{"id":13972,"date":"2026-05-06T15:20:39","date_gmt":"2026-05-06T15:20:39","guid":{"rendered":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/"},"modified":"2026-05-06T15:20:39","modified_gmt":"2026-05-06T15:20:39","slug":"chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe","status":"publish","type":"post","link":"https:\/\/viqtor.eu\/en\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/","title":{"rendered":"Encryption and backdoors: from technical constraints to societal challenges"},"content":{"rendered":"<p><strong>Legal Watch No. 64 \u2013 October 2023. <\/strong><\/p>\n<h3><strong><u>Encryption and backdoors: from technical constraints to societal challenges.<\/u><\/strong><\/h3>\n<p>Current events in France echo the current debate that is stirring Europe, namely, the access by law enforcement to the content of encrypted messaging.<\/p>\n<p>The Minister of the Interior, commenting on the radio on the recent attack at the Arras high school, expressed on October 22nd the wish that a backdoor be integrated into end-to-end encrypted messaging systems, which would allow bypassing the encryption of messages and accessing their content.<\/p>\n<p>According to the minister, this technique is a more effective alternative to current solutions, which involve intelligence services hacking into the suspect&#039;s phone to install, for example, spyware.<\/p>\n<p>This practice, strictly regulated by law, had failed during the surveillance of the terrorist who carried out the attack.<\/p>\n<p>There is much talk these days of &quot;client side scanning&quot;, a technique different from that of intercepting messages (&quot;man in the middle&quot; - HDM).<\/p>\n<p>An expert speaking at a seminar organized on the subject by the European data protection supervisor on October 23 described these techniques as follows: the &quot;man in the middle&quot; intercepts messages during their transmission, while &quot;client side scanning&quot; consists, figuratively speaking, of reading over the individual&#039;s shoulder while they are writing \u2013 before encryption \u2013 to compare their message to the content of an objectionable database.<\/p>\n<p>This is a form of content moderation, carried out on the user&#039;s terminal.<\/p>\n<p>Two initiatives aimed at using customer-side scanning systematically are currently the subject of much reaction in Brussels and London, due to their intrusive nature.<\/p>\n<p>At the European level, it is the CSAM regulation proposal that is attracting the most criticism.<\/p>\n<p>The text aims to combat online child pornography by detecting the dissemination of illegal content.<\/p>\n<p>While there is consensus on the paramount importance of this objective, many stakeholders question the effectiveness, necessity, and proportionality of the proposed measures.<\/p>\n<p>Serious concerns have been expressed by EU data protection authorities, experts from European institutions, as well as child protection organizations, academics, cybersecurity experts and survivors of child sexual abuse.<\/p>\n<p>Besides the risk of overwhelming law enforcement with false positives, its critics fear a step too far towards a society where each of us will live in a feeling of constant surveillance.<\/p>\n<p>For more than a hundred leading researchers in this field, it is finally technically impossible to implement content scanning without weakening end-to-end encryption and infringing on user privacy.<\/p>\n<p>Many experts agree that current cutting-edge technological solutions are not reliable enough and are also vulnerable to cyberattacks.<\/p>\n<p>This is also the conclusion reached by Apple, which announced this summer that it was abandoning its algorithm project, and by Meredith Whittaker, president of the Signal messaging service: &quot;If the police can get in, so can hackers, hostile countries, Putin, the Iranian government, and anyone who wants to do harm (...). It is therefore essential that we maintain the security and integrity of these systems.&quot;<\/p>\n<p>In this respect, the British government seemed to have softened its stance regarding its new law, enacted on October 26, on online safety (\u201cOnline Safety Bill\u201d).<\/p>\n<p>The ministers did not, however, remove the controversial monitoring clause, but made its implementation conditional on its technical feasibility.<\/p>\n<p>The UK&#039;s technology regulator (Ofcom) retains the power to require technology companies to develop scanning software in line with evolving technology.<\/p>\n<p>If this technology becomes available, it remains to be seen how the balance between the repressive objectives of the authorities and the privacy of individuals will be assessed.<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/france_1773139850044.jpg\" alt=\"\" width=\"145\" height=\"97\"><\/p>\n<ul style=\"list-style-type: square;\">\n<li>On October 12, the CNIL imposed a fine of 600,000 euros on the CANAL+ GROUP.<\/li>\n<\/ul>\n<p>The fine relates in particular to breaches of the obligation to provide information, the exercise of rights by the persons concerned, security issues concerning the passwords of the company&#039;s employees, subcontracting, and the fact that the company did not notify the CNIL of a serious breach of personal data that occurred in 2020.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The CNIL is organizing an ethical reflection event on November 28th entitled &quot;AI and free will: are we digital sheep?