{"id":75656,"date":"2018-03-09T15:16:12","date_gmt":"2018-03-09T15:16:12","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/isoc-ch-p%e2%89%a1p-foundation-engaged-collaborative-effort-pretty-easy-privacy-p%e2%89%a1p\/"},"modified":"2025-09-12T12:09:55","modified_gmt":"2025-09-12T12:09:55","slug":"isoc-ch-p%e2%89%a1p-foundation-engaged-collaborative-effort-pretty-easy-privacy-p%e2%89%a1p","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/isoc-ch-p%e2%89%a1p-foundation-engaged-collaborative-effort-pretty-easy-privacy-p%e2%89%a1p\/","title":{"rendered":"Un effort de collaboration pour une vie priv\u00e9e relativement facile (p\u2261p)"},"content":{"rendered":"<p>Depuis les r\u00e9v\u00e9lations de Snowden en 2013 sur la surveillance de masse, le niveau de confiance dans les services Internet a chut\u00e9. Alors que les discussions sur la protection de la vie priv\u00e9e ont consid\u00e9rablement progress\u00e9, peu de progr\u00e8s ont \u00e9t\u00e9 r\u00e9alis\u00e9s dans la conception d&rsquo;outils op\u00e9rationnels qui peuvent \u00eatre utilis\u00e9s quotidiennement par les citoyens du monde. Et cela sans qu&rsquo;il soit n\u00e9cessaire de reconfigurer leurs communications ou de modifier leur comportement en ligne. \u00c0 l&rsquo;Internet Society, nous croyons que les solutions dans ce domaine doivent \u00eatre d\u00e9velopp\u00e9es de mani\u00e8re collaborative et multipartite pour \u00eatre efficaces.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/isoc-ch-p%e2%89%a1p-foundation-engaged-collaborative-effort-pretty-easy-privacy-p%e2%89%a1p\/\">Lire plus en anglais<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En juillet 2017, le Chapitre d&rsquo;Internet Society Switzerland (ISOC-CH) et la fondation suisse p\u2261p se sont associ\u00e9s pour proposer une solution pratique, \u00e0 savoir mettre en \u0153uvre des normes de confidentialit\u00e9 au niveau de base des protocoles Internet et les documenter dans le travail de l&rsquo;Internet Engineering Task Force (IETF), l&rsquo;organisation qui cr\u00e9e des normes pour maintenir et am\u00e9liorer la convivialit\u00e9 et l&rsquo;interop\u00e9rabilit\u00e9 d&rsquo;Internet.<\/p>\n","protected":false},"author":1021,"featured_media":75141,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[5695,4316,4898],"tags":[6042],"region_news_regions":[138],"content_category":[6101],"ppma_author":[4102],"class_list":["post-75656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communaute","category-cryptage","category-strong-internet","tag-chapitres","region_news_regions-europe","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash.jpg",3000,2001,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash-768x512.jpg",768,512,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash.jpg",1536,1025,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash.jpg",2048,1366,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/rishabh-varshney-138805-unsplash.jpg",600,400,false]},"uagb_author_info":{"display_name":"Roxana Radu","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/radu\/"},"uagb_comment_info":0,"uagb_excerpt":"En juillet 2017, le Chapitre d'Internet Society Switzerland (ISOC-CH) et la fondation suisse p\u2261p se sont associ\u00e9s pour proposer une solution pratique, \u00e0 savoir mettre en \u0153uvre des normes de confidentialit\u00e9 au niveau de base des protocoles Internet et les documenter dans le travail de l'Internet Engineering Task Force (IETF), l'organisation qui cr\u00e9e des normes\u2026","authors":[{"term_id":4102,"user_id":1021,"is_guest":0,"slug":"radu","display_name":"Roxana Radu","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/f46ceeeda75a968616e577bbe21b625b5e4531f79748a9a19a416395ee2b8737?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1021"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=75656"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75656\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/75141"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=75656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=75656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=75656"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=75656"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=75656"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=75656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}