{"id":106767,"date":"2019-10-22T14:59:46","date_gmt":"2019-10-22T14:59:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2019\/10\/la-place-du-cryptage-dans-votre-quotidien\/"},"modified":"2025-11-27T21:05:44","modified_gmt":"2025-11-27T21:05:44","slug":"la-place-du-cryptage-dans-votre-quotidien","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/10\/la-place-du-cryptage-dans-votre-quotidien\/","title":{"rendered":"La place du cryptage dans votre quotidien"},"content":{"rendered":"<h6>\u00c0 quelle fr\u00e9quence utilisez-vous le cryptage ? Bien que l&rsquo;on imagine cette technique sortie tout droit des films d&rsquo;espionnage, vous pourriez \u00eatre surpris d&rsquo;apprendre \u00e0 quel point elle est pr\u00e9sente dans votre quotidien.<\/h6>\n\n\n<p>Encryption is the process of scrambling or enciphering data, and only someone with the key can read or access it. You can use it for things like shopping online, using mobile banking, or using secure messaging apps. So while you may not be smuggling encrypted government secrets across borders, you do rely on it, along with your passwords and settings, to keep your data secure and private.<\/p>\n\n\n\n<p>D\u00e9couvrez toutes les fa\u00e7ons dont vous utilisez le cryptage.<br><br><\/p>\n\n\n<h5>07:21<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-phone-1.jpg\" alt=\"\" class=\"wp-image-106504\"\/><\/figure>\n<\/div>\n\n\n<p>Votre alarme retentit. Vous tendez la main vers votre t\u00e9l\u00e9phone, pr\u00eat \u00e0 lancer la temporisation avant de changer d&rsquo;avis. Vous devez pr\u00e9senter un important projet professionnel aujourd&rsquo;hui et chaque minute compte. Un de vos amis australiens vous a envoy\u00e9 un message d&rsquo;encouragement. C&rsquo;est tr\u00e8s gentil de sa part ! Ce qui est encore plus important : votre ami a utilis\u00e9 une application de messagerie crypt\u00e9e de bout en bout. Bien s\u00fbr, il a fait des \u00e9conomies en ne passant pas d&rsquo;appel international, mais ce petit plus en mati\u00e8re de s\u00e9curit\u00e9 est vraiment appr\u00e9ci\u00e9.<br><\/p>\n\n\n<h5>08:13<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-website-1.jpg\" alt=\"\" class=\"wp-image-106519\"\/><\/figure>\n<\/div>\n\n\n<p>You\u2019re ready to go, but before heading out, you check a news website for the traffic report. There\u2019s a lock icon on the search bar, telling you the site uses HTTPS security, which means it\u2019s harder for anyone to see which articles you\u2019re reading. There\u2019s been a minor accident on your usual route so you decide to take the train.<br><\/p>\n\n\n<h5>09:46<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-credit-card-1.jpg\" alt=\"\" class=\"wp-image-106486\"\/><\/figure>\n<\/div>\n\n\n<p>Le train est bond\u00e9, mais vous arrivez \u00e0 vous asseoir. Vous buvez une gorg\u00e9e du caf\u00e9 que vous avez achet\u00e9 au kiosque qui se trouvait sur le quai. En payant avec votre carte de cr\u00e9dit, vous avez utilis\u00e9 trois points de cryptage : via la puce de la carte de cr\u00e9dit, le lecteur de carte de cr\u00e9dit et pendant que les informations de la carte de cr\u00e9dit \u00e9taient transmises pour autoriser votre achat. Sans que cela ne vous traverse l&rsquo;esprit. Au lieu de cela, vous mettez votre casque Bluetooth et poussez un petit soupir de soulagement \u00e0 l&rsquo;id\u00e9e que personne d&rsquo;autre ne puisse entendre vos affirmations quotidiennes. Il y a une bonne raison \u00e0 cela : parce que vous \u00eates assez dou\u00e9, assez intelligent, et bien entendu gr\u00e2ce au cryptage !<br><\/p>\n\n\n<h5>11:24<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-videoconference-1.jpg\" alt=\"\" class=\"wp-image-106516\"\/><\/figure>\n<\/div>\n\n\n<p>Before you can even settle into your desk at work, you log in to your email account to check on one last thing you need for today&rsquo;s important presentation. There\u2019s no news, so you hop onto a videoconference call with a colleagues across the country to try to get an update. The call is secured by end-to-end encryption, so it is a lot harder for anyone to listen to your conversation as the data travels from your computer to your colleagues&rsquo;. <\/p>\n\n\n<h5>15:14<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-phone-pay-1.jpg\" alt=\"\" class=\"wp-image-106501\"\/><\/figure>\n<\/div>\n\n\n<p>You did it! The presentation went well and now you\u2019re ready for a break. You\u2019re about halfway through that double bacon chili cheeseburger when the pain starts. You use all of your drugstore rewards points to buy heartburn medicine, and make a mental note to eat better. Lucky for you, the store encrypts this information. Hackers can\u2019t easily access your purchase history, so your dietary choices can be your secret.