<\/li>\n<\/ul>\n<p>Researchers, experts and visual artists will exchange views on major ethical questions concerning the influence of artificial intelligence on individual choices.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>Also on the subject of AI, the CNIL published on October 11 practical guides on the creation of training databases for AI systems.<\/li>\n<\/ul>\n<p>These fact sheets aim to help professionals reconcile innovation with respect for individual rights. They are open for public consultation until November 16, 2023.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The NGO noyb filed three complaints in France on September 14 against Fnac, the real estate app SeLoger and the fitness app MyFitnessPal.<\/li>\n<\/ul>\n<p>These companies&#039; applications would illegally access users&#039; personal data and share it with third parties for sophisticated analysis purposes as soon as the application is opened, without having informed or obtained the consent of the individuals concerned.<\/p>\n<p>The NGO plans to file further complaints against mobile application companies.<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/Europe_1773139907122.jpg\" alt=\"\" width=\"145\" height=\"97\"><\/strong><\/p>\n<h4><strong><em>European institutions and bodies<\/em><\/strong><\/h4>\n<ul style=\"list-style-type: square;\">\n<li>After launching an investigation into X&#039;s compliance with the Digital Services Regulation (DSA) on October 12, the European Commission is also looking at Meta and TikTok.<\/li>\n<\/ul>\n<p>Social media companies have reportedly received formal requests for information on their handling of illegal content and disinformation since the start of the war between Israel and Hamas.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>Some criticize the European Commission for not respecting its own rules regarding micro-targeting on social networks.<\/li>\n<\/ul>\n<p>Today, she is accused by the press, NGOs and European parliamentarians of having targeted certain profiles of internet users in her communication to audiences located in countries skeptical of her proposed regulation on child pornography (CSAM).<\/p>\n<ul style=\"list-style-type: square;\">\n<li>In September 2023, the European Commission published two model contractual clauses for AI that can be used on a voluntary basis in AI public procurement, for processing with or without high risks.<\/li>\n<\/ul>\n<p>The clauses are aimed at public bodies wishing to acquire an AI system developed by an external supplier.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The European Data Protection Supervisor (EDPS) published recommendations on October 23 for EU co-legislators for the trilogues concerning the AI regulation.<\/li>\n<\/ul>\n<p>In particular, it supports the inclusion in the regulation of the right of persons affected by the use of AI systems to lodge a complaint with a competent authority and to benefit from an effective judicial remedy against its decisions.<\/p>\n<p>He further reiterates his call for the designation of data protection authorities as national supervisory authorities.<\/p>\n<p>He also supports the need for a European approach, particularly in cross-border cases with a significant impact, and the proposal to establish a &quot;European AI office&quot; put forward by the European Parliament.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The EDPS also issued an opinion on October 11 on two proposed guidelines relating to AI liability rules.<\/li>\n<li>The European Data Protection Board (EDPB) and the EDPS adopted on September 19 a joint opinion on the proposal for a regulation on additional procedural rules for the application of the GDPR.<\/li>\n<\/ul>\n<p>This proposal aims to ensure the implementation of swift corrective measures for individuals in cross-border cases.<\/p>\n<p>The EDPB and EDPS call for a comprehensive harmonisation of admissibility requirements, suggest improving consensus-building through greater involvement of the relevant supervisory authorities and invite the co-legislators to maintain the current approach to the right of parties to be heard in the dispute resolution process.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The EDPB and the EDPS issued a joint opinion on October 17 on the proposal for a regulation relating to the digital euro.<\/li>\n<\/ul>\n<p>Regulators particularly approve of maintaining a choice for users to pay in digital euros or in cash.<\/p>\n<p>They nevertheless make several observations, in order to ensure that only the necessary personal data is processed, in particular in the context of the fight against fraud, and to avoid excessive centralization of personal data by the European Central Bank or national central banks.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>During its October plenary session, the EDPB chose the theme for its third coordinated GDPR implementation action: how companies implement individuals&#039; right of access.<\/li>\n<\/ul>\n<p>This action is planned for 2024 and will be subject to targeted monitoring at national and European levels.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>On October 31, the Norwegian Data Protection Authority (DPA) issued a statement indicating that its decision against Meta would be extended to the EU\/EEA.