t8 f\u00e9vrier 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/01\/le-projet-de-loi-britannique-sur-la-securite-en-ligne-risque-daffaiblir-le-cryptage-et-de-mettre-les-internautes-britanniques-en-danger\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Le projet de loi britannique sur la s\u00e9curit\u00e9 en ligne risque d&rsquo;affaiblir le cryptage et de mettre les internautes britanniques en danger<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2022-01-19T21:38:48+00:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t19 janvier 2022\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t<span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/3\/\">3<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/4\/\">4<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/5\/\">5<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/6\/\">6<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/7\/\">7<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/8\/\">8<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/page\/2\/\">\u00bb<\/a>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Technical Community Resources<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Technical community initiatives that the Internet Society has contributed to or supported.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.internetsociety.org\/blog\/2015\/10\/internet-society-supports-the-lets-encrypt-initiative-to-increase-end-to-end-encryption\/\">Let&rsquo;s Encrypt<\/a>:&nbsp;The Internet Society supports the&nbsp;Let\u2019s Encrypt Initiative, which provides free certificates to websites for Transport Layer Security (TLS) and automates the process, making it easier and cheaper for websites to use TLS.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.iab.org\/documents\/correspondence-reports-documents\/2019-2\/avoiding-unintended-harm-to-internet-infrastructure\/\">IAB Statement: Avoiding Unintended Harm to Internet Infrastructure<\/a>, 4 September 2019<\/li>\n\n\n\n<li><a href=\"https:\/\/www.w3.org\/2001\/tag\/doc\/web-https\">W3C: Securing the Web<\/a>, 22 January 2015<\/li>\n\n\n\n<li><a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/97690\/MIT-CSAIL-TR-2015-026.pdf?sequence=8\">Computer Science and Artificial Intelligence Laboratory&nbsp;Technical Report: Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications<\/a>, 6 July 2015<\/li>\n\n\n\n<li><a href=\"https:\/\/tools.ietf.org\/html\/rfc7258\">IETF 2528:&nbsp; Pervasive Monitoring Is an Attack<\/a>, May 2014<\/li>\n\n\n\n<li><a href=\"https:\/\/www.iab.org\/2014\/11\/14\/iab-statement-on-internet-confidentiality\/\">IAB Statement on Internet Confidentiality<\/a>, 14 November 2014<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Community Highlights<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Activities and initiatives on encryption from our chapters, special interest groups (SIGs) and members around the world.<\/h3>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-9bda4cbc uagb-columns__columns-4 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-4\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-baae9d28 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-neutral-white-color has-text-color has-28-font-size\"><a href=\"https:\/\/www.globalencryption.org\/2021\/06\/brazilian-code-of-criminal-procedure-reform-must-not-undermine-encryption\/\"><span style=\"color:#eff2ec\" class=\"tadv-color\">Brazilian Code of Criminal Procedure reform must not undermine encryption<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">28 June 2021<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-18-font-size\">Four Internet Society chapters sign Global Encryption Coalition open letter urging&nbsp;Brazilian Code of Criminal Procedure reform not to undermine encryption<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-a287ab19 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-neutral-white-color has-text-color has-28-font-size\"><a href=\"https:\/\/www.isoc.org.br\/noticia\/factsheet-criptografia-essencial-para-a-comunidade-lgbtqia\"><span style=\"color:#eff2ec\" class=\"tadv-color\">The Internet Society Brazil Chapter created a fact sheet explaining why encryption is essential for the LGBTQIA+ community<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">16 June 2021<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-fe41e901 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-28-font-size\"><a href=\"https:\/\/isoc.pt\/open-letter\/\"><span style=\"color:#eff2ec\" class=\"tadv-color\">Open Letter to the Portuguese Presidency of the European Union on the Freedom of Use of Encryption<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">14 April 2021<\/p>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-18-font-size\">Signed by 12 European chapters of the Internet Society<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-image uagb-block-c1b5eef6 background-image-fallback-black\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-text-align-center has-neutral-white-color has-text-color has-28-font-size\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/04\/ne-creez-pas-de-failles-dans-notre-bouclier-de-securite-numerique\/\"><span style=\"color:#eff2ec\" class=\"tadv-color\">Don\u2019t Poke Holes in Our Digital Security Shield<\/span><\/a><\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-12-font-size\">13 April 2021<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-text-color has-18-font-size\">Lennart Schulze urged people to tell the EU that their narrative that &lsquo;encryption harms kids&rsquo; isn&rsquo;t correct. Encryption is foundational to security &#8211; and is key to keeping children and youth safe online.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size\">Encryption in the News<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-26-font-size\">Media coverage on encryption.