{"id":20762,"date":"2025-08-21T16:09:49","date_gmt":"2025-08-21T15:09:49","guid":{"rendered":"https:\/\/www.revue3emillenaire.com\/blog\/?p=20762"},"modified":"2025-08-21T16:09:49","modified_gmt":"2025-08-21T15:09:49","slug":"comment-creer-un-internet-sans-censure-par-dr-r-p","status":"publish","type":"post","link":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/","title":{"rendered":"Comment cr\u00e9er un Internet sans censure ? par Dr R P"},"content":{"rendered":"<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Les inscriptions aux VPN <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/x.com\/ProtonVPN\/status\/1948773319148245334\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ont grimp\u00e9 en fl\u00e8che<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> le mois dernier, certains fournisseurs enregistrant des hausses de 1 400 % et les VPN pour mobiles occupant les <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.techradar.com\/vpn\/vpn-services\/vpn-apps-are-topping-uk-app-stores-right-now-heres-why\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">premi\u00e8res places<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> dans les boutiques d\u2019applications, le public britannique ayant manifest\u00e9 son m\u00e9pris pour le nouveau r\u00e9gime de censure d\u2019Internet du gouvernement britannique. Bien que la loi sur la s\u00e9curit\u00e9 en ligne ait \u00e9t\u00e9 vot\u00e9e par le gouvernement <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.youtube.com\/watch?v=r5Tp89hTiVQ\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">pr\u00e9c\u00e9dent<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, cens\u00e9 \u00eatre conservateur, le principal sympt\u00f4me de cette loi est apparu en juillet. Les entreprises de m\u00e9dias sociaux ont commenc\u00e9 \u00e0 classer par \u00e2ge divers contenus, dont la plupart sont <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.spiked-online.com\/2025\/08\/01\/five-things-we-cant-post-about-thanks-to-the-online-safety-act\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">tout \u00e0 fait inoffensifs ou d\u2019une importance politique significative<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, ce qui constitue un dangereux <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.eff.org\/deeplinks\/2025\/04\/digital-identities-and-future-age-verification-europe\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">pr\u00e9curseur<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> potentiel d\u2019un syst\u00e8me d\u2019identification num\u00e9rique. Rappelons que le gouvernement actuel m\u00e8ne une <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/togetherdeclaration.org\/digital-id-how-to-respond-to-parliamentary-inquiry\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">consultation<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sur l\u2019<\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/bigbrotherwatch.org.uk\/campaigns\/no2digitalid\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">identification num\u00e9rique<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, dont la date limite est fix\u00e9e au 21 ao\u00fbt. Les Britanniques, ne voulant rien savoir, se sont empress\u00e9s d\u2019acheter des VPN.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Les ministres travaillistes ont condamn\u00e9 l\u2019utilisation des VPN <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">tout en les r\u00e9clamant dans leurs notes de frais.<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> Pour \u00eatre clair, alors que les VPN d\u2019entreprise et d\u2019organisation utilisent exactement la m\u00eame technologie sous-jacente que les services anti-censure, le fait que le secr\u00e9taire d\u2019\u00c9tat aux Affaires Jonathon Reynolds ait r\u00e9clam\u00e9 NordVPN montre qu\u2019il achetait un service \u2014 <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.youtube.com\/watch?v=8MHBMdTBlok\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">beaucoup d\u2019autres<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sont \u00e9galement disponibles \u2014 qui permet aux utilisateurs de contourner la censure et d\u2019\u00e9viter la surveillance par les FAI (fournisseurs d\u2019acc\u00e8s \u00e0 Internet). Son utilisation des VPN ne s\u2019est donc pas limit\u00e9e \u00e0 l\u2019utilisation d\u2019un VPN h\u00e9berg\u00e9 par le gouvernement pour acc\u00e9der \u00e0 des ressources officielles <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00e0 distance<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, comme s\u2019il <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">se trouvait<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> dans un bureau.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Aussi hypocrite que soit l\u2019utilisation par les apologistes de la surveillance des outils qu\u2019ils souhaitent <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.theregister.com\/2025\/08\/08\/opinion_column_osa\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">refuser \u00e0<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> tout le monde, je ne peux reprocher \u00e0 personne de vouloir garder ses propres affaires priv\u00e9es. Le besoin de vie priv\u00e9e et d\u2019anonymat a rarement \u00e9t\u00e9 aussi fort. Apr\u00e8s tout, lorsqu\u2019on commente des questions politiques et qu\u2019on utilise des mots comme \u00ab armes \u00e9l\u00e9gantes pour une \u00e9poque plus civilis\u00e9e \u00bb, il y a toutes les raisons de chercher \u00e0 se cacher sous des pseudonymes et des connexions crypt\u00e9es afin d\u2019emp\u00eacher les gouvernements d\u2019utiliser des <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.eugyppius.com\/p\/tweedle-dum-tweedle-dee-and-tweedle\" target=\"_blank\" rel=\"noopener\">armes <\/a><a href=\"https:\/\/www.nationalreview.com\/2025\/02\/free-speech-is-good-actually\/\" target=\"_blank\" rel=\"noopener\">r\u00e9elles<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> \u00ab maladroites et al\u00e9atoires \u00bb \u2014 des b\u00e2tons, des pierres et des os bris\u00e9s \u2014 <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.telegraph.co.uk\/news\/2024\/01\/05\/china-hong-kong-oppression-jimmy-lai-british-jailed\/\" target=\"_blank\" rel=\"noopener\">en <\/a><a href=\"https:\/\/www.skynews.com.au\/australia-news\/it-was-horrible-pregnant-mother-arrested-during-covid-reveals-the-huge-strain-her-two-year-legal-battle-had-on-her-and-her-family\/news-story\/906882a5b7f901ff8cf24f12c5593837\" target=\"_blank\" rel=\"noopener\">r\u00e9ponse <\/a><a href=\"https:\/\/www.telegraph.co.uk\/news\/2025\/04\/01\/police-chief-defends-arrest-whatsapp-school-row-parents\/\" target=\"_blank\" rel=\"noopener\">\u00e0 la <\/a><a href=\"https:\/\/www.telegraph.co.uk\/news\/2024\/10\/28\/canada-free-speech-online-harms-thought-police\/\" target=\"_blank\" rel=\"noopener\">critique<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Il convient donc de se demander pourquoi la loi sur la s\u00e9curit\u00e9 en ligne (<\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Online Safety Act) <\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">peut