--- /dev/null
+1\r
+00:00:00,280 --> 00:00:03,480\r
+L'Association Nos Oignons\r
+contribue à faire vivre un Internet\r
+\r
+2\r
+00:00:03,600 --> 00:00:06,840\r
+où nous avons davantage la maîtrise\r
+des informations qui nous concernent.\r
+\r
+3\r
+00:00:07,440 --> 00:00:10,280\r
+Quand on lit un journal, c'est\r
+une lecture à sens unique.\r
+\r
+4\r
+00:00:10,680 --> 00:00:13,680\r
+Le journal n'est pas en train de nous lire\r
+en même temps qu'on le lit.\r
+\r
+5\r
+00:00:14,320 --> 00:00:17,240\r
+Pourtant, lorsqu'on\r
+lit le même journal en ligne,\r
+\r
+6\r
+00:00:17,400 --> 00:00:18,440\r
+c'est ce qu'il se passe.\r
+\r
+7\r
+00:00:19,400 --> 00:00:21,440\r
+Le journal apprend quel article\r
+nous lisons,\r
+\r
+8\r
+00:00:21,480 --> 00:00:22,920\r
+pendant combien de temps,\r
+\r
+9\r
+00:00:23,120 --> 00:00:24,360\r
+et depuis quelle connexion,\r
+\r
+10\r
+00:00:24,640 --> 00:00:27,000\r
+et donc où nous nous trouvons.\r
+\r
+11\r
+00:00:27,880 --> 00:00:31,560\r
+Les régies publicitaires utilisées\r
+par le journal apprennent tout ça aussi.\r
+\r
+12\r
+00:00:32,000 --> 00:00:34,760\r
+Et comme elles sont utilisées\r
+par plusieurs sites,\r
+\r
+13\r
+00:00:35,720 --> 00:00:38,520\r
+elles peuvent nous suivre tout au long\r
+de notre revue de presse.\r
+\r
+14\r
+00:00:39,400 --> 00:00:40,480\r
+Et ça ne s'arrête pas là.\r
+\r
+15\r
+00:00:41,520 --> 00:00:45,120\r
+Dès qu'un site utilise les services\r
+analytics ou fonts de Google,\r
+\r
+16\r
+00:00:45,600 --> 00:00:48,920\r
+affiche un bouton “J'aime” de Facebook\r
+ou un bouton “Partager” de Twitter,\r
+\r
+17\r
+00:00:49,240 --> 00:00:50,680\r
+ces entreprises nous suivent aussi.\r
+\r
+18\r
+00:00:51,400 --> 00:00:54,880\r
+Et il suffit de se connecter à son compte \r
+Gmail, Facebook ou Twitter\r
+\r
+19\r
+00:00:55,120 --> 00:00:56,440\r
+pour leur permettre de faire le lien\r
+\r
+20\r
+00:00:56,480 --> 00:01:00,000\r
+entre notre identité, les sites que nous\r
+visitons, ce que nous y faisons,\r
+\r
+21\r
+00:01:00,080 --> 00:01:01,520\r
+combien de temps nous y passons,\r
+\r
+22\r
+00:01:02,280 --> 00:01:04,160\r
+ou encore d’où nous les utilisons.\r
+\r
+23\r
+00:01:04,800 --> 00:01:07,000\r
+Pourtant ce n'est pas acceptable.\r
+\r
+24\r
+00:01:07,120 --> 00:01:08,520\r
+Ce ne sont pas leurs oignons.\r
+\r
+25\r
+00:01:09,280 --> 00:01:10,520\r
+Ces informations personnelles\r
+\r
+26\r
+00:01:10,520 --> 00:01:13,320\r
+ne devraient pas être partagées\r
+sans notre consentement.\r
+\r
+27\r
+00:01:15,120 --> 00:01:16,760\r
+La plupart des lois qui nous\r
+protègent,\r
+\r
+28\r
+00:01:16,760 --> 00:01:17,840\r
+comme le RGPD\r
+\r
+29\r
+00:01:18,240 --> 00:01:21,320\r
+oblige bien à ce qu'on\r
+nous consulte sur l'usage de ces données.\r
+\r
+30\r
+00:01:22,360 --> 00:01:25,720\r
