{"id":149377,"date":"2021-08-16T15:58:59","date_gmt":"2021-08-16T15:58:59","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2021\/08\/la-semaine-des-nouvelles-sur-internet-liran-prevoit-une-interdiction-generale-des-services-internet-internationaux\/"},"modified":"2025-09-09T12:14:03","modified_gmt":"2025-09-09T12:14:03","slug":"la-semaine-des-nouvelles-sur-internet-liran-prevoit-une-interdiction-generale-des-services-internet-internationaux","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2021\/08\/la-semaine-des-nouvelles-sur-internet-liran-prevoit-une-interdiction-generale-des-services-internet-internationaux\/","title":{"rendered":"La semaine des nouvelles sur Internet : L&rsquo;Iran pr\u00e9voit une \u00ab\u00a0interdiction g\u00e9n\u00e9rale\u00a0\u00bb des services Internet internationaux"},"content":{"rendered":"\n<p><strong>Un Internet inaccessible :<\/strong> L&rsquo;Iran avance une proposition de loi \u00ab\u00a0visant \u00e0 restreindre l&rsquo;acc\u00e8s \u00e0 Internet, \u00e0 s&rsquo;immiscer dans la vie priv\u00e9e des utilisateurs, \u00e0 porter atteinte \u00e0 la neutralit\u00e9 du r\u00e9seau et \u00e0 supprimer la libert\u00e9 d&rsquo;expression\u00a0\u00bb, <a href=\"https:\/\/slate.com\/technology\/2021\/08\/iran-protection-bill-internet-censorship.html\">selon Slate.<\/a> Bien que l&rsquo;Iran interdise d\u00e9j\u00e0 des services comme YouTube, Facebook et Twitter, la loi cr\u00e9erait \u00ab\u00a0une interdiction g\u00e9n\u00e9rale\u00a0\u00bb contre tous les services internationaux, \u00e0 moins que ceux-ci n&rsquo;acceptent de collaborer avec l&rsquo;\u00c9tat dans les op\u00e9rations de surveillance et de censure.<\/p>\n\n<p><strong>Photos priv\u00e9es :<\/strong> De nombreux employ\u00e9s d&rsquo;Apple s&rsquo;inqui\u00e8tent du projet de l&rsquo;entreprise d&rsquo;examiner les photos t\u00e9l\u00e9charg\u00e9es sur iCloud \u00e0 partir d&rsquo;appareils Apple bas\u00e9s aux \u00c9tats-Unis pour y trouver des images d&rsquo;exploitation d&rsquo;enfants, <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-apples-child-protection-features-spark-concern-within-its-own-ranks-2021-08-12\/\">rapporte Reuters<\/a>. Certains employ\u00e9s craignent que des gouvernements r\u00e9pressifs n&rsquo;exploitent la technologie d&rsquo;examen d&rsquo;Apple \u00e0 leurs propres fins. D&rsquo;autres craignent qu&rsquo;Apple ne nuise \u00e0 sa r\u00e9putation en mati\u00e8re de protection de la vie priv\u00e9e.<\/p>\n\n<p><strong>Un plus grand choix d&rsquo;applications :<\/strong> Un groupe de s\u00e9nateurs am\u00e9ricains a pr\u00e9sent\u00e9 un projet de loi visant \u00e0 renforcer la concurrence \u00e0 l&rsquo;\u00e9gard de Google et d&rsquo;Apple sur le march\u00e9 des magasins d&rsquo;applications, <a href=\"https:\/\/www.cnbc.com\/2021\/08\/11\/bipartisan-bill-targets-apple-and-googles-ability-to-profit-from-app-stores.html\">rapporte CNBC<\/a>. L&rsquo;Open App Markets Act interdirait, entre autres, \u00e0 Apple et \u00e0 Google d&rsquo;obliger les d\u00e9veloppeurs \u00e0 utiliser leurs syst\u00e8mes de paiement int\u00e9gr\u00e9s aux applications.<\/p>\n\n<p><strong>Restitution du butin :<\/strong> Les pirates qui ont d\u00e9rob\u00e9 pour environ 613 millions de dollars de bitcoins et d&rsquo;Ethereum \u00e0 Poly Network, une plateforme financi\u00e8re d\u00e9centralis\u00e9e, ont restitu\u00e9 environ un tiers des crypto-monnaies, <a href=\"https:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/hackers-crypto-bitcoin-heist-poly-network-b1901986.html\">rapporte The Independent<\/a>. Une personne pr\u00e9tendant \u00eatre l&rsquo;un des pirates a d\u00e9clar\u00e9 qu&rsquo;ils l&rsquo;avaient fait \u00ab\u00a0pour le plaisir\u00a0\u00bb et qu&rsquo;ils voulaient \u00ab\u00a0exposer la vuln\u00e9rabilit\u00e9\u00a0\u00bb avant que d&rsquo;autres puissent l&rsquo;utiliser \u00e0 mauvais escient.