Maybe we would care more if we knew just how many surprising insights can be gleaned from our online activity. https://edri.org/what-does-your-browsing-history-say-about-you/ https://labs.rs/en/browsing-histories/ https://edri.org/what-does-your-browsing-history-say-about-you/
— Permalien
The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various forms of content access control. But all this is poised to change. Now that the Snowden files have sensitized us to the level of such activities, we have become acutely aware that many of our tools are just way too trusting, way too chatty, and way too easily subverted. First and foremost in this collection of vulnerable tools is the Domain Name System.
— Permalien
Dans un avis remis au gouvernement, la Commission nationale de contrôle des techniques de renseignement (CNCTR) estime qu'il serait théoriquement possible pour les services de collecter les URL visitées par les internautes surveillés, mais uniquement si elles ne sont pas trop précises. Inextricable.
— Permalien
Just as Doctors can’t solve healthcare, Hackers can’t solve surveillance. Doctors can’t make human frailty disappear with some sort of clever medical trick. They can help mitigate issues, fight emergencies, they can be selfless, heroic. but they can’t, on their own, solve healthcare. One of the ways that Hackers can fight surveillance is to develop better cryptographic communications tools, and train people how to use them.. This is certainly critical work that hackers can contribute to, but we can’t, on our own, solve surveillance. Nothing that Hackers can do on their own can eliminate surveillance. [...] Hackers need to understand that there is no business model for secure mass communications. In order to achieve a society where we can expect privacy we need more hackers and hackerspaces to embrace the broader political challenges of building a more equal society.
— Permalien
Loss of privacy leads to loss of freedom.
Your freedom of expression is threatened by the surveillance of your internet usage – thought patterns and intentions can be extrapolated from your website visits (rightly or wrongly), and the knowledge that you are being surveilled can make you less likely to research a particular topic. You lose that perspective, and your thought can be pushed in one direction as a result. Similarly, when the things you write online, or communicate privately to others, are surveilled, and you self-censor as a result, the rest of us lose your perspective, and the development of further ideas is stifled.
Your freedom of association is threatened by the surveillance of your communications online and by phone, and your freedom of assembly is threatened by the tracking of your location by your mobile phone. Can we afford to risk the benefits of free association, the social change brought by activists and campaigners, or the right to protest?
These freedoms are being eroded, right now. The effects will worsen over time, as each failure to exercise our freedom builds upon the last, and as more people experience the chilling effects.
— Permalien
The author hesitated for a long time before publishing this article, because there are strong ethical issues. Documenting the effects of censorship can be seen as helping censors. For instance, if measurements show that censorship is very limited in practice, it may motivate some authorities to increase the pressure and its negative consequences. But I believe that censors are already better informed than the average citizen and that it is necessary to have factual information in order to have an informed debate in democracies.
Another big ethics issue concerns the measurements themselves. Is there a risk of endangering people who host a probe by doing DNS lookups for illegal/forbidden/questionable things (for instance DNS lookup for a porn site from a probe in Iran)? Today, the DNS is typically "under the radar" for most surveillance activities. Doing an HTTP request for an illegal site attracts attention to you in some countries (and it is one of the reasons why RIPE Atlas probes do not perform HTTP queries for arbitrary URLs), but it does not seem to be the case (yet) for DNS requests. (See RFC 7626, "DNS Privacy Considerations".)
— Permalien
The creator of PGP has moved his mobile-encryption firm Silent Circle to Switzerland to be free of US mass surveillance. Here he explains why. [...] “Every dystopian society has excessive surveillance, but now we see even western democracies like the US and England moving that way,” he warns. “We have to roll this back. People who are not suspected of committing crimes should not have information collected and stored in a database. We don’t want to become like North Korea.” [...] Today, his biggest worry is not software backdoors, but the petabytes (1m gigabytes) of information being hoarded by the likes of Google and Facebook. “If you collect all that data, it becomes an attractive nuisance. It’s kind of a siren calling out inviting someone to come and try to get it. Governments say that if private industry can have it, why can’t our intelligence agencies have it?”
