quentin.dufour.io/_bibliography/stopcovid.bib
2020-04-23 07:55:57 +02:00

402 lines
22 KiB
BibTeX
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
---
@misc{noauthor_coronavirus_2020,
title = {Coronavirus : le gouvernement prépare une application mobile pour enrayer l'épidémie},
shorttitle = {Coronavirus},
url = {https://www.lesechos.fr/tech-medias/hightech/coronavirus-le-gouvernement-prepare-une-application-mobile-pour-enrayer-lepidemie-1190749},
abstract = {Les autorités françaises travaillent sur une application mobile pour avertir les personnes d'un risque individuel de contagion. Pour respecter la vie privée, la France s'inspire du suivi des contacts par Bluetooth mis en place à Singapour.},
language = {fr},
urldate = {2020-04-20},
journal = {Les Echos},
month = mar,
year = {2020},
note = {Library Catalog: www.lesechos.fr
Section: Tech - Médias},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/7QJW976X/coronavirus-le-gouvernement-prepare-une-application-mobile-pour-enrayer-lepidemie-1190749.html:text/html}
}
@misc{bembaron_ou_2020,
title = {Où en est lapplication de traçage «{StopCovid}»? {La} mise au point de l{Inria}},
shorttitle = {Où en est lapplication de traçage «{StopCovid}»?},
url = {https://www.lefigaro.fr/secteur/high-tech/ou-en-est-l-application-de-tracage-stopcovid-la-mise-au-point-de-l-inria-20200419},
abstract = {Dans une longue note, Bruno Sportisse, le PDG de lInria, apporte des précisions sur lapplication qui pourrait être mise en place en France.},
language = {fr},
urldate = {2020-04-20},
journal = {Le Figaro.fr},
author = {Bembaron, Elsa},
month = apr,
year = {2020},
note = {Library Catalog: www.lefigaro.fr
Section: Tech \& Web},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/CBF53FE9/ou-en-est-l-application-de-tracage-stopcovid-la-mise-au-point-de-l-inria-20200419.html:text/html}
}
@misc{sportisse_figaro,
title = {« {Contact} tracing » : {Bruno} {Sportisse}, {PDG} d{Inria}, donne quelques éléments pour mieux comprendre les enjeux},
shorttitle = {« {Contact} tracing »},
url = {https://www.inria.fr/fr/contact-tracing-bruno-sportisse-pdg-dinria-donne-quelques-elements-pour-mieux-comprendre-les-enjeux},
language = {fr},
urldate = {2020-04-20},
note = {Library Catalog: www.inria.fr},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/RCBV5Y9M/contact-tracing-bruno-sportisse-pdg-dinria-donne-quelques-elements-pour-mieux-comprendre-les-en.html:text/html}
}
@misc{rimbert_jusqua_2020,
title = {Jusquà la prochaine fin du monde…},
url = {https://www.monde-diplomatique.fr/2020/04/LAMBERT/61620},
abstract = {Accès libre ⁕ en kiosques // par Renaud Lambert \& Pierre Rimbert (avril 2020)},
language = {fr},
urldate = {2020-04-20},
journal = {Le Monde diplomatique},
author = {Rimbert, Renaud Lambert \& Pierre},
month = apr,
year = {2020},
note = {Library Catalog: www.monde-diplomatique.fr},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/88PZBBCA/61620.html:text/html}
}
@article{lemonde_aplatir_2020,
title = {« {Aplatir} la courbe » des contaminations de {Covid}-19 sera lenjeu des semaines à venir},
url = {https://www.lemonde.fr/les-decodeurs/article/2020/03/13/aplatir-la-courbe-des-contaminations-du-covid-19-sera-l-enjeu-des-semaines-a-venir_6032925_4355770.html},
abstract = {EN UN GRAPHIQUE Lobjectif affiché par les autorités françaises est désormais de limiter le plus possible la diffusion du virus pour ne pas saturer les hôpitaux.},
language = {fr},
urldate = {2020-04-20},
journal = {Le Monde.fr},
month = mar,
year = {2020},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/XGHCNNFB/aplatir-la-courbe-des-contaminations-du-covid-19-sera-l-enjeu-des-semaines-a-venir_6032925_4355.html:text/html}
}
@article{bay_bluetrace_nodate,
title = {{BlueTrace}: {A} privacy-preserving protocol for community-driven contact tracing across borders},
abstract = {TraceTogether is the first national deployment of a Bluetooth-based contact tracing system in the world. It was developed by Singapores Government Technology Agency and the Ministry of Health to help the country better respond to epidemics. Following its release, more than 50 governments have expressed interest in adopting or adapting TraceTogether for their countries. Responding to this interest, we are releasing an overview of BlueTrace, the privacy-preserving protocol that underpins TraceTogether, as well as OpenTrace, a reference implementation.},
language = {en},