avoir un effet aussi perturbateur. On peut certainement affirmer qu\u2019elle n\u2019aurait pas pu le faire pour les versions ant\u00e9rieures de l\u2019internet. C\u2019est peut-\u00eatre parce qu\u2019une grande partie de l\u2019internet est r\u00e9duite \u00e0 \u00ab <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.citationneeded.news\/we-can-have-a-different-web\/#reference-1\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">cinq sites web g\u00e9ants<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.eff.org\/deeplinks\/2023\/04\/platforms-decay-lets-put-users-first\" target=\"_blank\" rel=\"noopener\">chacun rempli de captures d\u2019\u00e9cran des quatre autres<\/a> \u00bb<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, que le d\u00e9cret gouvernemental a pu avoir cet effet. <\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Nombreux sont ceux qui consid\u00e8rent les VPN comme une solution magique \u00e0 cette censure, mais tout ce que fait un VPN, c\u2019est fournir un tunnel d\u2019un pays censur\u00e9 vers un pays libre. Un VPN cesse d\u2019\u00eatre utile s\u2019il n\u2019y a plus de pays libres. La situation est grave au <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/nationalpost.com\/opinion\/jordan-peterson-online-harms\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Canada<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, en <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/x.com\/shellenberger\/status\/1859479459897966742\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Australie<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, en <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/thecritic.co.uk\/irelands-assault-on-encryption-should-concern-us-all\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Irlande<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, en <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/reclaimthenet.org\/france-encryption-backdoor-law-narcotrafic-surveillance\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">France<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, au <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/reclaimthenet.org\/danish-justice-minister-under-fire-for-pushing-encryption-ban-while-using-it\" target=\"_blank\" rel=\"noopener\">Danemark <\/a><a href=\"https:\/\/mullvad.net\/en\/blog\/2023\/2\/1\/eu-chat-control-law-will-ban-open-source-operating-systems\/\" target=\"_blank\" rel=\"noopener\">et dans <\/a><a href=\"https:\/\/dailysceptic.org\/2025\/08\/05\/eu-revives-plan-to-ban-private-messaging\/\">l<\/a>\u2019<a href=\"https:\/\/reclaimthenet.org\/telegram-encryption-backdoors-eu-privacy-pavel-durov\" target=\"_blank\" rel=\"noopener\">UE<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/reclaimthenet.org\/proton-threatens-to-leave-switzerland-over-surveillance-law-expansion\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">La Suisse<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> est quelque peu menac\u00e9e, et des menaces contre la libert\u00e9 d\u2019Internet sont m\u00eame prof\u00e9r\u00e9es par des gouvernements qui sont des phares du bon sens pand\u00e9mique, comme la <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.globalencryption.org\/2025\/04\/joint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Su\u00e8de<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/reclaimthenet.org\/kids-online-safety-act-senate-push-digital-id-privacy-risks\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Les \u00c9tats-Unis<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> pourraient \u00e9galement \u00eatre menac\u00e9s. M\u00eame s\u2019il existe encore des pays libres, les VPN ne r\u00e9solvent pas tout. Beaucoup trop de m\u00e9gasites web monopolistiques, agac\u00e9s par le fait que les VPN pourraient les priver d\u2019informations de suivi qu\u2019ils pourraient vendre \u00e0 des annonceurs, servent d\u00e9j\u00e0 des versions plus limit\u00e9es du site aux utilisateurs qui le visitent \u00e0 partir d\u2019adresses IP VPN connues. Les services <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">de r\u00e9seaux <\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">sociaux refusent souvent de cr\u00e9er de nouveaux comptes pour les <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.icir.org\/vern\/papers\/tor-differential.NDSS16.pdf\" target=\"_blank\" rel=\"noopener\">utilisateurs qui se rendent sur leur site <\/a><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417245\" target=\"_blank\" rel=\"noopener\">via un VPN ou un n\u0153ud de sortie Tor<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, ou exigent une v\u00e9rification par SMS via un num\u00e9ro de t\u00e9l\u00e9phone qu\u2019ils peuvent reconna\u00eetre gr\u00e2ce au pr\u00e9fixe + (+44 pour le Royaume-Uni, par exemple) comme \u00e9tant celui de l\u2019emplacement physique de l\u2019utilisateur, et non de l\u2019emplacement de son VPN.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">L\u2019internet a \u00e9t\u00e9 cr\u00e9\u00e9 \u00e0 l\u2019origine pour \u00e9viter les <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.theregister.com\/2021\/08\/11\/decentralized_internet\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">points de d\u00e9faillance uniques<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> \u2014 il \u00e9tait d\u00e9centralis\u00e9 de par conception. Aujourd\u2019hui, <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.applogicnetworks.com\/blog\/netflix-vs.-google-vs.-amazon-vs.-facebook-vs.-microsoft-vs.-apple-traffic-share-of-internet-brands-global-internet-phenomena-spotlight\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">43 % du trafic<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> passe par des services web d\u00e9tenus par six entreprises seulement et l\u2019exp\u00e9rience internet de certaines personnes se r\u00e9sume \u00e0 ce que les <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">de r\u00e9seaux <\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">sociaux <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/dailysceptic.org\/2024\/10\/17\/forget-about-reading-books-teenagers-arent-even-bothering-with-the-internet-anymore\/\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">leur proposent<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. La t\u00e2che du censeur ne consiste plus \u00e0 essayer de cibler des centaines de milliers de petits sites, mais simplement \u00e0 <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.telegraph.co.uk\/world-news\/2023\/09\/12\/biden-social-media-meta-first-amendment-violation-covid\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">appeler<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> une grande plateforme pour exiger le retrait d\u2019un contenu jug\u00e9 suspect. Les premiers \u00ab cypherpunks \u00bb de l\u2019internet auraient eu du mal \u00e0 imaginer qu\u2019un syst\u00e8me con\u00e7u pour \u00eatre aussi d\u00e9centralis\u00e9 \u2014 bien que le <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/siliconfolklore.com\/internet-history\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">mythe<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> veuille