+Mais à ce moment là, elles ont déjà\r
+été transmises.\r
+\r
+31\r
+00:01:26,320 --> 00:01:28,080\r
+Alors les sites nous demandent\r
+\r
+32\r
+00:01:28,160 --> 00:01:28,760\r
+un par un\r
+\r
+33\r
+00:01:28,880 --> 00:01:29,800\r
+notre consentement.\r
+\r
+34\r
+00:01:30,520 --> 00:01:31,400\r
+Mais a posteriori,\r
+\r
+35\r
+00:01:31,600 --> 00:01:32,800\r
+sans qu'on puisse vérifier\r
+\r
+36\r
+00:01:32,840 --> 00:01:36,360\r
+ni être à l'abri d'une\r
+mauvaise configuration ou d'un piratage.\r
+\r
+37\r
+00:01:38,960 --> 00:01:40,560\r
+Ces informations ne devraient être partagées\r
+\r
+38\r
+00:01:40,640 --> 00:01:41,600\r
+que si on le souhaite.\r
+\r
+39\r
+00:01:43,720 --> 00:01:46,080\r
+C'est ce que permet de faire le navigateur Tor.\r
+\r
+40\r
+00:01:46,640 --> 00:01:49,680\r
+Il isole nos connexions avec chaque site.\r
+\r
+41\r
+00:01:50,200 --> 00:01:53,040\r
+Comme ça, il est impossible\r
+de nous suivre d'un site à l'autre.\r
+\r
+42\r
+00:01:53,480 --> 00:01:56,120\r
+Même si je suis connecté.e\r
+à mon compte Gmail dans un onglet,\r
+\r
+43\r
+00:01:56,840 --> 00:01:59,720\r
+Google n'apprendra pas\r
+que c'est moi qui visite d'autres sites.\r
+\r
+44\r
+00:02:01,200 --> 00:02:03,200\r
+Une autre chose\r
+que fait le navigateur Tor,\r
+\r
+45\r
+00:02:03,800 --> 00:02:08,040\r
+c'est de faire que toutes les personnes\r
+utilisant Tor se “ressemblent”.\r
+\r
+46\r
+00:02:08,320 --> 00:02:09,680\r
+Les informations de notre système\r
+\r
+47\r
+00:02:09,720 --> 00:02:12,360\r
+sont remplacées\r
+par des informations génériques.\r
+\r
+48\r
+00:02:13,280 --> 00:02:15,720\r
+Nous devenons ainsi\r
+plus difficiles à discerner.\r
+\r
+49\r
+00:02:16,360 --> 00:02:19,120\r
+Les sites que nous visitons et\r
+leurs partenaires enregistreront seulement\r
+\r
+50\r
+00:02:19,280 --> 00:02:21,280\r
+la visite d'un navigateur Tor.\r
+\r
+51\r
+00:02:22,360 --> 00:02:23,840\r
+Mais pour que cela soit possible\r
+\r
+52\r
+00:02:24,320 --> 00:02:28,400\r
+il est nécessaire de contourner une limite\r
+du fonctionnement historique d'Internet.\r
+\r
+53\r
+00:02:29,640 --> 00:02:33,120\r
+Traditionnellement, lorsqu'une \r
+communication se fait sur Internet,\r
+\r
+54\r
+00:02:33,240 --> 00:02:35,840\r
+les ordinateurs apprennent en même temps\r
+\r
+55\r
+00:02:36,000 --> 00:02:38,720\r
+qu'ils échangent des informations,\r
+leur emplacement sur le réseau.\r
+\r
+56\r
+00:02:38,840 --> 00:02:42,080\r
+Sauf que ce fonctionnement\r
+est problématique.\r
+\r
+57\r
+00:02:42,120 --> 00:02:45,720\r
+Il nous force à divulguer une information\r
+toute personnelle :\r
+\r
+58\r
+00:02:45,760 --> 00:02:48,320\r
+la connexion que nous utilisons,\r
+à partir de laquelle\r
+\r
+59\r
+00:02:48,400 --> 00:02:50,280\r
+on peut connaître l’endroit\r
+où nous nous trouvons.\r