author = {Bay, Jason and Kek, Joel and Tan, Alvin and Hau, Chai Sheng and Yongquan, Lai and Tan, Janice and Quy, Tang Anh},
pages = {9},
file = {Bay et al. - BlueTrace A privacy-preserving protocol for commu.pdf:/home/quentin/Seafile/zotero/storage/IYDHY97R/Bay et al. - BlueTrace A privacy-preserving protocol for commu.pdf:application/pdf}
}
@misc{noauthor_dp-3tdocuments_2020,
title = {{DP}-{3T}/documents},
url = {https://github.com/DP-3T/documents},
abstract = {Decentralized Privacy-Preserving Proximity Tracing -- Documents},
urldate = {2020-04-20},
publisher = {DP{\textasciicircum}3T},
month = apr,
year = {2020},
note = {original-date: 2020-04-03T16:04:32Z}
}
@misc{noauthor_robert-proximity-tracingdocuments_2020,
title = {{ROBERT}-proximity-tracing/documents},
url = {https://github.com/ROBERT-proximity-tracing/documents},
abstract = {Protocol specification, white paper, high level documents, etc.},
urldate = {2020-04-20},
publisher = {ROBERT -- ROBust and privacy-presERving proximity Tracing protocol},
month = apr,
year = {2020},
note = {original-date: 2020-04-13T16:51:24Z}
}
@misc{noauthor_franceinfo_nodate,
title = {franceinfo sur {Twitter} : "{Faut}-il supprimer l'anonymat sur {Internet} ? "{Mais} l'anonymat, c'est une horreur !", affirme le député {LR} {Eric} {Woerth} qui affirme qu'on "a besoin de beaucoup plus d'autorité sur les réseaux sociaux" https://t.co/{ihrfHOswlJ}" / {Twitter}},
shorttitle = {franceinfo sur {Twitter}},
url = {https://twitter.com/franceinfo/status/1229677690720063488},
language = {fr},
urldate = {2020-04-20},
journal = {Twitter},
note = {Library Catalog: twitter.com},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/DLP6M2EA/1229677690720063488.html:text/html}
}
@misc{noauthor_decret_2014,
title = {Décret n° 2014-1576 du 24 décembre 2014 relatif à l'accès administratif aux données de connexion},
urldate = {2020-04-20},
month = dec,
year = {2014},
note = {Library Catalog: Légifrance}
}
@misc{bembaron_coronavirus_2020,
title = {Coronavirus: comment les opérateurs se mettent à disposition pour le recueil des données mobiles},
shorttitle = {Coronavirus},
url = {https://www.lefigaro.fr/sciences/coronavirus-comment-les-operateurs-se-mettent-a-disposition-pour-le-recueil-des-donnee-mobiles-20200402},
abstract = {Pour lutter contre la propagation du Covid-19, les données fournies par Orange sont étudiées par les chercheurs de lInserm pour analyser les mouvements de populations avant et après le confinement.},
language = {fr},
urldate = {2020-04-20},
journal = {Le Figaro.fr},
author = {Bembaron, Elsa},
month = apr,
year = {2020},
note = {Library Catalog: www.lefigaro.fr
Section: Sciences \& Environnement},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/XTYEJ5SD/coronavirus-comment-les-operateurs-se-mettent-a-disposition-pour-le-recueil-des-donnee-mobiles-.html:text/html}
}
@misc{noauthor_flux_nodate,
title = {Flux {Vision}},
url = {https://www.orange-business.com/fr/produits/flux-vision},
abstract = {Mieux connaître les déplacements de vos clients grâce aux données Flux Vision},
language = {fr},
urldate = {2020-04-20},
journal = {Orange Business Services},
note = {Library Catalog: www.orange-business.com},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/2H9KRXAL/flux-vision.html:text/html}
}
@article{noauthor_swisscom_2020,
title = {Swisscom aidera la {Confédération} à détecter les attroupements via les téléphones},
issn = {1423-3967},
url = {https://www.letemps.ch/economie/swisscom-aidera-confederation-detecter-attroupements-via-telephones},
abstract = {Selon les informations obtenues par «Le Temps», lopérateur communiquera aux autorités fédérales lorsque plus de 20 téléphones se trouvent dans un espace de 100 mètres sur 100. En raison de la propagation du coronavirus, les rassemblements de plus de cinq personnes dans lespace public sont interdits depuis le 21 mars},
language = {fr},
urldate = {2020-04-20},
journal = {Le Temps},
month = mar,
year = {2020},
keywords = {Coronavirus, Technologies, Téléphonie},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/SJN2B6VK/swisscom-aidera-confederation-detecter-attroupements-via-telephones.html:text/html}
}
@misc{champeau_hadopi_2015,
title = {Hadopi : l'État condamné à payer pour identifier les adresses {IP}},
shorttitle = {Hadopi},
url = {https://www.numerama.com/politique/136183-hadopi-letat-condamne-a-payer-pour-identifier-les-adresses-ip.html},