que la motivation de cette conception visait sp\u00e9cifiquement \u00e0 assurer sa survie en cas de guerre nucl\u00e9aire \u2014 finirait par \u00eatre d\u00e9coup\u00e9 en territoires d\u2019un petit nombre <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">de corporations<\/span><\/span><\/span><\/span> <span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">gigantesques<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Parmi les autres victimes de la loi sur la s\u00e9curit\u00e9 en ligne figurent les <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.spiked-online.com\/2025\/04\/04\/how-the-online-safety-act-shut-down-a-hamster-forum\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">forums<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> britanniques. Nombre d\u2019entre eux se sont sentis suffisamment menac\u00e9s par les lourdes exigences de la loi pour fermer leurs portes plut\u00f4t que de risquer des amendes monumentales. J\u2019esp\u00e8re sinc\u00e8rement qu\u2019ils ont conserv\u00e9 des copies de sauvegarde des messages historiques, car, comme le disait le professeur de Maureen O\u2019Hara dans le drame de la Seconde Guerre mondiale sur la vie sous l\u2019occupation <\/span><\/span><\/span><em><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><i>This Land is Mine<\/i><\/span><\/span><\/span><\/em><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, les pages que les censeurs exigent d\u2019arracher des manuels scolaires seront un jour recoll\u00e9es.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">La menace de la loi est cr\u00e9dible pour les propri\u00e9taires de forums, car l\u2019architecture actuelle de l\u2019internet ne permet pratiquement pas de dissimuler la propri\u00e9t\u00e9 des sites web. Naviguer anonymement sur l\u2019internet est assez facile \u2014 les VPN et le r\u00e9seau Tor existent \u2014 mais g\u00e9rer anonymement un site web est difficile. Les sites web ont besoin de noms de domaine, des identit\u00e9s plus m\u00e9morables que les adresses IP des serveurs et qui, contrairement <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00e0 ces derni\u00e8res<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">non sujettes \u00e0 des changements<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> \u00e0 tout moment. Le simple fait d\u2019avoir un nom de domaine met l\u2019utilisateur \u00e0 la merci des bureaux d\u2019enregistrement, dont certains <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">tenteront de r\u00e9sister aux<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> tentatives des gouvernements de supprimer un domaine, mais dont peu s\u2019opposeront \u00e0 une d\u00e9cision de justice<\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> dans le pays o\u00f9 ils sont \u00e9tablis<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. Ceux <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">qui le feraient pourraient \u00eatre \u00e9cras\u00e9s<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> par un gouvernement qui passant \u00e0 l\u2019\u00e9tape suivante de la cha\u00eene et mena\u00e7ant plut\u00f4t <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">l\u2019organisme gestionnaire<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> du domaine de premier niveau <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">dont d\u00e9pendait ce registraire r\u00e9calcitrant<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. L\u2019h\u00e9bergement d\u2019un site est \u00e9galement n\u00e9cessaire ; pour ce faire, il faut soit payer un service commercial \u2014 l\u00e0 encore un point de pression \u2014 pour h\u00e9berger un site, soit d\u00e9dier son propre ordinateur \u00e0 l\u2019h\u00e9bergement, et donc le maintenir sous tension, le mettre \u00e0 jour en toute s\u00e9curit\u00e9 et le connecter \u00e0 l\u2019internet \u00e0 tout moment, sauf <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00e0 accepter <\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">que son site web soit mis hors ligne.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Nous <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">arrivons donc \u00e0<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> Tor. D\u00e9velopp\u00e9 \u00e0 l\u2019origine par le laboratoire de recherche naval des \u00c9tats-Unis pour permettre aux agents am\u00e9ricains \u00e0 l\u2019\u00e9tranger d\u2019envoyer des messages \u00e0 leur base, il a \u00e9t\u00e9 mis en libre acc\u00e8s pour permettre aux agents am\u00e9ricains de se cacher dans une botte de foin d\u2019<\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/2019.www.torproject.org\/about\/torusers.html.en\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">utilisateurs civils<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. Les organisations m\u00e9diatiques <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/spy2.296\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">alarmistes<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> ont tent\u00e9 de pr\u00e9tendre que les utilisateurs de VPN seraient attir\u00e9s par le dark-web, mais Tor et les VPN \u00e9tant des technologies diff\u00e9rentes, m\u00eame au sein de Tor, la grande majorit\u00e9 (93,3 % \u00e0 96,6 %) des donn\u00e9es qui circulent sur le r\u00e9seau proviennent de personnes qui utilisent Tor comme une voie anonyme \u2014 <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">en pratique<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> un VPN dans <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">l\u2019usage sinon dans la technique<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> \u2014 vers des sites web ordinaires du clear-web. <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/blog.torproject.org\/some-statistics-about-onions\/\" target=\"_blank\" rel=\"noopener\">Seuls 3,4 % <\/a><a href=\"https:\/\/www.sciencealert.com\/only-a-small-fraction-of-the-dark-web-is-being-used-for-hidden-activity-study-finds\" target=\"_blank\" rel=\"noopener\">\u00e0 6,7 %<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> des utilisateurs de Tor acc\u00e8dent au dark web des services cach\u00e9s <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">en domaines onion<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. C\u2019est sur ce dark web que les marchands de peur affirment que les criminels r\u00e9sident, et qu\u2019il existe des sites web onion criminels. Mais en r\u00e9alit\u00e9, la majeure partie du dark web est \u00e0 peine navigable, et les sites qui pr\u00e9tendent offrir des biens ou des services ill\u00e9gaux <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ne se contentent pas d\u2019encaisser un paiement en cryptomonnaie avant de dispara\u00eetre<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. Le concept technique des services onion est toutefois int\u00e9ressant.