+\r
+60\r
+00:02:50,480 --> 00:02:54,600\r
+Le réseau Tor permet que cette information\r
+ne fuite pas sans notre consentement.\r
+\r
+61\r
+00:02:54,800 --> 00:02:58,120\r
+En faisant rebondir nos connexions\r
+à travers un réseau constitué\r
+\r
+62\r
+00:02:58,240 --> 00:03:02,040\r
+de plusieurs milliers de relais,\r
+il parvient à masquer notre localisation.\r
+\r
+63\r
+00:03:03,040 --> 00:03:06,800\r
+En effet, pour chacune de nos connexions,\r
+trois relais sont choisis au hasard\r
+\r
+64\r
+00:03:07,240 --> 00:03:11,440\r
+et grâce à un système de chiffrement\r
+en couches d'oignon il est impossible\r
+\r
+65\r
+00:03:11,560 --> 00:03:13,760\r
+pour les intermédiaires\r
+de voir l'ensemble de la communication.\r
+\r
+66\r
+00:03:15,520 --> 00:03:17,600\r
+Lorsqu'on\r
+se connecte sur un site avec Tor\r
+\r
+67\r
+00:03:18,040 --> 00:03:21,600\r
+le troisième relai, qu'on appelle aussi\r
+“nœud de sortie”, connaît bien\r
+\r
+68\r
+00:03:21,680 --> 00:03:25,520\r
+notre destination, mais il ne peut pas\r
+savoir où nous nous trouvons.\r
+\r
+69\r
+00:03:25,640 --> 00:03:28,000\r
+C'est là qu'intervient l'association\r
+Nos Oignons.\r
+\r
+70\r
+00:03:28,280 --> 00:03:30,880\r
+Certains de ces nœuds de sortie\r
+sont ceux de nos oignons.\r
+\r
+71\r
+00:03:31,800 --> 00:03:35,440\r
+L’Association contribue au réseau Tor\r
+en assurant le fonctionnement\r
+\r
+72\r
+00:03:35,560 --> 00:03:38,800\r
+de plusieurs relais\r
+de bonne capacité localisés en France.\r
+\r
+73\r
+00:03:39,360 --> 00:03:42,080\r
+Nos relais sont financés\r
+par les dons de particuliers, comme vous,\r
+\r
+74\r
+00:03:42,280 --> 00:03:44,000\r
+d'associations et d'entreprises.\r
+\r
+75\r
+00:03:45,000 --> 00:03:47,600\r
+Alors, rejoignez nous\r
+pour soutenir le réseau Tor\r
+\r
+76\r
+00:03:47,680 --> 00:03:50,360\r
+et faire vivre Internet\r
+tel qu'il devrait être.\r
--- /dev/null
+1\r
+00:00:00,280 --> 00:00:03,480\r
+Nos oignons contributes to an Internet\r
+\r
+2\r
+00:00:03,600 --> 00:00:06,840\r
+where we have more control over\r
+the information that concerns us.\r
+\r
+3\r
+00:00:07,440 --> 00:00:10,280\r
+When you read a newspaper,\r
+it is a one-way reading.\r
+\r
+4\r
+00:00:10,680 --> 00:00:13,680\r
+The newspaper is not reading us\r
+while we are reading it. \r
+\r
+5\r
+00:00:14,320 --> 00:00:17,240\r
+Yet when you read\r
+the same newspaper online, \r
+\r
+6\r
+00:00:17,400 --> 00:00:18,440\r
+this is what happens.\r
+\r
+7\r
+00:00:19,400 --> 00:00:21,440\r
+The site learns which article we read, \r
+\r
+8\r
+00:00:21,480 --> 00:00:22,920\r
+how much time we spend on it, \r
+\r
+9\r
+00:00:23,120 --> 00:00:24,360\r
+and which Internet connection we used\r
+\r
+10\r
+00:00:24,640 --> 00:00:27,000\r
+and therefore where we are.\r
+\r
+11\r
+00:00:27,880 --> 00:00:31,560\r