abstract = {Le Conseil d'État a imposé à l'administration de payer les FAI lorsque l'Hadopi leur demande le nom et l'adresse des abonnés à qui ont été attribués des adresses IP. Le budget de la riposte graduée pourrait exploser... sauf si le gouvernement décide d'ignorer le jugement.},
language = {fr-FR},
urldate = {2020-04-20},
journal = {Numerama},
author = {Champeau, Guillaume},
month = dec,
year = {2015},
note = {Library Catalog: www.numerama.com
Section: Société},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/46E5RX5G/136183-hadopi-letat-condamne-a-payer-pour-identifier-les-adresses-ip.html:text/html}
}
@article{noauthor_premiere_2017,
title = {Une première « boîte noire » de la loi sur le renseignement désormais active},
url = {https://www.lemonde.fr/pixels/article/2017/11/14/les-boites-noires-de-la-loi-sur-le-renseignement-sont-desormais-actives_5214596_4408996.html},
abstract = {Ce dispositif très critiqué permet aux services de renseignement danalyser automatiquement les métadonnées des communications Internet en France.},
language = {fr},
urldate = {2020-04-20},
journal = {Le Monde.fr},
month = nov,
year = {2017},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/BWZJUZYB/les-boites-noires-de-la-loi-sur-le-renseignement-sont-desormais-actives_5214596_4408996.html:text/html}
}
@misc{hourdeaux_surveillance_nodate,
title = {La surveillance du {Net} a été généralisée dès 2009},
url = {https://www.mediapart.fr/journal/france/060616/la-surveillance-du-net-ete-generalisee-des-2009},
abstract = {Bien avant les révélations d'Edward Snowden, la France avait mis en place un dispositif de surveillance automatisé de son réseau internet via l'installation de sondes sur l'ensemble du réseau ADSL. Ce programme, baptisé « IOL » pour Interceptions obligatoires légales, permettait de collecter « en temps réel »les métadonnées, pratique non autorisée à l'époque.},
language = {fr},
urldate = {2020-04-20},
journal = {Mediapart},
author = {Hourdeaux, Jérôme},
note = {Library Catalog: www.mediapart.fr},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/EMUBSWYN/la-surveillance-du-net-ete-generalisee-des-2009.html:text/html}
}
@misc{hourdeaux_conseil_nodate,
title = {Le {Conseil} constitutionnel juge illégale la surveillance hertzienne},
url = {https://www.mediapart.fr/journal/france/211016/le-conseil-constitutionnel-juge-illegale-la-surveillance-hertzienne},
abstract = {Saisis par une QPC des Exégètes amateurs, les sages ont jugé inconstitutionnelle une disposition de 1991 permettant une surveillance sans contrôle de toute communication passant par les ondes hertziennes.},
language = {fr},
urldate = {2020-04-21},
journal = {Mediapart},
author = {Hourdeaux, Jérôme},
note = {Library Catalog: www.mediapart.fr},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/C8N8HUCB/le-conseil-constitutionnel-juge-illegale-la-surveillance-hertzienne.html:text/html}
}
@article{boucher_safari_nodate,
title = {Safari ou la chasse aux {Français}},
url = {https://www.cnil.fr/sites/default/files/atoms/files/le_monde_0.pdf},
urldate = {2020-04-21},
author = {Boucher, Philippe},
file = {Safari ou la chasse aux Français:/home/quentin/Seafile/zotero/storage/J4LEWVQA/le_monde_0.pdf:application/pdf}
}
@misc{noauthor_gendnotes_2020,
title = {Gendnotes, faciliter le fichage policier et la reconnaissance faciale},
url = {https://www.laquadrature.net/2020/02/25/gendnotes-faciliter-le-fichage-policier-et-la-reconnaissance-faciale/},
abstract = {Le gouvernement vient d'autoriser la gendarmerie à déployer une application mobile qui facilite la collecte de photos et d'informations sensibles (religion, politique, sexualité, prétendue origine raciale) et leur transfert dans des fichiers extérieurs - tel que le TAJ, qui permet la reconnaissance},
language = {fr-FR},
urldate = {2020-04-21},
journal = {La Quadrature du Net},
month = feb,
year = {2020},
note = {Library Catalog: www.laquadrature.net
Section: Surveillance},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/WNVJZX6G/gendnotes-faciliter-le-fichage-policier-et-la-reconnaissance-faciale.html:text/html}
}
@misc{noauthor_conseil_2019,
title = {Le {Conseil} constitutionnel autorise le fisc à la surveillance de masse},
url = {https://www.laquadrature.net/2019/12/30/le-conseil-constitutionnel-autorise-le-fisc-a-la-surveillance-de-masse/},
abstract = {Le Conseil constitutionnel, dans sa décision rendue vendredi dernier, vient de considérer que la surveillance généralisée des réseaux sociaux prévue par l'article 154, ex-57, de la loi de finances pour 2020 est conforme à la Constitution.