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Contrairement \u00e0 l\u2019internet, les services onion sont con\u00e7us pour masquer l\u2019identit\u00e9 du serveur et permettre aux visiteurs d\u2019\u00eatre anonymes. Cet anonymat n\u2019est pas parfait ; des services onion ont \u00e9t\u00e9 d\u00e9sanonymis\u00e9s en \u00e9tablissant une corr\u00e9lation entre, par exemple, le moment o\u00f9 un site onion donn\u00e9 \u00e9tait hors service et les coupures de courant ou d\u2019internet, m\u00eame br\u00e8ves, survenues dans les zones g\u00e9ographiques o\u00f9 le serveur du service pouvait se trouver. La plupart des sites web onion ferm\u00e9s de cette mani\u00e8re \u00e9taient des services ignobles qui m\u00e9ritaient d\u2019\u00eatre mis hors ligne, mais, comme cela peut leur arriver, il est aussi techniquement possible que des services moralement <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">irr\u00e9prochables<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> soient suivis et ferm\u00e9s de la m\u00eame mani\u00e8re. Les domaines \u00ab onion \u00bb ne sont pas un moyen infaillible de g\u00e9rer anonymement un site web <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">insensible \u00e0 la censure<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> ; il suffit de demander \u00e0 Ross Ulbricht, emprisonn\u00e9 en 2015 et r\u00e9cemment <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/reclaimthenet.org\/trump-pardons-ross-ulbricht-silk-road-founder\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">graci\u00e9 par Trump<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. Donald Trump, bien s\u00fbr, tarde \u00e0 tenir la <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.kennedy24.com\/snowden-petition\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">promesse de<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> son alli\u00e9 R.F. Kennedy Jr. de gracier <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.youtube.com\/watch?v=-Ez99EG7oKQ\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Edward Snowden<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, qui le m\u00e9ritait davantage.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">L\u2019autre grand d\u00e9faut des domaines onion est qu\u2019ils n\u00e9cessitent des comp\u00e9tences techniques pour y acc\u00e9der \u2014 pas beaucoup, mais suffisamment pour que les personnes qui n\u2019ont connu les ordinateurs que sous forme de tablettes et de t\u00e9l\u00e9phones, sans m\u00eame une v\u00e9ritable structure (<\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">arborescence) <\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">de dossiers, puissent avoir du mal \u00e0 installer Tor et \u00e0 v\u00e9rifier sa signature num\u00e9rique. Cela signifie que tout domaine onion \u2014 qui est \u00e9galement tr\u00e8s difficile \u00e0 promouvoir, car il n\u2019est pas accessible par les moteurs de recherche \u2014 touchera un public beaucoup plus restreint qu\u2019une page web ordinaire. Les domaines onion sont \u00e9galement beaucoup plus difficiles \u00e0 mettre en place que la facilit\u00e9 avec laquelle les gens, inconscients du pr\u00e9judice qu\u2019ils causent \u00e0 leur vie priv\u00e9e, peuvent se connecter \u00e0 un site web de <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">r\u00e9seau<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> social et taper fr\u00e9n\u00e9tiquement leurs <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00e9lucubrations<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> spontan\u00e9es pour que le monde entier puisse les voir.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00c0 quoi ressemblerait alors l\u2019internet parfait<\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, \u00e0 l\u2019\u00e9preuve de la censure<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> ? Je n\u2019ai pas toutes les r\u00e9ponses, mais je peux mettre en \u00e9vidence trois probl\u00e8mes cl\u00e9s, parmi de nombreux autres, qu\u2019il faudrait surmonter.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"padding-left: 80px;\" align=\"justify\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>Comment faire fonctionner un r\u00e9seau sans d\u00e9pendre <\/b><\/span><\/span><\/span><\/strong><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>de corporations<\/b><\/span><\/span><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b> centralis\u00e9es pour l\u2019architecture physique ? <\/b><\/span><\/span><\/span><\/strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Depuis ses premi\u00e8res incarnations, l\u2019internet d\u00e9pend, pour la couche physique, du mat\u00e9riel d\u2019autres personnes, et cela allait bien jusqu\u2019\u00e0 ce que les <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">compagnies<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> de t\u00e9l\u00e9communications deviennent la cible de <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/dailysceptic.org\/2024\/12\/11\/chinas-spying-shows-its-time-to-close-the-backdoors-in-our-technology\/\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">pressions de la part de l\u2019\u00c9tat<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. Les technologies \u00e9voqu\u00e9es jusqu\u2019\u00e0 pr\u00e9sent \u2014 VPN, Tor, services onion \u2014 sont toutes con\u00e7ues pour contourner ce probl\u00e8me fondamental ; la cryptographie permet d\u2019accomplir beaucoup de choses en d\u00e9pit d\u2019une couche physique centralis\u00e9e et compromise. Mais les gouvernements, dans leurs efforts pour <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.telegraph.co.uk\/news\/2025\/07\/26\/the-online-safety-act-is-an-assault-on-freedom\/\">r\u00e9primer<\/a><a href=\"https:\/\/www.telegraph.co.uk\/news\/2025\/07\/26\/the-online-safety-act-is-an-assault-on-freedom\/\" target=\"_blank\" rel=\"noopener\"> la<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> dissidence, progressent aujourd\u2019hui sur tant de fronts qu\u2019une refonte de la couche physique \u2014 en vue de prendre une longueur d\u2019avance telle que les censeurs ne puissent jamais la rattraper \u2014 semble \u00eatre le seul espoir \u00e0 long terme.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">La difficult\u00e9 <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">est qu\u2019un r\u00e9seau v\u00e9ritablement pair-\u00e0-pair au niveau<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> physique aura besoin d\u2019une tr\u00e8s grande largeur de bande. Le spectre radio est, h\u00e9las, une ressource limit\u00e9e, et m\u00eame si <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">beaucoup en Grande-Bretagne<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> seraient heureux de voir l\u2019autoritaire Ofcom supprim\u00e9, le <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Radio_spectrum\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">r\u00f4le<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> central initial <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Radio_spectrum\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">de<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> cette <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.spiked-online.com\/2023\/10\/01\/the-tyranny-of-ofcom\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">organisation<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> doit toujours \u00eatre rempli d\u2019une