<\/li>\n<\/ul>\n<p>The press release states that the EDPB has just approved the permanent extension of the Norwegian ban on behavioral marketing on Facebook and Instagram to the whole of Europe.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>Following the revelations and the European Parliament&#039;s investigation into the Pegasus spyware, a report by Amnesty International and the European Investigative Collaborations (EIC) examines the Predator case and highlights the EU&#039;s inability to regulate the abuse of spyware on its own territory.<\/li>\n<\/ul>\n<p>The report focuses on a group called Intellexa Alliance, based in Europe, which &quot;developed, operated and marketed&quot; a &quot;suite of monitoring products&quot; between 2007 and 2022.&nbsp;<\/p>\n<p>These products make it possible to send silent infection attempts to users of cooperating internet service providers, or across an entire country if the spyware operator has direct access to internet traffic.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>On September 6, representatives of the European pharmaceutical industry (EPFIA) opposed the introduction of an opt-out mechanism for the collection of health data for secondary use in the proposed regulation on the future European Health Data Space (EHDS).<\/li>\n<\/ul>\n<p>The group&#039;s position reflects the concerns of researchers and technology designers, who fear that introducing opt-out into the system will compromise the use of data for research and innovation.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>In a press release dated September 5, 2023, TikTok announced it is strengthening the data protection of its European users.<\/li>\n<\/ul>\n<p>The company is planning two new data centers in Europe in addition to the one in Dublin.<\/p>\n<p>TikTok has also hired a third-party European security company to conduct an independent audit of its data processing.<\/p>\n<p><strong><em>&nbsp;<\/em><\/strong><\/p>\n<h4><strong><em>News from European member countries.<\/em><\/strong><\/h4>\n<ul style=\"list-style-type: square;\">\n<li>The Belgian Data Protection Authority (APD) published a checklist on October 20 to help organizations ensure that their practices regarding cookies and other tracking mechanisms comply with current regulations.<\/li>\n<\/ul>\n<p>The document allows you to go through good and bad practices step by step.<\/p>\n<p>The APD reminds us that only strictly necessary cookies are exempt from consent, and that all other categories of cookies can only be placed and read if the user has given prior, free, specific, informed, unambiguous and active consent.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The Amsterdam District Court adopted an important decision on October 18 in summary proceedings concerning AdTech and tracking cookies.<\/li>\n<\/ul>\n<p>The French company Criteo cannot simply invoke the contractual obligation of its clients (website publishers) to obtain the consent of internet users: it is also responsible for obtaining valid consent for the placement of cookies, failing which (and in the absence of consent obtained by the publisher) the placement of cookies is illegal.<\/p>\n<p>The decision is based on the Rome II Convention (jurisdiction of the Court), the &quot;ePrivacy&quot; Directive and the GDPR.<\/p>\n<p>The court recognizes the CNIL&#039;s decision and rejects Criteo&#039;s defense that the plaintiff had not configured his browser to reject cookies.<\/p>\n<p>It also rejects the argument that the plaintiff&#039;s demands would harm its business model, considering that the plaintiff&#039;s privacy interests prevail.<\/p>\n<p>The court further applies the judgment of the Court of Justice in the \u00d6sterreichische Post case (C-154\/21) by ruling that Criteo must provide a complete overview of the third parties with whom the data has been shared.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The Greek Data Protection Authority (DPA) has fined the Athens Urban Transport Organisation (OASA) 50,000 euros for breaching Article 5(1)(e) of the GDPR because its electronic ticketing system did not comply with the principle of storage limitation.<\/li>\n<\/ul>\n<p>She further reprimanded the OASA for breaching Article 35(1) of the GDPR, as its data protection impact assessment for its electronic ticketing system was insufficient.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The Swedish Data Protection Authority (APD) has fined the Stockholm City Education Board 800,000 Swedish kronor (approximately 68,324 euros) for using surveillance cameras in a school in violation of Article 5(1)(a), (c), Article 6(1) and Article 13 of the GDPR.<\/li>\n<li>The Italian Data Protection Authority (APD) has fined an Italian bar association 20,000 euros for publishing information on its website about two complainants without a legitimate legal basis, in accordance with the combined provisions of Article 10 of the GDPR and Article 2octies of the Italian Privacy Code.<\/li>\n<li>The Croatian Data Protection Authority (APD) has imposed its highest administrative fine ever, amounting to 5,470,000 euros, on EOS Matrix doo, a debt collection agency, for multiple violations of the GDPR.<\/li>\n<li>In the UK, Clearview AI won its appeal against the UK Data Protection Authority (DPA) fine before the First Tier Tribunal (FTT).