Security


Internet of things  /  Article

The keys to analysis for navigating the world of IoT technology

Estimates of the number of connected things in the world vary but agree that the figure will exceed the number of people in the world. The growth of the IoT sphere has an obvious consequence: the enablers (tools) that support it are expanding, developing and shaping a complex technological landscape. Behind the acronym, there is […]


Internet of things  /  Article

Health, safety, and comfort at the heart of people flow management

The need to limit the number of people in a particular place so as to slow down the spread of COVID-19 has brought people-counting technologies to the fore and, more broadly, those of flow analysis and management. In the post-lockdown context, many museums, shops, businesses, etc. are turning to these technologies to apply physical distancing […]


Data  /  Folder

Folder: The new paradigm of cryptography

The increase in “deep fakes”, fraud, and cybercrime is threatening trust in the sincerity of the transactions that enable society to run on a daily basis, as well as in innovation and technical progress. The certification of data and transactions therefore remains essential, and cryptography meets this requirement. Its keys protect messages, thus guaranteeing the […]


Research  /  Blog

Dark patterns, an unacceptable downward spiral

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the “Confidence […]


Research  /  Blog

What are the measures against “dark patterns”?

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the “Confidence […]


Research  /  Blog

What are “dark patterns” and their impacts on personal data?

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the […]


Research  /  Blog

Orange and the quantum technologies for the security of data exchange

Quantum Physics: from everyday life applications to network security The word “quantum” relates to the world of the infinitely small, therefore the constituent elements of matter (molecules, atoms, particles, etc.). The objects around us respect the laws of classical physics for space and time: for example, if a car is traveling from point A to […]


Research  /  Blog

Experimenting quantum key exchange over the Côte d’Azur

Orange is involved in the University of Côte d’Azur’s Quantum@UCA project on quantum cryptographic key exchange over a city network.


Research  /  Blog

How increasing the confidence in the eSIM ecosystem is essential for its adoption

A key challenge for the adoption of this new type of SIM card is.


Research  /  Blog

Privacy-preserving Artificial Intelligence

Summary When using data in a digital service, one should usually trade-off between data usage (ease of operation, performance) and data security (user privacy, data confidentiality). This article presents the case of advanced cryptographic techniques that brings a solution that reconciles these two conflicting objectives. A lot of use cases are relevant in this context, […]


Research  /  Blog

Draw to sign in

The PIN is dead, long live the PIN! Thanks to Artificial Intelligence (AI), your phone is now able to recognise your handwriting. A new mobile app developed by a team of researchers from Rennes, France [1] will allow you to log in by writing on your smartphone. Replacing the famous virtual keyboard used for typing […]


Data  /  Article

On the blockchain, there are flaws too

The risks facing the blockchain’s decentralised networks are applicational (via smart contracts) and user-related (via piracy and theft).