<\/p>\n\n\n<h5>16:39<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-fitness-tracker-1.jpg\" alt=\"\" class=\"wp-image-106495\"\/><\/figure>\n<\/div>\n\n\n<p>At the end of your work day you glance down at your fitness tracker and see that you&rsquo;ve walked 8,000 steps. Good job! It almost makes that lunch worth it. Because there\u2019s secure communication between your tracker and its app, you know your health information will stay secure from anyone hacking the free public WiFi you use in the train station. Now you touch your secure pre-paid pass to the gate at the train station to head home. You were annoyed a few months before when the transit authority updated their pass system, but the new system uses cryptography to help ensure that someone cannot pass their card off as your own \u2013 and charge your account. <\/p>\n\n\n<h5>17:44<\/h5>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/encryption-digital-assistant-1.jpg\" alt=\"\" class=\"wp-image-106489\"\/><\/figure>\n<\/div>\n\n\n<p>You stop at the grocery store to pick up dinner. Since you\u2019re out of cash, you use an app on your smart phone to pay. Each time you make a payment this way, the transaction data is secured using encryption. You spent the exact cost of a deep-dish Buffalo-wing pizza, but your future cardiologist doesn\u2019t need to know that. (It comes with celery sticks. You\u2019re already making healthy choices!)<\/p>\n\n\n\n<p>As soon as you\u2019re home, you beckon your personal digital assistant to turn on the lights. You settle into the couch with dinner and turn on your smart TV to watch your favorite Hallmark movie. You have a weak spot for stories about successful women who return home for the holidays only to fall in love with their childhood sweethearts. Because your WiFi is encrypted, your film snob neighbor never has to know.<\/p>\n\n\n<h6>Maintenant que vous avez d\u00e9couvert \u00e0 quel point le cryptage vous accompagne au quotidien et assure la s\u00e9curit\u00e9 de vos donn\u00e9es, votre mission, si vous choisissez de l&rsquo;accepter, est de contribuer \u00e0 sa protection.<\/h6>\n<p><a href=\"https:\/\/www.internetsociety.org\/fr\/issues\/encryption\/protect-encryption-protect-yourself\/\">Prenez ces six mesures pour prot\u00e9ger le cryptage et assurer votre propre protection.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00c0 quelle fr\u00e9quence utilisez-vous le cryptage ? Bien que l&rsquo;on imagine cette technique sortie tout droit des films d&rsquo;espionnage, vous pourriez \u00eatre surpris d&rsquo;apprendre \u00e0 quel point elle est pr\u00e9sente dans votre quotidien. Encryption is the process of scrambling or enciphering data, and only someone with the key can read or access it. You can [&hellip;]<\/p>\n","protected":false},"author":1029,"featured_media":106343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[185,4316,4909,4775],"tags":[],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4063,4040],"class_list":["post-106767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confiance","category-cryptage","category-renforcer-internet","category-securite-fr","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/your-day-with-encryption.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ryan Polk","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/polk\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00c0 quelle fr\u00e9quence utilisez-vous le cryptage ? Bien que l&rsquo;on imagine cette technique sortie tout droit des films d&rsquo;espionnage, vous pourriez \u00eatre surpris d&rsquo;apprendre \u00e0 quel point elle est pr\u00e9sente dans votre quotidien. Encryption is the process of scrambling or enciphering data, and only someone with the key can read or access it. You can\u2026","authors":[{"term_id":4063,"user_id":1029,"is_guest":0,"slug":"polk","display_name":"Ryan Polk","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Ryan-Polk.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Ryan-Polk.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""},{"term_id":4040,"user_id":15,"is_guest":0,"slug":"froncek","display_name":"April Froncek","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/106767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1029"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=106767"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/106767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/106343"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=106767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=106767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=106767"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=106767"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=106767"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=106767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}