{"id":419,"date":"2018-10-18T09:15:00","date_gmt":"2018-10-18T07:15:00","guid":{"rendered":"https:\/\/resistic.fr\/?p=419"},"modified":"2021-01-05T11:09:26","modified_gmt":"2021-01-05T10:09:26","slug":"hiding-from-whom-threat-models-and-in-the-making-encryption-technologies","status":"publish","type":"post","link":"https:\/\/www.resistic.fr\/index.php\/2018\/10\/18\/hiding-from-whom-threat-models-and-in-the-making-encryption-technologies\/","title":{"rendered":"Hiding from Whom? Threat-models and in-the-making encryption technologies"},"content":{"rendered":"\n<p>Suite aux r\u00e9v\u00e9lations d&rsquo;Edward Snowden, le chiffrement de bout-en-bout devient de plus en plus diffus dans les outils de messagerie-solutions qui proposent de cacher ou d\u00e9guiser les communications priv\u00e9es et les activit\u00e9s en ligne. La conception d&rsquo;outils renfor\u00e7ant le droit \u00e0 la vie priv\u00e9e pr\u00e9conise l&rsquo;identification d&rsquo;un \u00ab mod\u00e8le de menace \u00bb, qui sert \u00e0 obtenir un consensus sur le seuil d&rsquo;anonymat et de confidentialit\u00e9 appropri\u00e9 \u00e0 un contexte d&rsquo;usage particulier. On discute diff\u00e9rents cas d&rsquo;usage, de situations \u00e0 bas risque o\u00f9 il n&rsquo;y a \u00ab rien \u00e0 cacher \u00bb \u00e0 des sc\u00e9narios \u00e0 haut risque, de guerre ou d&rsquo;autorit\u00e9 \u00e9tatique, pour nous demander comment les utilisateurs, les consultants en s\u00e9curit\u00e9 et les d\u00e9veloppeurs co-construisent des mod\u00e8les de menace, d\u00e9cident quelles donn\u00e9es dissimuler, et comment. On d\u00e9montre que les oppositions classiques, comme \u00ab haut risque \u00bb versus \u00ab bas risque \u00bb, vie priv\u00e9e versus s\u00e9curit\u00e9, doivent \u00eatre red\u00e9finies dans une approche relationnelle, processuelle et contextuelle.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.erudit.org\/fr\/revues\/im\/2018-n32-im04484\/1058473ar\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lire la suite<\/a><\/p>\n\n\n\n<p>Interm\u00e9dialit\u00e9s : Histoire et th\u00e9orie des arts, des lettres et des techniques \/ History and Theory of the Arts, Literature and Technologies<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Suite aux r\u00e9v\u00e9lations d&rsquo;Edward Snowden, le chiffrement de bout-en-bout devient de plus en plus diffus dans les outils de messagerie-solutions qui proposent de cacher ou d\u00e9guiser les communications priv\u00e9es et les activit\u00e9s en ligne. La conception d&rsquo;outils renfor\u00e7ant le droit \u00e0 la vie priv\u00e9e pr\u00e9conise l&rsquo;identification d&rsquo;un \u00ab mod\u00e8le de menace \u00bb, qui sert \u00e0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-419","post","type-post","status-publish","format-standard","hentry","category-publications"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/posts\/419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":4,"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"predecessor-version":[{"id":455,"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/posts\/419\/revisions\/455"}],"wp:attachment":[{"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.resistic.fr\/index.php\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}