Security


Internet of things  /  Article

IoT SAFE: eSIMs as a digital safe

Since connected objects often suffer from physical security weaknesses, they tend to be the gateway of choice for hackers. All it takes is buying a connected object, like a bike or camera, for example, or even finding one on the street and physically connecting to the object’s memory to be able to look for security […]


Internet of things  /  Article

Ewattch: Improving the performance of industrial sites at minimum cost

Today, industry in Europe faces an undeniable reality: With a century-old legacy, the vast majority of its factories are aging. For many manufacturers, cutting costs, surviving international competition and the need for remote supervision during the health crisis has meant starting the digitalization process, and that is before we even talk about Industry 4.0. “For those looking […]


Data  /  Folder

Cybersecurity: building a secure digital society

“There is one cyber attack every 39 seconds around the world”.


Internet of things  /  Article

Towards a common “language” for smart homes

At the end of 2019, the Connected Home over IP (CHIP) working group was set up under the umbrella of the Zigbee Alliance, bringing together major players in services (GAFA), distribution (Amazon, IKEA and others) and manufacturers of connected devices (including Samsung, Legrand and Somfy). The project aims to develop a unified and open standard […]


Networks and IT  /  Article

And encryption came out of the light!

Over the centuries, people have continually explored new encryption methods to keep sensitive information confidential, with one technique replacing another. The first methods were based on replacing letters or numbers. World War II saw the advent of encryption machines, including the famous Enigma. Since then, things have gained speed with advances in computing and, more […]


Internet of things  /  Article

The keys to analysis for navigating the world of IoT technology

Estimates of the number of connected things in the world vary but agree that the figure will exceed the number of people in the world. The growth of the IoT sphere has an obvious consequence: the enablers (tools) that support it are expanding, developing and shaping a complex technological landscape. Behind the acronym, there is […]


Internet of things  /  Article

Health, safety, and comfort at the heart of people flow management

The need to limit the number of people in a particular place so as to slow down the spread of COVID-19 has brought people-counting technologies to the fore and, more broadly, those of flow analysis and management. In the post-lockdown context, many museums, shops, businesses, etc. are turning to these technologies to apply physical distancing […]


Data  /  Folder

Folder: The new paradigm of cryptography

The increase in “deep fakes”, fraud, and cybercrime is threatening trust in the sincerity of the transactions that enable society to run on a daily basis, as well as in innovation and technical progress. The certification of data and transactions therefore remains essential, and cryptography meets this requirement. Its keys protect messages, thus guaranteeing the […]


Research  /  Blog

Dark patterns, an unacceptable downward spiral

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the “Confidence […]


Research  /  Blog

What are the measures against “dark patterns”?

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the “Confidence […]


Research  /  Blog

What are “dark patterns” and their impacts on personal data?

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the […]


Research  /  Blog

Orange and the quantum technologies for the security of data exchange

Quantum Physics: from everyday life applications to network security The word “quantum” relates to the world of the infinitely small, therefore the constituent elements of matter (molecules, atoms, particles, etc.). The objects around us respect the laws of classical physics for space and time: for example, if a car is traveling from point A to […]