— Permalien
Ultimate Privacy and Control for your Voice, Video and Chat Communications
— Permalien
L'Afnic travaille, notamment au sein du CENTR et de l'IETF, à améliorer la protection de la vie privée pour les utiisateurs du DNS. Le protocole DNS est un élément peu connu mais crucial de l'infrastructure de l'Internet. Aujourd'hui où les préoccupations sur la vie privée ont pris beaucoup d'ampleur, il est donc normal de se pencher sur la question « DNS et vie privée ». Tout utilisateur de l'Internet se sert abondamment du DNS, même s'il ne s'en rend pas compte, et même s'il ignore tout du DNS et des noms de domaine. À chaque fois que cet utilisateur envoie un message, qu'il clique sur un lien hypertexte, que son ordinateur met à jour ses logiciels, il y a une (et souvent bien plus d'une) requête DNS. Mais, autant les questions de vie privée liées au protocole du Web, HTTP, ont été longuement discutées (qu'on songe aux débats comme « faut-il une autorisation explicite de l'utilisateur pour placer des cookies ? » ou bien « l'adresse IP est-elle une donnée nominative ? »), autant celles liées au DNS ont été d'abord négligées, puis ensuite étudiées uniquement dans un petit cercle, essentiellement à l'IETF. La sortie prochaine du RFC « DNS privacy considerations » sera la première manifestation officielle de cet intérêt.
— Permalien
This demo secretly makes requests to STUN servers that can log your request. These requests do not show up in developer consoles and cannot be blocked by browser plugins (AdBlock, Ghostery, etc.).
https://github.com/diafygi/webrtc-ips
Firefox and Chrome have implemented WebRTC that allow requests to STUN servers be made that will return the local and public IP addresses for the user. These request results are available to javascript, so you can now obtain a users local and public IP addresses in javascript. This demo is an example implementation of that.
Additionally, these STUN requests are made outside of the normal XMLHttpRequest procedure, so they are not visible in the developer console or able to be blocked by plugins such as AdBlockPlus or Ghostery. This makes these types of requests available for online tracking if an advertiser sets up a STUN server with a wildcard domain.
— Permalien
A top EU official wants internet and telecommunication companies to hand over encryption keys to police and spy agencies as part of a wider crackdown on terrorism.
— Permalien
I’m in the process of moving back to a postfix/dovecot setup for hosting my own mail and I wanted a way to remove the more sensitive email headers that are normally generated when I send mail. My goal is to hide the originating IP address of my mail as well as my mail client type and version.
— Permalien
“We have seen the emergence of publicy as the default modality, with privacy declining. In order to ‘exist’ online, you have to publish things to be shared, and that has to be done in open, public spaces.”
— Permalien
Il est de notre responsabilité à tous de refuser ce genre de choses avant qu'elles ne deviennent banales...
— Permalien
Cette conférence s’intéresse à la protection de la vie privée sur Internet, notamment en sensibilisant le grand public aux dérives des grandes puissances d’Internet (en prenant pour exemple Google et Facebook) actuelles et potentielles. Elle parle également de NSA et autres organismes d’État. Licence <WTFPL 2.0>.
— Permalien
At the Hackers on Planet Earth conference next month, the Electronic Frontier Foundation plans to release software designed to let you share a portion of your Wi-Fi network, password-free, with anyone nearby. The initiative, part of the OpenWireless.org campaign, will maintain its own flavor of free, open-source router firmware called Open Wireless Router. Good Samaritans can install this firmware on a cheap Wi-Fi router, creating a public slice of bandwidth that can dialed up or down with a simple smartphone interface.
— Permalien
Google pense que « si [nous faisons] quelque chose [que nous souhaitons] que personne ne sache, peut-être [devrions-nous] commencer par ne pas le faire » et que « la vie privée pourrait en réalité être une anomalie ». Pourtant nous utilisons tous plus ou moins ses services et ceux des entreprises qui développent le même mode de pensée sur Internet. Mais au fait, n’avons-nous vraiment rien à cacher ?