+The advertising agencies used on\r
+the site learn all this too. \r
+\r
+12\r
+00:00:32,000 --> 00:00:34,760\r
+And, as they are used by several sites\r
+\r
+13\r
+00:00:35,720 --> 00:00:38,520\r
+they can follow us\r
+throughout our press review. \r
+\r
+14\r
+00:00:39,400 --> 00:00:40,480\r
+And it doesn't stop there\r
+\r
+15\r
+00:00:41,520 --> 00:00:45,120\r
+If a site uses Google's analytics\r
+or fonts services,\r
+\r
+16\r
+00:00:45,600 --> 00:00:48,920\r
+displays a Facebook "Like" button \r
+or a Twitter "Share" button, \r
+\r
+17\r
+00:00:49,240 --> 00:00:50,680\r
+these companies are also tracking us.\r
+\r
+18\r
+00:00:51,400 --> 00:00:54,880\r
+And just by logging into your GMail, \r
+Facebook or Twitter account\r
+\r
+19\r
+00:00:55,120 --> 00:00:56,440\r
+they can link our identity\r
+\r
+20\r
+00:00:56,480 --> 00:01:00,000\r
+to the sites we visit, \r
+what we do on them,\r
+\r
+21\r
+00:01:00,080 --> 00:01:01,520\r
+how long we spend on them\r
+\r
+22\r
+00:01:02,280 --> 00:01:04,160\r
+or where we use them from.\r
+\r
+23\r
+00:01:04,800 --> 00:01:07,000\r
+Yet this is not acceptable.\r
+\r
+24\r
+00:01:07,120 --> 00:01:08,520\r
+It is simply none of their business.\r
+\r
+25\r
+00:01:09,280 --> 00:01:10,520\r
+These informations should not\r
+\r
+26\r
+00:01:10,520 --> 00:01:13,320\r
+be shared without our consent.\r
+\r
+27\r
+00:01:15,120 --> 00:01:16,760\r
+Most laws that seek to protect us\r
+\r
+28\r
+00:01:16,760 --> 00:01:17,840\r
+such as the GDPR,\r
+\r
+29\r
+00:01:18,240 --> 00:01:21,320\r
+do require us to be consulted \r
+about the use of these data.\r
+\r
+30\r
+00:01:22,360 --> 00:01:25,720\r
+But by that time, they have already\r
+been transmitted by our browsers.\r
+\r
+31\r
+00:01:26,320 --> 00:01:28,080\r
+So, the sites ask us\r
+\r
+32\r
+00:01:28,160 --> 00:01:28,760\r
+one by one\r
+\r
+33\r
+00:01:28,880 --> 00:01:29,800\r
+our consent.\r
+\r
+34\r
+00:01:31,600 --> 00:01:32,800\r
+But we can't really check,\r
+\r
+35\r
+00:01:32,840 --> 00:01:36,360\r
+and it doesn't protect us from\r
+bad configuration or hacking.\r
+\r
+36\r
+00:01:38,960 --> 00:01:41,600\r
+Shouldn't this information be shared\r
+only if we want it?\r
+\r
+37\r
+00:01:43,720 --> 00:01:46,080\r
+The Tor Browser does just that.\r
+\r
+38\r
+00:01:46,640 --> 00:01:49,680\r
+It isolates our connections to each site.\r
+\r
+39\r
+00:01:50,200 --> 00:01:53,040\r
+So, it's impossible to track us \r
+from site to site. \r
+\r
+40\r
+00:01:53,480 --> 00:01:56,120\r
+Even if I'm logged into GMail in a tab\r
+\r
+41\r
+00:01:56,840 --> 00:01:59,720\r
+Google won't know that \r
+I'm visiting other sites.\r
+\r
+42\r
+00:02:01,200 --> 00:02:08,040\r
+Another thing the Tor Browser does\r
+is to make everyone "look" the same.\r
+\r
+43\r
+00:02:08,320 --> 00:02:12,360\r