<\/li>\n<\/ul>\n<p>The court held that the &quot;UK GDPR&quot; did not apply, arguing that Clearview&#039;s processing activities involved performing a service on behalf of law enforcement agencies located in a third country, outside the scope of the GDPR and the &quot;UK GDPR&quot;.<\/p>\n<p>The court further considers Clearview and its clients as joint controllers of the processing for this repressive purpose.<\/p>\n<p>The court&#039;s reasoning has sparked much discussion among data protection experts regarding the qualification of joint controllers and the non-application of European and\/or British law to the specific case.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>In early October, Snap&#039;s AI chatbot attracted the attention of the ICO.<\/li>\n<\/ul>\n<p>The APD announced that it had issued a preliminary enforcement notice against Snap for what it describes as &quot;a potential failure to properly assess the privacy risks posed by its chatbot &#039;My AI&#039;&quot;.<\/p>\n<p>A growing number of data protection authorities, like those in the UK and Italy, are assuming the responsibilities of AI regulators.<\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2614166247_1773140080190.jpg\" alt=\"\" width=\"150\" height=\"85\"><\/p>\n<ul style=\"list-style-type: square;\">\n<li>The Global Privacy Assembly (GPA) held its annual conference in mid-October in Bermuda.<\/li>\n<\/ul>\n<p>The authorities debated the application of privacy regulations to AI, and on October 20 adopted a resolution concerning generative AI.<\/p>\n<p>The resolution comes as G7 leaders adopted on October 30 international guiding principles on artificial intelligence (AI) and a voluntary code of conduct for AI developers as part of the Hiroshima process on AI.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The United States is also publishing an AI decree and an AI risk management manual on October 30, while the United Kingdom is organizing an AI security summit on November 2.<\/li>\n<li>The New Zealand Privacy Commissioner&#039;s office has published a guide on developing and using artificial intelligence systems in compliance with Privacy Principles (PPP).<\/li>\n<li>Canada also published a code of conduct in September for developers and managers of advanced generative AI systems.<\/li>\n<\/ul>\n<p>The code identifies measures to be implemented to mitigate the risks associated with these systems, based on six fundamental principles: responsibility, security, justice\/fairness, transparency, human supervision, validity\/robustness of systems.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>United States: Attorneys general from 41 US states have joined forces to file a lawsuit against Meta, claiming that its social media platforms Instagram and Facebook are addictive and harmful to children.<\/li>\n<\/ul>\n<p>The lawsuit accuses Meta of repeatedly and systematically collecting information on children under 13 and of failing to inform or obtain parental consent regarding its use.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>California published a bill on October 12, 2023 regulating data brokers that amends the existing 2018 law (CCPA).<\/li>\n<\/ul>\n<p>The text stipulates that data brokers must register with the privacy agency and provide it with more detailed information regarding individual requests, the collection of certain information, and the mandatory audit of their compliance with the law.<\/p>\n<p>The project also creates a mechanism allowing individuals to request that all data brokers delete personal information about them.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The genetic testing service 23andMe has suffered a data breach.<\/li>\n<\/ul>\n<p>A hacker published the genetic information of four million users on the cybercrime forum BreachForums.<\/p>\n<p>This incident follows another leak that occurred at the beginning of October.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>In the United Arab Emirates, the Ministry of Artificial Intelligence, Digital Economy and Teleworking Applications publishes a white paper entitled &quot;Self-Governance Framework for a Responsible Metaverse&quot;.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Legal Watch No. 64 \u2013 October 2023. Encryption and backdoors: from technical constraints to societal challenges. Recent events in France echo the current debate in Europe concerning law enforcement access to the content of encrypted messaging services. The Minister of the Interior, commenting on the radio on the recent attack at the Arras high school, [\u2026]<\/p>","protected":false},"author":1,"featured_media":13968,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[],"class_list":["post-13972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-juridique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor<\/title>\n<meta name=\"description\" content=\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/viqtor.eu\/en\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor\" \/>\n<meta property=\"og:description\" content=\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor\" \/>\n<meta property=\"og:url\" content=\"https:\/\/viqtor.eu\/en\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\" \/>\n<meta property=\"og:site_name\" content=\"Viqtor\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-06T15:20:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/04\/widget-viqtor.png\" \/>\n<meta