{"id":106377,"date":"2019-08-23T19:50:07","date_gmt":"2019-08-23T19:50:07","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2019\/08\/dirigeants-du-g7-protegez-le-cryptage-renforce-pour-un-monde-securise\/"},"modified":"2025-11-27T21:05:39","modified_gmt":"2025-11-27T21:05:39","slug":"dirigeants-du-g7-protegez-le-cryptage-renforce-pour-un-monde-securise","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/08\/dirigeants-du-g7-protegez-le-cryptage-renforce-pour-un-monde-securise\/","title":{"rendered":"Dirigeants du G7 : Prot\u00e9gez le cryptage renforc\u00e9 pour un monde s\u00e9curis\u00e9"},"content":{"rendered":"\n<p>Le cryptage\nnous prot\u00e8ge tous les jours. Il aide \u00e0 s\u00e9curiser la navigation sur le Web, les services bancaires en ligne ainsi que\nles services publics essentiels comme l&rsquo;\u00e9lectricit\u00e9, les \u00e9lections, les h\u00f4pitaux, les transports,\net plus encore.<\/p>\n\n\n\n<p>Si\nles pays du G7 sont vraiment d\u00e9termin\u00e9s \u00e0 b\u00e2tir un monde plus s\u00fbr et plus \u00e9quitable,\nil est essentiel de reconna\u00eetre le <a href=\"https:\/\/www.internetsociety.org\/blog\/2019\/04\/leaders-of-the-g7-a-safer-world-means-strong-secure-communication\/\">r\u00f4le\n important<\/a>\nque le chiffrement de bout en bout joue dans la s\u00e9curisation d&rsquo;Internet, de leurs \u00e9conomies et de\nleurs citoyens.<\/p>\n\n\n\n<p>L&rsquo;\nInternet Society et plus de 30 organisations ont sign\u00e9 <a href=\"https:\/\/www.g7openletter.org\/\">une lettre ouverte<\/a> appelant les dirigeants du G7 \u00e0 faire exactement cela &#8211;\ndonner la priorit\u00e9 \u00e0 la s\u00e9curit\u00e9 num\u00e9rique &#8211; et <strong>sans<\/strong> exiger, contraindre ou persuader les fabricants d&rsquo;appareils,\nles fournisseurs d&rsquo;applications et les fournisseurs de services \u00e0 :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>modifier leurs produits ou services ou retarder la correction d&rsquo;un bogue ou d&rsquo;une faille de s\u00e9curit\u00e9 pour fournir un acc\u00e8s exceptionnel au contenu crypt\u00e9 ;<\/li><li>d\u00e9sactiver le \u00ab\u00a0chiffrement par d\u00e9faut\u00a0\u00bb ;<\/li><li>cesser d&rsquo;offrir des services crypt\u00e9s de bout en bout ;<\/li><li>ou autrement compromettre la s\u00e9curit\u00e9 des services crypt\u00e9s.<\/li><\/ul>\n\n\n\n<p>La s\u00e9curit\u00e9\nnum\u00e9rique est le fondement de nos \u00e9conomies et de nos soci\u00e9t\u00e9s connect\u00e9es. Et\nla s\u00e9curit\u00e9 num\u00e9rique repose sur un cryptage fort ! Elle garantit que\nles donn\u00e9es &#8211; qu&rsquo;il s&rsquo;agisse de celles aff\u00e9rentes au respect des lois, aux banques ou aux citoyens ordinaires &#8211; ne peuvent \u00eatre\nconsult\u00e9es que par le destinataire pr\u00e9vu. Toute tentative d&rsquo;insertion d&rsquo;un acc\u00e8s \u00ab exceptionnel \u00bb ou\n\u00ab l\u00e9gal \u00bb \u00e0 un contenu crypt\u00e9 permet \u00e0 d&rsquo;autres personnes,\ny compris des criminels, d&rsquo;y avoir acc\u00e8s. Le faire affaiblit la s\u00e9curit\u00e9 des communications en ligne ainsi que\ncelle de chacun d&rsquo;entre nous.<\/p>\n\n\n\n<p>Nous\npouvons tous faire une diff\u00e9rence au moment de promouvoir un Internet s\u00e9curis\u00e9 !<\/p>\n\n\n\n<p>Si votre organisation s&rsquo;est \u00e9galement engag\u00e9e \u00e0 b\u00e2tir un monde plus s\u00fbr, alors rejoignez cette initiative \u00e0 nos c\u00f4t\u00e9s ! Envoyez-nous un message \u00e0 <a href=\"mailto:g7letter@isoc.org\">g7letter@isoc.org<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le cryptage nous prot\u00e8ge tous les jours. Il aide \u00e0 s\u00e9curiser la navigation sur le Web, les services bancaires en ligne ainsi que les services publics essentiels comme l&rsquo;\u00e9lectricit\u00e9, les \u00e9lections, les h\u00f4pitaux, les transports, et plus encore. Si les pays du G7 sont vraiment d\u00e9termin\u00e9s \u00e0 b\u00e2tir un monde plus s\u00fbr et plus \u00e9quitable, [&hellip;]<\/p>\n","protected":false},"author":1029,"featured_media":104193,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,4316,4909],"tags":[492],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4063,4150],"class_list":["post-106377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-cryptage","category-renforcer-internet","tag-g7","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/g7-letter.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ryan Polk","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/polk\/"},"uagb_comment_info":0,"uagb_excerpt":"Le cryptage nous prot\u00e8ge tous les jours. Il aide \u00e0 s\u00e9curiser la navigation sur le Web, les services bancaires en ligne ainsi que les services publics essentiels comme l&rsquo;\u00e9lectricit\u00e9, les \u00e9lections, les h\u00f4pitaux, les transports, et plus encore. Si les pays du G7 sont vraiment d\u00e9termin\u00e9s \u00e0 b\u00e2tir un monde plus s\u00fbr et plus \u00e9quitable,\u2026","authors":[{"term_id":4063,"user_id":1029,"is_guest":0,"slug":"polk","display_name":"Ryan Polk","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Ryan-Polk.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Ryan-Polk.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""},{"term_id":4150,"user_id":880,"is_guest":0,"slug":"gatto","display_name":"Raquel Gatto","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/c68410ca0584a1d56052a05d1f9890b88c47003817d56ac095d0e5350b940713?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/106377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1029"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=106377"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/106377\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/104193"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=106377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=106377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=106377"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=106377"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=106377"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=106377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}