<\/p>\n\n<p><strong>R\u00e9duire la fracture :<\/strong> <a href=\"https:\/\/www.theregreview.org\/2021\/08\/11\/schaengold-municipal-broadband-networks-close-digital-divide\/\">Le Regulatory Review<\/a> se penche sur la mani\u00e8re dont les r\u00e9seaux municipaux \u00e0 haut d\u00e9bit fournissent des services dans des zones autrement mal desservies. Si certains projets de r\u00e9seaux municipaux \u00e0 haut d\u00e9bit ont \u00e9chou\u00e9 en raison de leur co\u00fbt \u00e9lev\u00e9, cette option gagne du terrain dans certaines r\u00e9gions des \u00c9tats-Unis. Son projet municipal de haut d\u00e9bit est li\u00e9 \u00e0 la cr\u00e9ation de pr\u00e8s de 10 000 emplois dans la r\u00e9gion et a attir\u00e9 plusieurs entreprises technologiques dans la ville.<\/p>\n\n<h6 class=\"wp-block-heading\"><a href=\"https:\/\/www.internetsociety.org\/tag\/community-networks\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"color:#3a82e4\" class=\"tadv-color\"><span style=\"text-decoration: underline;\"><em>D\u00e9couvrez comment vous pouvez contribuer \u00e0 r\u00e9duire la fracture num\u00e9rique mondiale<\/em><\/span><\/span><\/a><em><span style=\"color:#3a82e4\" class=\"tadv-color\"><span style=\"text-decoration: underline;\">.<\/span><\/span><\/em><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Un Internet inaccessible en Iran. Photos priv\u00e9es. Un plus grand choix d&rsquo;applications. Restitution du butin. R\u00e9duire la fracture. <\/p>\n","protected":false},"author":1331,"featured_media":83570,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[183],"tags":[4252],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4056],"class_list":["post-149377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologie","tag-the-week-in-internet-news-fr","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue.png",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue-300x129.png",300,129,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue-768x330.png",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue-1024x440.png",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue.png",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue.png",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue-250x107.png",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue-600x550.png",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue.png",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue.png",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-blue.png",600,258,false]},"uagb_author_info":{"display_name":"Grant Gross","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/gross\/"},"uagb_comment_info":0,"uagb_excerpt":"Un Internet inaccessible en Iran. Photos priv\u00e9es. Un plus grand choix d'applications. Restitution du butin. R\u00e9duire la fracture.","authors":[{"term_id":4056,"user_id":1331,"is_guest":0,"slug":"gross","display_name":"Grant Gross","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/a7eb5e8d897086f5c66d8a5abe5ba37f7fc9c274b7a0750cf19bb65ba5ad19d7?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/149377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=149377"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/149377\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/83570"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=149377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=149377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=149377"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=149377"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=149377"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=149377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}