Comme nous le dénoncions, cet article prévoit une collecte},
language = {fr-FR},
urldate = {2020-04-21},
journal = {La Quadrature du Net},
month = dec,
year = {2019},
note = {Library Catalog: www.laquadrature.net
Section: Surveillance},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/P9ZRQE7D/le-conseil-constitutionnel-autorise-le-fisc-a-la-surveillance-de-masse.html:text/html}
}
@misc{noauthor_ce_nodate,
title = {Ce que dit le coronavirus de notre soumission à la surveillance - {Médias} / {Net} - {Télérama}.fr},
url = {https://www.telerama.fr/medias/ce-que-dit-le-coronavirus-de-notre-soumission-a-la-surveillance,n6610539.php},
urldate = {2020-04-21}
}
@article{noauthor_lassignation_2015,
title = {Lassignation à résidence de militants écologistes devant le conseil d{Etat}},
url = {https://www.lemonde.fr/societe/article/2015/12/10/la-constitutionnalite-de-l-etat-d-urgence-mise-en-cause_4828792_3224.html},
abstract = {Le Conseil dEtat examine une première QPC sur les assignations à résidence de militants interdits de manifester jusquà la clôture de la COP21.},
language = {fr},
urldate = {2020-04-21},
journal = {Le Monde.fr},
month = dec,
year = {2015},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/SRBGDU3S/la-constitutionnalite-de-l-etat-d-urgence-mise-en-cause_4828792_3224.html:text/html}
}
@techreport{dingledine_tor_2004,
title = {Tor: {The} {Second}-{Generation} {Onion} {Router}},
shorttitle = {Tor},
url = {https://apps.dtic.mil/docs/citations/ADA465464},
abstract = {We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication.},
language = {en},
urldate = {2020-04-21},
institution = {NAVAL RESEARCH LAB WASHINGTON DC},
author = {Dingledine, Roger and Mathewson, Nick and Syverson, Paul},
month = jan,
year = {2004},
file = {Full Text PDF:/home/quentin/Seafile/zotero/storage/QG8ACQMH/Dingledine et al. - 2004 - Tor The Second-Generation Onion Router.pdf:application/pdf}
}
@misc{noauthor_authority_nodate,
title = {"authority... will need to deploy sniffing devices" · {Issue} \#6 · {ROBERT}-proximity-tracing/documents},
url = {https://github.com/ROBERT-proximity-tracing/documents/issues/6},
abstract = {In https://github.com/ROBERT-proximity-tracing/documents/blob/master/ROBERT-summary-EN.pdf it says: \"If the authority wants to do physical tracking, it will need to deploy sniffing devices\&quo...},
language = {en},
urldate = {2020-04-21},
journal = {GitHub},
note = {Library Catalog: github.com},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/F2AQS268/6.html:text/html}
}
@misc{vuillot_15_nodate,
title = {15 scénarios de détournements des applis de traçage},
url = {https://risques-tracage.fr/},
abstract = {Le traçage automatisé des contacts à l'aide d'une application sur smartphone comporte de nombreux risques, indépendamment des détails de fonctionnement de cette application.},
language = {en},
urldate = {2020-04-21},
journal = {https://risques-tracage.fr},
author = {Vuillot, Xavier Bonnetain, Anne Canteaut, Véronique Cortier, Pierrick Gaudry, Lucca Hirschi, Steve Kremer, Stéphanie Lacour, Gaëtan Leurent, Matthieu Lequesne, Léo Perrin, André Schrottenloher, Emmanuel Thomé, Serge Vaudenay, Christophe, Nicolas Anciaux},
note = {Library Catalog: risques-tracage.fr},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/KPYKXEE9/risques-tracage.fr.html:text/html}
}
@article{chaum_untraceable_1981,
title = {Untraceable {Electronic} {Mail}, {Return} {Addresses}, and {Digital} {Pseudonyms}},
volume = {24},