— Permalien
On October 30 – 31, 2013, The New York Review of Books held a conference called "Power, Privacy, and the Internet," taking a look at the role of the Internet both as a vehicle of political and cultural dissent and, in the hands of the state, as a weapon of repression and control. The recordings from the event have recently been released where listeners can stream or download the audio.
Panel discussions include:
Governments, Corporations and Hackers: The Internet and Threats to the Privacy and Dignity of the Citizen
The Internet and the Future of the Press
The Internet, Repression and Dissent
The Internet, the Book, the University and the Library
The Internet, the Economy and Production
Keynote speakers included Robert Darnton, Librarian of Harvard, Joseph Lelyveld, former Editor of the New York Times. and Ken Roth, from Human Rights Watch.
— Permalien
Grâce à la générosité des soutiens ayant participé à son financement et de Benoît Musereau, qui l'a bénévolement réalisée, La Quadrature du Net publie aujourd'hui « Reclaim Our Privacy », une courte vidéo abordant les dangers qui menacent notre vie privée, l'importance de protéger ce droit fondamental, et enfin, proposant des outils pour en reprendre le contrôle. Si vous désirez participer à son financement, il est toujours possible de le faire ici. Les fonds collectés au-delà de l'objectif seront partagés équitablement entre Benoît Muserau et La Quadrature du Net. Cette vidéo est publiée sous licence CC BY-SA : partagez-la ou remixez-la librement ! <3
— Permalien
La Quadrature du Net lance une campagne de financement participatif pour la réalisation d'un film d'animation sur la vie privée, la surveillance de masse et l'importance de repenser notre relation à la technologie. Aidez-nous à financer ce projet !
— Permalien
Concern about privacy, and frustration over censorship and content blocking is driving millions to use anonymity tools
On these figures, Tor could be regularly used by as many as 45.13 million people. Its biggest userbase appears to be in Indonesia, where 21% of respondents said they used the tool, followed by 18% in Vietnam and 15% in India.
— Permalien
VOSTFR
— Permalien
À prendre avec humour, mais sans oublier qu'il y a quand même de vraies questions derrière :).
— Permalien
On this page, you will find a listing of various email service providers with specific information around security and privacy.
— Permalien
http://www.washingtonpost.com/world/europe/un-votes-to-protect-privacy-in-digital-age/2013/12/18/06f61dac-6832-11e3-997b-9213b17dac97_story.html
— Permalien
International Activism Conference
“Whatever happened to Privacy?” brought together international activists on focal topics and combined bar camp style work sessions and political round tables with a classic public event,
“Whatever happened to Privacy?” focussed on an issue which has far reaching consequences for politically active people across the world – the issue of privacy and surveillance.
The revelations around the NSA and GCHQ as well as other countries secret service digital surveillance activities have spurred political debate. This debate was intensified at “Whatever happened to Privacy?” formulating political demands, developing action strategies and debating questions such as:
What cultural and political value does privacy have today?
What are the societal implications of the wide spread “I have nothing to hide” attitude?
What political actions are necessary to protect citizens from mass surveillance and what tools exist for people to secure their communications, movements and lives?
— Permalien
Context
Finally, the French governement is going to react to the NSA mass spying. Just after the first article published by Le Monde (there might be a paywall). Technically, it's nothing really new since we've read the same for Mexico, England and Germany those last days - use your search-engine fu to find related articles.
Oddly enough, 6 month after the first revelations, the French Foreign Ministry has summoned immediatly the NSAWUS ambassador to talk about it. AT the time I'm writing this, the results of the meetings are not yet public (and I don't even know if the US Ambassador will answers at all) but, in the end, nothing will change.
Also, we currently have, in France, yet another debate around yet another expulsion of yet another school girl (directly from school) and a lot of discontent about or Ministry of Interior. I'm not thinking the summoning of the US ambassador is done only to try to heave people forgetting about this issue, but the timing is troubling.
[...]
And now what?
Nothing. Since everyone except citizens is wining on this mutual sharing of mass surveillance system informel deal I do not except things to change in a short term.