mani\u00e8re ou d\u2019une autre. <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Partager le spectre sans qu\u2019un monopole n\u2019en prenne le contr\u00f4le<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> peut-\u00eatre l\u2019une des rares choses qu\u2019un march\u00e9 libre ne peut pas r\u00e9soudre \u00e0 lui seul. La solution consiste \u00e0 \u00e9viter tout partage du spectre ; l\u2019<\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.theregister.co.uk\/2020\/05\/01\/space_networking\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">utilisation de<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> relais <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.theregister.com\/2024\/10\/07\/netflix_on_mars_sure_thanks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">optiques<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> ou infrarouges <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.modulatedlight.org\/Modulated_Light_DX\/OpticalComms4Amateur79.html\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">en ligne de vis\u00e9e directe<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> permet d\u2019\u00e9viter qu\u2019une liaison de communication n\u2019interf\u00e8re avec une autre. Et si une <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">en ligne de vis\u00e9e<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> directe peut \u00eatre temporairement perturb\u00e9e par tout ce qui croise le chemin, elle rend presque impossible un brouillage g\u00e9n\u00e9ralis\u00e9 de la part d\u2019un adversaire. Une s\u00e9rie de liaisons reliant, par exemple, des sommets montagneux, pourrait transf\u00e9rer des donn\u00e9es sans effort par-dessus les cl\u00f4tures des fronti\u00e8res terrestres d\u2019un pays fortement censur\u00e9. Les principales questions non r\u00e9solues pour la conception de ce type de couche physique sont celles de la r\u00e9silience, de la mani\u00e8re dont un \u00e9quivalent du <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.cloudflare.com\/en-gb\/learning\/security\/glossary\/what-is-bgp\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">protocole Border Gateway<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> guiderait le trafic \u00e0 travers le r\u00e9seau physique sans avoir besoin de parties centralis\u00e9es de confiance, et de la mani\u00e8re de cacher et donc de prot\u00e9ger les n\u0153uds contre les manipulations des brutes de la censure. La mani\u00e8re d\u2019exploiter les <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/www.explainxkcd.com\/wiki\/index.php\/2166:_Stack\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">couches<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sup\u00e9rieures <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.explainxkcd.com\/wiki\/index.php\/2166:_Stack\" target=\"_blank\" rel=\"noopener\">de la <\/a><a href=\"https:\/\/www.cloudflare.com\/en-gb\/learning\/ddos\/glossary\/open-systems-interconnection-model-osi\/\" target=\"_blank\" rel=\"noopener\">pile OSI<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> fonctionnant sur ce r\u00e9seau est un probl\u00e8me r\u00e9solu ; aucun nouveau travail sur le cryptage, par exemple, n\u2019est n\u00e9cessaire. Le cryptage qui fonctionne d\u00e9j\u00e0 sur un r\u00e9seau actuel centralis\u00e9 et compromis fonctionnerait sur un r\u00e9seau optique pair-\u00e0-pair.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"padding-left: 80px;\" align=\"justify\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>Comment <\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>s\u2019<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>assurer que les gens p<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>uiss<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>ent <\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>toujours<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b> faire confiance aux sites web pour agir honn\u00eatement alors que l\u2019architecture m\u00eame de l\u2019internet parfait rendrait leurs identit\u00e9s intra\u00e7ables par des moyens techniques ?<\/b><\/span><\/span><\/span><\/strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> Comme je l\u2019ai fait remarquer plus haut, le dark-web est un endroit bien trop attrayant pour que quelqu\u2019un accepte des paiements pour des services qu\u2019il ne fourni<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ra<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> jamais. Il s\u2019agit \u00e9videmment d\u2019un sympt\u00f4me des paiements en cryptomonnaies \u2014 impossibles <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00e0 rembourser<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> par conception \u2014 et pas seulement des adresses web anonym<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">is\u00e9<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">es. Mais, comme les <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/reclaimthenet.org\/trump-order-banks-political-debanking-excludes-payment-processors\" target=\"_blank\" rel=\"noopener\">processeurs de cartes <\/a><a href=\"https:\/\/reclaimthenet.org\/credit-card-censorship-steam-valve-visa-mastercard\" target=\"_blank\" rel=\"noopener\">se sont engag\u00e9s dans <\/a><a href=\"https:\/\/www.theepochtimes.com\/the-paypal-fiasco-was-no-accident_4786458.html\" target=\"_blank\" rel=\"noopener\">la <\/a><a href=\"https:\/\/www.telegraph.co.uk\/news\/2022\/09\/22\/paypals-censorship-marks-vicious-new-phase-war-free-speech\/\" target=\"_blank\" rel=\"noopener\">censure<\/a><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, le r\u00e9seau parfait aurait probablement besoin d\u2019une m\u00e9thode de paiement encore inimaginable, ne pr\u00e9sentant ni la centralisation des infrastructures existantes ni le potentiel d\u2019escroquerie des cryptomonnaies. Il faudrait un moyen par lequel les utilisateurs pourraient exiger un remboursement en cas d\u2019<\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">arnaque<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, mais aucun moyen par lequel les autorit\u00e9s pourraient bloquer les paiements. <\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Les mod\u00e8les de type \u00ab Fediverse \u00bb fond\u00e9s sur la r\u00e9putation de la communaut\u00e9 peuvent \u00e9chouer lorsque <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/news.ycombinator.com\/item?id=28495086\" target=\"_blank\" rel=\"noopener\">des collectifs <\/a><a href=\"https:\/\/discuss.privacyguides.net\/t\/the-fosstodon-drama-tells-us-a-bigger-problem-about-mastodon\/27152\" target=\"_blank\" rel=\"noopener\">cens<\/a><\/span><\/span><\/span><\/span><a href=\"https:\/\/discuss.privacyguides.net\/t\/the-fosstodon-drama-tells-us-a-bigger-problem-about-mastodon\/27152\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">e<\/span><\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">urs<\/span><\/span><\/span><\/span><\/a><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> d\u2019individus <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">z\u00e9l\u00e9s imposent leur poids<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">. Les mod\u00e8les bas\u00e9s sur les micropaiements, ador\u00e9s par de nombreux adeptes des cryptomonnaies du Web 3.0 qui semblent croire qu\u2019ils peuvent \u00eatre appliqu\u00e9s \u00e0 tout, ressemblent davantage \u00e0 des opportunit\u00e9s de profit <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">parasitaire<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> qu\u2019\u00e0 des moyens fonctionnels de <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">faire tourner<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> un syst\u00e8me.