+Our system information is replaced \r
+with generic information. \r
+\r
+44\r
+00:02:13,280 --> 00:02:15,720\r
+This makes us more difficult to discern.\r
+\r
+45\r
+00:02:16,360 --> 00:02:21,280\r
+The sites and their partners will only\r
+record being visited by a Tor browser.\r
+\r
+46\r
+00:02:22,360 --> 00:02:23,840\r
+But for this to be possible,\r
+it is necessary \r
+\r
+47\r
+00:02:24,320 --> 00:02:28,400\r
+to get around a limit of the \r
+historical functioning of the Internet.\r
+\r
+48\r
+00:02:29,640 --> 00:02:33,120\r
+When a communication\r
+is done on the Internet\r
+\r
+49\r
+00:02:33,240 --> 00:02:35,840\r
+computers learn their location\r
+on the network \r
+\r
+50\r
+00:02:36,000 --> 00:02:38,720\r
+as they exchange information.\r
+\r
+51\r
+00:02:38,840 --> 00:02:42,080\r
+Except that this is problematic.\r
+\r
+52\r
+00:02:42,120 --> 00:02:45,720\r
+It forces us to disclose a very\r
+personal information :\r
+\r
+53\r
+00:02:45,760 --> 00:02:48,320\r
+the connection we use,\r
+\r
+54\r
+00:02:48,400 --> 00:02:50,280\r
+from which everyone can know\r
+where we are.\r
+\r
+55\r
+00:02:50,480 --> 00:02:54,600\r
+The Tor network ensures that this information\r
+does not leak without our consent. \r
+\r
+56\r
+00:02:54,800 --> 00:02:58,120\r
+By bouncing our connections\r
+\r
+57\r
+00:02:58,240 --> 00:03:02,040\r
+through a network of thousands of relays,\r
+it hides our location.\r
+\r
+58\r
+00:03:03,040 --> 00:03:06,800\r
+Indeed, for each of our connections,\r
+three relays are chosen at random\r
+\r
+59\r
+00:03:07,240 --> 00:03:11,440\r
+and thanks to a system\r
+of onion layer encryption\r
+\r
+60\r
+00:03:11,560 --> 00:03:13,760\r
+It is impossible for intermediaries\r
+to see the entire communication.\r
+\r
+61\r
+00:03:15,520 --> 00:03:17,600\r
+When you connect to a site with Tor\r
+\r
+62\r
+00:03:18,040 --> 00:03:21,600\r
+the third relay - also known as the\r
+exit node - knows our destination, \r
+\r
+63\r
+00:03:21,680 --> 00:03:25,520\r
+but it can't know where we are.\r
+\r
+64\r
+00:03:25,640 --> 00:03:28,000\r
+This is where Nos oignons comes in.\r
+\r
+65\r
+00:03:28,280 --> 00:03:30,880\r
+Some of these exit nodes\r
+are those of Nos oignons.\r
+\r
+66\r
+00:03:31,800 --> 00:03:35,440\r
+The association contributes\r
+to the Tor network \r
+\r
+67\r
+00:03:35,560 --> 00:03:38,800\r
+by operating several good capacity\r
+relays, located in France.\r
+\r
+68\r
+00:03:39,360 --> 00:03:42,080\r
+Our relays are funded by donations \r
+from individuals like you,\r
+\r
+69\r
+00:03:42,280 --> 00:03:44,000\r
+organizations, and businesses.\r
+\r
+70\r
+00:03:45,000 --> 00:03:47,600\r
+Join us in supporting the Tor network \r
+\r
+71\r
+00:03:47,680 --> 00:03:50,360\r
+and keeping the Internet \r
+the way it should be.\r