However, there is some good news. First, peering deals, and a lot of the necessary system to maintain internet, are out of reach of the different governement. The informal way that governs them doesn't helps for regulation and controls by governement (that's why they seek for it). You still have to keep your data out of big datacenter, but that's not that hard (have a look at yunohost for hosting most of your data) the social networking part is the biggest and hardest one I think - alongside with search engine, but at least you have duckduckgo.
Second, a lot of governement, starting by South American one are really upsets and are starting to act. The Internet Governance summit held recently in Brazil also gave some hopes about the Internet still staying out of control. I'm not sure it will be followed by impact, because the NSA spying is possible due to some key infrastructures issues, but it's a start.
I'm quite disapointed that the EU didn't follow the Brazil on this, since we have some good infrastructure and technologies to help. But then again, I do not think those US/EU commercial agreement will cease for the benefits of citizens or sovereignity they have too much industrial and bank pressure on them.
But as always, nothing will come from the politicians. They must knew about the NSA spying in France and they even collaborate or they're dangerously incompetent. They benefit from it because it's a coercion measure (the same way CCTV cams are) and industrial groups earns money doing it. Even if they o have gag orders. They would have been motivated for your privacy, they would have fight those gag orders.
And that's why nothing new will emerge from this meeting between the french foreign ministry and the - currently in shutdown - US embassy.
— Permalien
Avec J.Appelbaum
— Permalien
Defending yourself against the NSA, or any other government intelligence agency, is not simple, and it's not something that can be solved just by downloading an app. But thanks to the dedicated work of civilian cryptographers and the free and open source software community, it's still possible to have privacy on the Internet, and the software to do it is freely available to everyone. This is especially important for journalists communicating with sources online.
— Permalien
If you ask me, privacy may very well be the next big thing.
— Permalien
WHILE MESH networks were created to solve an economic problem, it turns out they also have a starkly political element: They give people—particularly political activists—a safer and more reliable way to communicate.
As activism has become increasingly reliant on social networking, repressive regimes have responded by cutting off internet access. When Hosni Mubarak, for instance, discovered that protesters were using Facebook to help foment dissent, he ordered the state-controlled ISPs to shut down Egypt's internet for days. In China, the Communist Party uses its "Great Firewall" to prevent citizens from reading pro-democracy sites. In the United States, authorities have shut down mobile service to prevent activists from communicating, as happened a couple of years ago during a protest at San Francisco subway stations. And such reactions aren't only prompted by dissent. Some of the big phone and cable companies have begun to block digital activities they disapprove of, like sharing huge files on BitTorrent. In 2009, the recording industry even persuaded France to pass a law—since declared unconstitutional—that canceled the internet service of any household caught downloading copyrighted files more than three times.
— Permalien
La foudre est venue de Consumer Watchdog une puissante association qui défend les intérêts des consommateurs, suite à une réponse de Google face à ces accusations. Consumer Watchdog explique que les internautes qui se préoccupent de la confidentialité de leurs échanges ne devraient pas utiliser Gmail
— Permalien
Werner Koch, auteur de GnuPG, a récemment donné une conférence aux RMLL intitulée Privacy 2013 : Why. When. How.
On y parle de chiffrement, de surveillance, de Tor, d'Edward Snowden, de Google, de Cloud, bref un très bon état de l'art sur le sujet. Le discours est relativement accessible et gagne à être connu d'un plus large public. La dernière partie de la conférence donne des recommandations pour l'utilisation quotidienne d'Internet.
Les groupes Transcriptions et TradGNU de l'April ont travaillé conjointement à une version française.
Une transcription anglaise est en cours de finalisation. De l'aide pour une version en sous-titrage serait également bienvenue.
Sur le même thème, on pourra lire une interview de Jérémie Zimmermann, de la Quadrature du Net.