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Il est d\u00e9j\u00e0 risqu\u00e9<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> que, si la simple navigation et les <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">r\u00e9seaux<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sociaux pouv<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ai<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ent migrer loin des plateformes o\u00f9 les fanatiques de la censure en ligne d\u00e9guis\u00e9e en s\u00e9curit\u00e9 d\u00e9tiennent le pouvoir, le commerce en ligne aurait beaucoup plus de mal \u00e0 fonctionner dans un monde o\u00f9 tout le monde a besoin de VPN et de couches d\u2019anonymat pour \u00e9viter d\u2019\u00eatre victime d\u2019un syst\u00e8me de cr\u00e9dit social. Tous ceux qui pensent que <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/dailysceptic.org\/2025\/08\/03\/everything-is-just-fine\/\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">tout va bien<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> parce qu\u2019ils p<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ar<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">v<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ienn<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ent <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">\u00e0 <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">contourner un blocage sur un article ou une vid\u00e9o devraient se demander si leur contournement serait aussi fiable s\u2019ils voulaient commander un irritant type de vis m\u00e9canique et non m\u00e9trique aupr\u00e8s du seul vendeur qui <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">l\u2019offrait,<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> mais qui a<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">vait<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> r\u00e9cemment \u00e9t\u00e9 contraint de mettre en place des contr\u00f4les d\u2019identit\u00e9 num\u00e9riques pour chaque achat.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Notez que dans cette question, j\u2019ai parl\u00e9 d\u2019intra\u00e7abilit\u00e9 par des moyens techniques : une entreprise l\u00e9gitime qui exploite un site web aurait certainement une <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">v\u00e9ritable <\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">adresse <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">postale<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sur son site. Une partie de cette question devient donc un probl\u00e8me r\u00e9solu. Il existe des signatures num\u00e9riques bas\u00e9es sur PGP\/GnuPG qui permettent de prouver, en l\u2019absence d\u2019une puissance de calcul quantique s\u00e9rieuse, que seule la personne qui conna\u00eet un mot de passe secret particulier peut \u00eatre celle qui a sign\u00e9 un \u00e9l\u00e9ment de contenu avec ce mot de passe. Nous disposons donc d\u00e9j\u00e0 des moyens permettant \u00e0 une personne ou \u00e0 une organisation <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">de<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> confiance de prouver qu\u2019un service est le sien et non celui d\u2019un imposteur, pour autant que la signature que vous v\u00e9rifiez ait \u00e9t\u00e9 d\u00e9livr\u00e9e au pr\u00e9alable par un canal v\u00e9rifiable, comme un panneau \u00e0 l\u2019ext\u00e9rieur de son bureau, de son magasin ou de son entrep\u00f4t.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"padding-left: 80px;\" align=\"justify\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>Comment de nouveaux services sur un r\u00e9seau parfait p<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>ourrai<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>ent-ils se d\u00e9velopper et concurrencer les services existants ?<\/b><\/span><\/span><\/span><\/strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> Pour les services plus traditionnels, c\u2019est un peu plus <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">simpl<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">e : si vous g\u00e9rez un site web journalistique publiant des articles, alors si les gens savent qu\u2019il existe, ils viendront l\u00e0 o\u00f9 vous l\u2019h\u00e9bergez, tant que c\u2019est assez facile \u00e0 faire. Mais pour les services jouant un r\u00f4le similaire \u00e0 celui des <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">r\u00e9seaux<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sociaux, c\u2019est beaucoup plus difficile. L\u2019attrait d\u2019un service de <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">r\u00e9seaux<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sociaux pour chaque nouvel utilisateur est proportionnel \u2014 d\u2019accord, probablement de mani\u00e8re non lin\u00e9aire, mais toujours monotone \u2014 au nombre d\u2019utilisateurs d\u00e9j\u00e0 pr\u00e9sents. Comment un nouveau service peut-il \u00eatre comp\u00e9titif sur un type de march\u00e9 o\u00f9 les grands acteurs existants jouissent d\u2019un avantage bien \u00e9tabli, voire monopolistique ?<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">La logique de ce probl\u00e8me renvoie \u00e9galement au premier de ces trois probl\u00e8mes difficiles : il n\u2019<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">est<\/span><\/span><\/span> <span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">pas <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">suffi<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">san<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">t de conce<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">voir<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> l\u2019architecture physique. Il faut qu\u2019<\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/xkcd.com\/927\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">une architecture de couche physique sp\u00e9cifique<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> soit suffisamment adopt\u00e9e, de peur qu\u2019elle ne disparaisse comme l\u2019ont fait tant de projets concurrents de protection de la vie priv\u00e9e \u00e0 code source ouvert <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">(open source) <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">qui n\u2019ont pas r\u00e9ussi \u00e0 attirer suffisamment d\u2019utilisateurs pour devenir autonomes. Un outil permettant de crypter sym\u00e9triquement des fichiers locaux reste un outil fonctionnel m\u00eame si une seule personne le souhaite ; une infrastructure de r\u00e9seau ne fonctionne que si un grand nombre de personnes l\u2019utilisent.