abstract = {A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication--in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceble return address. The technique can also be used to form rosters of untraceable digital pseudonyms from selected applications. Applicants retain the exclusive ability to form digital signatures corresponding to their pseudonyms. Elections in which any interested party can verify that the ballots have been properly counted are possible if anonymously mailed ballots are signed with pseudonyms from a roster of registered voters. Another use allows an individual to correspond with a record-keeping organization under a unique pseudonym which appears in a roster of acceptable clients.},
language = {en},
number = {2},
author = {Chaum, David L},
year = {1981},
pages = {5},
file = {Chaum - 1981 - Untraceable Electronic Mail, Return Addresses, and.pdf:/home/quentin/Seafile/zotero/storage/7ZZYQYKK/Chaum - 1981 - Untraceable Electronic Mail, Return Addresses, and.pdf:application/pdf}
}
@misc{noauthor_list_2020,
title = {List of countries by smartphone penetration},
copyright = {Creative Commons Attribution-ShareAlike License},
url = {https://en.wikipedia.org/w/index.php?title=List_of_countries_by_smartphone_penetration&oldid=950972111},
abstract = {This is a list of countries by smartphone penetration in 2018. These numbers are based on the top 50 countries in terms of smartphone users (so smaller countries such as UAE and Ireland are absent) and come from Newzoo's Global Mobile Market Report (the numbers were last updated in September 2018) and are based on a model which takes into account a countrys economic progression, demography, online population, and inequality.},
language = {en},
urldate = {2020-04-21},
journal = {Wikipedia},
month = apr,
year = {2020},
note = {Page Version ID: 950972111},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/ZFFKEBIL/index.html:text/html}
}
@misc{champeau_lcen_2011,
title = {La {LCEN} a enfin son décret sur les données à conserver par les hébergeurs},
url = {https://www.numerama.com/magazine/18191-la-lcen-a-enfin-son-decret-sur-les-donnees-a-conserver-par-les-hebergeurs.html},
abstract = {Le Gouvernement a fait paraître mardi au Journal Officiel un décret attendu depuis l'adoption de la loi LCEN de 2004, qui précise les données que doivent conserver les hébergeurs lors de la transmission ou de la modification de contenus en ligne, pour simplifier les enquêtes et poursuites judiciaires. Un décret qui vise aussi les services de partage de vidéos ou d'hébergement de blogs.},
language = {fr-FR},
urldate = {2020-04-21},
journal = {Numerama},
author = {Champeau, Guillaume},
month = mar,
year = {2011},
note = {Library Catalog: www.numerama.com
Section: Société},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/JSAMA6ME/18191-la-lcen-a-enfin-son-decret-sur-les-donnees-a-conserver-par-les-hebergeurs.html:text/html}
}
@misc{covidwatch,
title = {Covid {Watch}},
url = {https://www.covid-watch.org},
abstract = {We hope to slow the spread of infectious diseases like COVID-19 with crowdsourced data.},
urldate = {2020-04-22},
note = {Library Catalog: covid-watch.org},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/8FNYJT2A/article.html:text/html}
}
@misc{treguer__2019,
title = {La « ville sûre » ou la gouvernance par les algorithmes},
url = {https://www.monde-diplomatique.fr/2019/06/TREGUER/59986},
abstract = {Accès libre // par Félix Tréguer (juin 2019)},
language = {fr},
urldate = {2020-04-22},
journal = {Le Monde diplomatique},
author = {Tréguer, Félix},
month = jun,
year = {2019},
note = {Library Catalog: www.monde-diplomatique.fr},
file = {Snapshot:/home/quentin/Seafile/zotero/storage/M7VQ6PXU/59986.html:text/html}
}
@misc{ccc,
title = {{CCC} {\textbar} 10 requirements for the evaluation of "{Contact} {Tracing}" apps},
url = {https://www.ccc.de/en/updates/2020/contact-tracing-requirements},
urldate = {2020-04-23},
file = {CCC | 10 requirements for the evaluation of "Contact Tracing" apps:/home/quentin/Seafile/zotero/storage/FLTVELQB/contact-tracing-requirements.html:text/html}
}