Texte de la conférence : https://www.april.org/vie-privee-en-2013-pourquoi-quand-comment-par-werner-koch
Vidéo :
http://video.rmll.info/videos/privacy-2013-why-when-how/#quality=hd&player=html5
http://www.beuc.net/tmp/rmll/privacy/orig/fixed_audio/k1105-privacy-2013-why-when-how_high-fixed_audio.webm (meilleure qualité sonore)
Interview de Jérémie Zimmerman par Thinkerview : https://www.april.org/thinkerview-juin-2013-interview-de-jeremie-zimmermann
Vidéos transcrites par l'APRIL : https://www.april.org/videos
— Permalien
The Four Horsemen of the Infocalypse is a term for internet criminals, or the imagery of internet criminals.
A play on Four Horsemen of the Apocalypse, it refers to types of criminals who use the internet to facilitate crime and consequently jeopardize the rights of honest internet users. There does not appear to be an exact definition for who the Horsemen are, but they are usually described as terrorists, drug dealers, pedophiles, and organized crime. Other sources use slightly different descriptions but generally refer to the same types of criminals. The term was coined by Timothy C. May in 1988, who referred to them as "child pornographers, terrorists, drug dealers, etc."[1] when discussing the reasons for limited civilian use of cryptography tools. Among the most famous of these is in the Cypherpunk FAQ
http://www.swiss.ai.mit.edu/6805/articles/crypto/cypherpunks/cyphernomicon/CP-FAQ
http://www.firstmonday.org/issues/issue12_8/carey/index.html
http://web.archive.org/web/20061029141026/http://www.shipwright.com/horsemen.html
http://news.slashdot.org/comments.pl?sid=650749&cid=24666825
http://www.cybersociology.com/files/6_publicandprivatesecurity.html
http://www.news.com/8301-13578_3-9795316-38.html
http://www.theinquirer.net/en/inquirer/news/2004/02/27/ecrimes-of-the-century
— Permalien
Two senior Google employees recently acknowledged that the company's products do not protect user privacy. This is quite a departure from the norm at Google, where statements about privacy are usually thick with propaganda, mistruths and often outright deception.
— Permalien
But we don’t, or haven’t, obviously. Maybe because of stupidity. How many congressmen could even describe how encryption works? Maybe because of cupidity. Who within our system can resist large and lucrative contracts to private companies, especially when bundled with generous campaign funding packages? Or maybe because the “permanent war” that Obama told us we were not in has actually convinced all within government that old ideas are dead and we just need to “get over it”—ideas like privacy, and due process, and fundamental proportionality.
These ideas may be dead, for now. And they will stay dead, in the future. At least until we finally learn how liberty can live in the digital age. And here’s the hint: not through law alone, but through law that demands code that even the Electronic Frontier Foundation could trust.
— Permalien
Petite démonstration de ce qu'on peut faire avec les fameuses metadatas.
— Permalien
Opt out of PRISM, the NSA’s global data surveillance program. Stop reporting your online activities to the American government with these free alternatives to proprietary software.
— Permalien
In light of the recent NSA PRISM scandle, we've compiled a list of tools that you can use to maintain your privacy online.
Keep in mind that many of these technologies are developed by the open-source community. If you want to see their continued production, they could use your support. Consider donating to the EFF, Mozilla Foundation, or directly to developers with a service like gittip.
If we've missed anything, make a note in the comments. Cheers to safe browsing.
— Permalien
I'm going to start with three data points.
One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.
Two: Hector Monsegur, one of the leaders of the LulzSac hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up.
And three: Paula Broadwell, who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels -- and hers was the common name.
The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period.
Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays. Everything we do now involves computers, and computers produce data as a natural by-product. Everything is now being saved and correlated, and many big-data companies make money by building up intimate profiles of our lives from a variety of sources.
So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites.
And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant.
Welcome to an Internet without privacy, and we've ended up here with hardly a fight.
— Permalien
application web de partage de fichiers avec un peu d'intimité - Coquelicot est une application web qui permet de partager des fichiers en « un clic » avec un peu d'intimité. Le principe est simple (et déjà connu par ailleurs) : après avoir envoyé un fichier, l'application répond une URL que l'on peut diffuser pour que d'autres gens le récupèrent. Coquelicot essaye de protéger, jusqu'à un certain point, les personnes qui l'utilisent et les admin. sys. d'attaques passives ou peu ciblée qui révèleraient les fichiers échangés. Les données sont par exemple directement chiffrées au fûr et à mesure qu'elles sont reçues par l'application et déchiffrées à la volée lors des envois. Coquelicot est développé sous licence AGPL.