name=\"author\" content=\"Bruno\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\"},\"author\":{\"name\":\"Bruno\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad\"},\"headline\":\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9\",\"datePublished\":\"2026-05-06T15:20:39+00:00\",\"dateModified\":\"2026-05-06T15:20:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\"},\"wordCount\":3383,\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg\",\"articleSection\":[\"Veille juridique\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\",\"url\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\",\"name\":\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg\",\"datePublished\":\"2026-05-06T15:20:39+00:00\",\"dateModified\":\"2026-05-06T15:20:39+00:00\",\"description\":\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor\",\"breadcrumb\":{\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/viqtor.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/viqtor.eu\/#website\",\"url\":\"https:\/\/viqtor.eu\/\",\"name\":\"Viqtor\",\"description\":\"Faites du RGPD une opportunit\u00e9 pour votre entreprise.\",\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/viqtor.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/viqtor.eu\/#organization\",\"name\":\"viqtor.eu\",\"url\":\"https:\/\/viqtor.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"width\":108,\"height\":86,\"caption\":\"viqtor.eu\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad\",\"name\":\"Bruno\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g\",\"caption\":\"Bruno\"},\"sameAs\":[\"https:\/\/exciting-panini.13-37-234-21.plesk.page\"],\"url\":\"https:\/\/viqtor.eu\/en\/author\/mouad_zxum2ebi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor","description":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/viqtor.eu\/en\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/","og_locale":"en_US","og_type":"article","og_title":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor","og_description":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor","og_url":"https:\/\/viqtor.eu\/en\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/","og_site_name":"Viqtor","article_published_time":"2026-05-06T15:20:39+00:00","og_image":[{"url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/04\/widget-viqtor.png"}],"author":"Bruno","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#article","isPartOf":{"@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/"},"author":{"name":"Bruno","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad"},"headline":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9","datePublished":"2026-05-06T15:20:39+00:00","dateModified":"2026-05-06T15:20:39+00:00","mainEntityOfPage":{"@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/"},"wordCount":3383,"publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"image":{"@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage"},"thumbnailUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg","articleSection":["Veille juridique"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/","url":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/","name":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor","isPartOf":{"@id":"https:\/\/viqtor.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage"},"image":{"@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage"},"thumbnailUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg","datePublished":"2026-05-06T15:20:39+00:00","dateModified":"2026-05-06T15:20:39+00:00","description":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9 - Viqtor","breadcrumb":{"@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#primaryimage","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2563879841_1773140290155.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/viqtor.eu\/chiffrement-et-portes-derobees-des-contraintes-techniques-aux-enjeux-de-societe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/viqtor.eu\/"},{"@type":"ListItem","position":2,"name":"Chiffrement et portes d\u00e9rob\u00e9es : des contraintes techniques aux enjeux de soci\u00e9t\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/viqtor.eu\/#website","url":"https:\/\/viqtor.eu\/","name":"Viqtor","description":"Faites du RGPD une opportunit\u00e9 pour votre entreprise.","publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/viqtor.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/viqtor.eu\/#organization","name":"viqtor.eu","url":"https:\/\/viqtor.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","width":108,"height":86,"caption":"viqtor.eu"},"image":{"@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad","name":"Bruno","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g","caption":"Bruno"},"sameAs":["https:\/\/exciting-panini.13-37-234-21.plesk.page"],"url":"https:\/\/viqtor.eu\/en\/author\/mouad_zxum2ebi\/"}]}},"_links":{"self":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts\/13972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/comments?post=13972"}],"version-history":[{"count":0,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts\/13972\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media\/13968"}],"wp:attachment":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media?parent=13972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/categories?post=13972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/tags?post=13972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}