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Bien entendu, outre ces \u00ab <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/xkcd.com\/1831\/\" target=\"_blank\" rel=\"noopener\">probl\u00e8mes difficiles<\/a> \u00bb<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> d\u2019<\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/xkcd.com\/1831\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">ordre<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> technique, les efforts d\u00e9ploy\u00e9s pour d\u00e9fendre la libert\u00e9 d\u2019expression par tous les moyens <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/petition.parliament.uk\/petitions\/722903\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">politiques<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> et <\/span><\/span><\/span><span style=\"color: #000080;\"><a href=\"https:\/\/freespeechunion.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">juridiques<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> sont \u00e9galement essentiels, et le soutien \u00e0 ces efforts est plus fort que jamais. De nombreuses personnes consid\u00e9raient auparavant la censure comme une menace lointaine \u00e0 l\u2019horizon ; avec ce dernier exemple d\u2019<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">abus<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> gouvernement<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">al<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">, la censure est descendue des montagnes et <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">s\u2019est impos\u00e9e <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">bien trop clairement<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> aux portes. Le public n\u2019est pas content et, pour paraphraser un s\u00e9nateur romain, son attitude est devenue \u00ab <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><i><a href=\"https:\/\/en.wikipedia.org\/wiki\/Carthago_delenda_est\" target=\"_blank\" rel=\"noopener\">Censorship Delenda Est<\/a> \u00bb<\/i><\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> ! <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">(La censure doit \u00eatre abolie)<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b>Derni\u00e8re minute<\/b><\/span><\/span><\/span><\/strong><strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><b> : <\/b><\/span><\/span><\/span><\/strong><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">Lord Sumption, ancien juge de la Cour supr\u00eame et opposant de principe aux exc\u00e8s <\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">li\u00e9s au<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"> Covid, a <\/span><\/span><\/span><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/www.telegraph.co.uk\/politics\/2025\/08\/07\/labour-wrong-to-give-16-year-olds-vote-former-supreme-court\/\" target=\"_blank\" rel=\"noopener\">condamn\u00e9 l<\/a>\u2019<\/span><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">absurdit\u00e9 de restreindre l\u2019utilisation d\u2019Internet pour les moins de 18 ans tout en accordant le droit de vote aux jeunes de 16 et 17 ans. Pour l\u2019instant, il n\u2019a pas \u00ab d\u2019objection \u00e0 [la loi sur la s\u00e9curit\u00e9 en ligne] en elle-m\u00eame \u00bb, mais, tout comme il s\u2019est oppos\u00e9 aux passeports vaccinaux lorsqu\u2019il a constat\u00e9 leur port\u00e9e, je suis s\u00fbr qu\u2019il finira par se rendre compte de l\u2019invasion flagrante de la libert\u00e9 et de la vie priv\u00e9e de la population en g\u00e9n\u00e9ral que constitue cette loi.<\/span><\/span><\/span><\/p>\n<p class=\"western\" align=\"justify\"><em><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><i>Le Dr R P a obtenu un doctorat en robotique pendant la p\u00e9riode de surr\u00e9action mondiale <\/i><\/span><\/span><\/span><\/em><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">face au<\/span><\/span><\/span><\/span><em><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><i> Covid. Il passe son temps avec un \u0153il sur un oscilloscope, une main sur un fer \u00e0 souder et une oreille \u00e0 l\u2019aff\u00fbt des derni\u00e8res mauvaises nouvelles.<\/i><\/span><\/span><\/span><\/em><\/p>\n<p class=\"western\" align=\"justify\"><em><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\"><i>Texte original publi\u00e9 le <\/i><\/span><\/span><\/span><\/em><span style=\"color: #000080;\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">16 ao\u00fbt 2025\u00a0: <\/span><\/span><\/span><\/span><span style=\"color: #000080;\"><u><a href=\"https:\/\/dailysceptic.org\/2025\/08\/16\/the-online-safety-act-exposes-how-fragile-our-overly-centralised-internet-really-is\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #000000;\"><span style=\"font-family: Inhirit, serif;\"><span style=\"font-size: medium;\">https:\/\/dailysceptic.org\/2025\/08\/16\/the-online-safety-act-exposes-how-fragile-our-overly-centralised-internet-really-is\/<\/span><\/span><\/span><\/a><\/u><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aussi hypocrite que soit l\u2019utilisation par les apologistes de la surveillance des outils qu\u2019ils souhaitent refuser \u00e0 tout le monde, je ne peux reprocher \u00e0 personne de vouloir garder ses propres affaires priv\u00e9es. Le besoin de vie priv\u00e9e et d\u2019anonymat a rarement \u00e9t\u00e9 aussi fort. Apr\u00e8s tout, lorsqu\u2019on commente des questions politiques et qu\u2019on utilise des mots comme \u00ab armes \u00e9l\u00e9gantes pour une \u00e9poque plus civilis\u00e9e \u00bb, il y a toutes les raisons de chercher \u00e0 se cacher sous des pseudonymes et des connexions crypt\u00e9es afin d\u2019emp\u00eacher les gouvernements d\u2019utiliser des armes r\u00e9elles \u00ab maladroites et al\u00e9atoires \u00bb \u2014 des b\u00e2tons, des pierres et des os bris\u00e9s \u2014 en r\u00e9ponse \u00e0 la critique.<\/p>\n","protected":false},"author":2,"featured_media":20158,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1540],"tags":[1570,1120,2026,2021,1972],"class_list":["post-20762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","tag-censure","tag-independance","tag-internet","tag-reseaux-sociaux","tag-surveillance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment cr\u00e9er un Internet sans censure ? par Dr R P - 3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment cr\u00e9er un Internet sans censure ? par Dr R P - 3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation\" \/>\n<meta property=\"og:description\" content=\"Aussi hypocrite que soit l\u2019utilisation par les apologistes de la surveillance des outils qu\u2019ils souhaitent refuser \u00e0 tout le monde, je ne peux reprocher \u00e0 personne de vouloir garder ses propres affaires priv\u00e9es. Le besoin de vie priv\u00e9e et d\u2019anonymat a rarement \u00e9t\u00e9 aussi fort. Apr\u00e8s tout, lorsqu\u2019on commente des questions politiques et qu\u2019on utilise des mots comme \u00ab armes \u00e9l\u00e9gantes pour une \u00e9poque plus civilis\u00e9e \u00bb, il y a toutes les raisons de chercher \u00e0 se cacher sous des pseudonymes et des connexions crypt\u00e9es afin