— Permalien
Quand vous naviguez sur Internet, pouvez-vous dire qui collecte des informations à votre sujet, quelle est la nature de ces informations et qui peut y avoir accès ? Pouvez-vous contrôler qui peut savoir quoi de vous ? La Commission européenne a proposé de vous en donner le pouvoir, mais le Parlement européen, sous la pression des lobbies de l'industrie, risque de voter autrement.
— Permalien
More broadly, Schmidt and Cohen do have plenty of warnings about the way things are going – for instance, over governments’ tendency, even in democracies, to increase surveillance of the population. “You have to fight for your privacy, or you will lose it,” Schmidt insists. “Whenever there’s a conflict, the logic of security will trump the right to privacy.” He also talks passionately about the need to balance entrepreneurial freedom and regulation, citing the way that the US railroad system was mired in corruption when it was left to private interests, and starved of innovation when the government cracked down.
Yet at heart, Google’s executive chairman is something of an optimist. He doesn’t subscribe, for example, to the idea that technology is somehow transforming our nature: the internet, he says, “is just another tool for empowering individuals”. I mention Time magazine’s recent suggestion that the web’s delivery of what you want, when you want, is turning young people into narcissists, and he makes a pained face. “To argue that this generation is different is to ignore history,” he insists. “Read the coverage about the King’s Road in the Sixties, and the pop revolution. You want to talk about narcissism? Those people all grew up, and they’re all 65 or 70 years old, and they all seem to have perfectly fine lives.”
— Permalien
The new law would help you decide who gets your data, what they can do with it and who they can give it to. You will be able to find out what's happening to your personal information more easily. You'll then be able to object to what's going on, have your personal information erased or get it back from businesses.
— Permalien
C'est reparti pour un tour. Aux États-Unis, la commission permanente du renseignement rattachée à la Chambre des représentants vient d'approuver la proposition de loi CISPA (Cyber Intelligence Sharing and Protection Act) par dix-huit voix contre deux [...] Le texte vise à améliorer la circulation des informations entre les entreprises, le gouvernement américain et les agences fédérales du pays, afin de mieux combattre les menaces de nature informatique. Cependant, ses détracteurs estiment que dans sa rédaction actuelle, la proposition de loi nuit gravement à la liberté d'expression, à la vie privée et à la neutralité du net.
— Permalien
Pressés, distraits, la plupart du temps nous ne faisons pas attention aux trop complexes conditions générales d’utilisation que nous acceptons. Nous échangeons nos données personnelles contre un service ou un avantage qu’on ne peut pas toujours négocier ou refuser. [...] Nous sommes constamment invités à prendre des décisions sur des données personnelles au milieu d’une foule de distractions, comme un e-mail, une notification Twitter ou des demandes qui n’ont rien à voir avec le contexte. Si l’expérience d’Acquisti est correcte, ces distractions peuvent nuire à notre sens de l’auto-protection quand il s’agit de la vie privée.
— Permalien
La Stasi, c’était 91000 agents et 170000 mouchards. Facebook, c’est 2000 agents employés, et 1 milliard de mouchards. Ah ben oui, vous croyez quoi ? Votre profil Facebook enregistre vos données personnelles, mais aussi toutes celles des personnes qui entrent en contact avec vous.
— Permalien
Une de plus ! La commission des affaires juridiques (JURI) a voté l’avis de la rapporteur Marielle Gallo sur la réforme de la protection des données en Europe. Par 14 voix pour, 6 contre et 4 abstentions, elle rejoint trois autres commissions du Parlement qui ont déjà donné un feu vert à ce chantier. Le texte part désormais devant la Commission des libertés civiles, compétente au fond avant un examen en séance plénière.
— Permalien