<\/h3>\n\n\n\n    <section class=\"component-theme- component-row row-text-black\">\n    \t<div class=\"component-row-inner pure-g component-alignment-top component-row-standard\">\n            <div class=\"column pure-u-lg-1-1 pure-u-md-1-1 pure-u-sm-1-1 component-theme-default\">\n                <section class=\"component component-feed \" data-component-name=\"Feed\">\n                    <div class=\"content-wrapper align-center\">\n                        <div class=\"feed masonryFeed loadable\" data-author=\"\" data-cat-exclude=\"\" data-tag=\"\" data-order=\"DESC\" data-orderby=\"date\" data-meta=\"\" data-post-count=\"3\" data-taxonomy=\"news_type\" data-region=\"1925\" data-post-parent=\"\" data-event-time=\"past\"data-category=\"40\" data-post-type=\"news\">\n                            <div class=\"grid-sizer\"><\/div>\n                            <div class=\"gutter-sizer\"><\/div><div class=\"feed-item load-item\" data-max-pages=\"2\" data-post-id=\"162791\"><a class=\"feed-link\" href=\"https:\/\/www.developpez.com\/actu\/330186\/Le-gouvernement-UK-a-embauche-une-agence-de-publicite-pour-mobiliser-l-opinion-publique-contre-les-communications-chiffrees-afin-d-empecher-Facebook-de-deployer-le-chiffrement-E2E-sur-Messenger\/\" target=\"_blank\">Developpez.com<\/a><div class=\"logo-wrapper card-color-white\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/01\/Developpez-logo.jpeg\" alt=\"Developpez.com\">\n                                        <\/div><div class=\"feed-item-info row-text-black align-left\">\n                                        <span class=\"eyebrow\">S\u00e9curit\u00e9<\/span>\n                                        <span class=\"eyebrow eyebrow-regular\">17 janvier 2022<\/span>\n                                        <h3 class=\"headline5\">Le gouvernement UK a embauch\u00e9 une agence de publicit\u00e9 pour mobiliser l&rsquo;opinion publique contre les communications chiffr\u00e9es<\/h3><span class=\"eyebrow eyebrow-regular\">Developpez.com<\/span><\/div>\n                                <\/div><div class=\"feed-item load-item\" data-max-pages=\"2\" data-post-id=\"150349\"><a class=\"feed-link\" href=\"https:\/\/www.zdnet.fr\/actualites\/ios-148-apple-publie-une-mise-a-jour-sur-ses-appareils-pour-se-proteger-du-logiciel-espion-de-nso-group-39929077.htm\" target=\"_blank\">ZDNet<\/a><div class=\"logo-wrapper card-color-white\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/03\/ZDNet-Logo.jpg\" alt=\"ZDNet\">\n                                        <\/div><div class=\"feed-item-info row-text-black align-left\">\n                                        <span class=\"eyebrow\">S\u00e9curit\u00e9<\/span>\n                                        <span class=\"eyebrow eyebrow-regular\">14 septembre 2021<\/span>\n                                        <h3 class=\"headline5\">Apple publie une mise \u00e0 jour pour prot\u00e9ger ses appareils du logiciel espion de NSO Group<\/h3><span class=\"eyebrow eyebrow-regular\">ZDNet<\/span><\/div>\n                                <\/div><div class=\"feed-item load-item\" data-max-pages=\"2\" data-post-id=\"144233\"><a class=\"feed-link\" href=\"https:\/\/pressfrom.info\/fr\/actualite\/culture\/-1057161-la-loi-anti-chiffrement-de-l-australie-coute-des-milliards-de-milliards-et-fait-mal-a-notre-reputation-tout-comme-la-legislation-anti-chiffrement-de-l-industrie.html\" target=\"_blank\">PressFrom<\/a><div class=\"logo-wrapper card-color-white\">\n                                        <img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/06\/PressFrom-logo.png\" alt=\"PressFrom\">\n                                        <\/div><div class=\"feed-item-info row-text-black align-left\">\n                                        <span class=\"eyebrow\">Renforcer la confiance<\/span>\n                                        <span class=\"eyebrow eyebrow-regular\">10 juin 2021<\/span>\n                                        <h3 class=\"headline5\">La loi anti-chiffrement de l&rsquo;Australie co\u00fbte des milliards de milliards et fait mal \u00e0 notre r\u00e9putation &#8211; tout comme la l\u00e9gislation anti-chiffrement de l&rsquo;industrie<\/h3><span class=\"eyebrow eyebrow-regular\">PressFrom<\/span><\/div>\n                                <\/div><\/div>\n                                <div class=\"align-center\"><span class=\"button component loadMore\" data-component-name=\"LoadMore\" id=\"loadMore\">T\u00e9l\u00e9charger plus<\/span><\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n    \t\t\t<\/div>\n    \t\t<\/section><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cryptage > Ressources Ressources de Cryptage\u00a0 Le cryptage est un aspect fondamental d\u2019un Internet s\u00fbr et fiable. Il permet de s\u00e9curiser les informations personnelles et est essentiel pour la s\u00e9curit\u00e9 nationale, en prot\u00e9geant la soci\u00e9t\u00e9 contre les terroristes, les criminels et les gouvernements hostiles. Cependant, le cryptage est menac\u00e9. Certaines personnes veulent introduire des failles [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":142915,"parent":171443,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4316,4909],"tags":[],"region_news_regions":[6029],"content_category":[6105],"ppma_author":[4057],"class_list":["post-84842","page","type-page","status-publish","has-post-thumbnail","hentry","category-cryptage","category-renforcer-internet","region_news_regions-mondial","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",1298,800,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-450x277.jpg",450,277,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-768x473.jpg",768,473,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-1024x631.jpg",1024,631,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",1298,800,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",1298,800,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-250x154.jpg",250,154,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",300,185,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",400,247,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/encryption-stickers.jpg",600,370,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Cryptage > Ressources Ressources de Cryptage\u00a0 Le cryptage est un aspect fondamental d\u2019un Internet s\u00fbr et fiable. Il permet de s\u00e9curiser les informations personnelles et est essentiel pour la s\u00e9curit\u00e9 nationale, en prot\u00e9geant la soci\u00e9t\u00e9 contre les terroristes, les criminels et les gouvernements hostiles. Cependant, le cryptage est menac\u00e9. Certaines personnes veulent introduire des failles\u2026","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=84842"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/84842\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/171443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/142915"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=84842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=84842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=84842"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=84842"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=84842"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=84842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}