d\u2019emp\u00eacher les gouvernements d\u2019utiliser des armes r\u00e9elles \u00ab maladroites et al\u00e9atoires \u00bb \u2014 des b\u00e2tons, des pierres et des os bris\u00e9s \u2014 en r\u00e9ponse \u00e0 la critique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\" \/>\n<meta property=\"og:site_name\" content=\"3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T15:09:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"812\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"3e mill\u00e9naire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"3e mill\u00e9naire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\"},\"author\":{\"name\":\"3e mill\u00e9naire\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/#\/schema\/person\/b692dacff720a5344a6190bc714397eb\"},\"headline\":\"Comment cr\u00e9er un Internet sans censure ? par Dr R P\",\"datePublished\":\"2025-08-21T15:09:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\"},\"wordCount\":3491,\"image\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg\",\"keywords\":[\"Censure\",\"Ind\u00e9pendance\",\"Internet\",\"R\u00e9seaux Sociaux\",\"Surveillance\"],\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\",\"url\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\",\"name\":\"Comment cr\u00e9er un Internet sans censure ? par Dr R P - 3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation\",\"isPartOf\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg\",\"datePublished\":\"2025-08-21T15:09:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/#\/schema\/person\/b692dacff720a5344a6190bc714397eb\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage\",\"url\":\"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg\",\"contentUrl\":\"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg\",\"width\":812,\"height\":420},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.revue3emillenaire.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment cr\u00e9er un Internet sans censure ? par Dr R P\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/#website\",\"url\":\"https:\/\/www.revue3emillenaire.com\/blog\/\",\"name\":\"3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation\",\"description\":\"L&#039;Homme en devenir\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.revue3emillenaire.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.revue3emillenaire.com\/blog\/#\/schema\/person\/b692dacff720a5344a6190bc714397eb\",\"name\":\"3e mill\u00e9naire\",\"url\":\"https:\/\/www.revue3emillenaire.com\/blog\/author\/scoussa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment cr\u00e9er un Internet sans censure ? par Dr R P - 3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment cr\u00e9er un Internet sans censure ? par Dr R P - 3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation","og_description":"Aussi hypocrite que soit l\u2019utilisation par les apologistes de la surveillance des outils qu\u2019ils souhaitent refuser \u00e0 tout le monde, je ne peux reprocher \u00e0 personne de vouloir garder ses propres affaires priv\u00e9es. Le besoin de vie priv\u00e9e et d\u2019anonymat a rarement \u00e9t\u00e9 aussi fort. Apr\u00e8s tout, lorsqu\u2019on commente des questions politiques et qu\u2019on utilise des mots comme \u00ab armes \u00e9l\u00e9gantes pour une \u00e9poque plus civilis\u00e9e \u00bb, il y a toutes les raisons de chercher \u00e0 se cacher sous des pseudonymes et des connexions crypt\u00e9es afin d\u2019emp\u00eacher les gouvernements d\u2019utiliser des armes r\u00e9elles \u00ab maladroites et al\u00e9atoires \u00bb \u2014 des b\u00e2tons, des pierres et des os bris\u00e9s \u2014 en r\u00e9ponse \u00e0 la critique.","og_url":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/","og_site_name":"3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation","article_published_time":"2025-08-21T15:09:49+00:00","og_image":[{"width":812,"height":420,"url":"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg","type":"image\/jpeg"}],"author":"3e mill\u00e9naire","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"3e mill\u00e9naire","Dur\u00e9e de lecture estim\u00e9e":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#article","isPartOf":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/"},"author":{"name":"3e mill\u00e9naire","@id":"https:\/\/www.revue3emillenaire.com\/blog\/#\/schema\/person\/b692dacff720a5344a6190bc714397eb"},"headline":"Comment cr\u00e9er un Internet sans censure ? par Dr R P","datePublished":"2025-08-21T15:09:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/"},"wordCount":3491,"image":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage"},"thumbnailUrl":"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg","keywords":["Censure","Ind\u00e9pendance","Internet","R\u00e9seaux Sociaux","Surveillance"],"articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/","url":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/","name":"Comment cr\u00e9er un Internet sans censure ? par Dr R P - 3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation","isPartOf":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage"},"image":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage"},"thumbnailUrl":"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg","datePublished":"2025-08-21T15:09:49+00:00","author":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/#\/schema\/person\/b692dacff720a5344a6190bc714397eb"},"breadcrumb":{"@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#primaryimage","url":"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg","contentUrl":"https:\/\/www.revue3emillenaire.com\/blog\/wp-content\/uploads\/2024\/08\/SpiderAsa.jpg","width":812,"height":420},{"@type":"BreadcrumbList","@id":"https:\/\/www.revue3emillenaire.com\/blog\/comment-creer-un-internet-sans-censure-par-dr-r-p\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.revue3emillenaire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Comment cr\u00e9er un Internet sans censure ? par Dr R P"}]},{"@type":"WebSite","@id":"https:\/\/www.revue3emillenaire.com\/blog\/#website","url":"https:\/\/www.revue3emillenaire.com\/blog\/","name":"3e mill\u00e9naire - Spiritualit\u00e9 - Connaissance de soi - Non-dualit\u00e9 - M\u00e9ditation","description":"L&#039;Homme en devenir","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.revue3emillenaire.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.revue3emillenaire.com\/blog\/#\/schema\/person\/b692dacff720a5344a6190bc714397eb","name":"3e mill\u00e9naire","url":"https:\/\/www.revue3emillenaire.com\/blog\/author\/scoussa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/posts\/20762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/comments?post=20762"}],"version-history":[{"count":0,"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/posts\/20762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/media\/20158"}],"wp:attachment":[{"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/media?parent=20762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/categories?post=20762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revue3emillenaire.com\/blog\/wp-json\/wp\/v2\/tags?post=20762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}