{"version":"1.0","provider_name":"Revue Internationale d&#039;Intelligence Economique","provider_url":"https:\/\/www.r2ie.org","author_name":"Revue Internationale d&#039;Intelligence Economique","author_url":"https:\/\/www.r2ie.org","title":"Les syst\u00e8mes biom\u00e9triques : entre s\u00e9curit\u00e9 et libert\u00e9 - Revue Internationale d&#039;Intelligence Economique","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"fRVpTXXrZC\"><a href=\"https:\/\/www.r2ie.org\/index.php\/2025\/06\/25\/les-systemes-biometriques-entre-securite-et-liberte\/\">Les syst\u00e8mes biom\u00e9triques : entre s\u00e9curit\u00e9 et libert\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.r2ie.org\/index.php\/2025\/06\/25\/les-systemes-biometriques-entre-securite-et-liberte\/embed\/#?secret=fRVpTXXrZC\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Les syst\u00e8mes biom\u00e9triques : entre s\u00e9curit\u00e9 et libert\u00e9\u00a0\u00bb &#8212; Revue Internationale d&#039;Intelligence Economique\" data-secret=\"fRVpTXXrZC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.r2ie.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Alors que les Jeux olympiques de 2024 \u00e0 Paris ont servi de tremplin \u00e0 l\u2019exp\u00e9rimentation de la vid\u00e9osurveillance algorithmique (VSA), sa prolongation jusqu\u2019en 2027 interroge. Pr\u00e9sent\u00e9e comme un outil de s\u00e9curit\u00e9, elle est d\u00e9nonc\u00e9e par ses d\u00e9tracteurs comme un cheval de Troie ouvrant la voie \u00e0 des technologies plus intrusives, comme les syst\u00e8mes biom\u00e9triques de..."}