Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
Toutes nos fiches > Unencrypted messaging
Published on 08/27/2025

Encrypted messaging, in plain English
DEFINITION

Encrypted messaging is a service enabling messages to be exchanged confidentially using encryption algorithms. Only the sender and recipient can read the message, which is encrypted before it is sent and decrypted with a key after it is received.

In principle, even the service provider cannot access the content of the messages, as it does not possess the necessary keys.

THE CONTEXT

The regulation of encrypted messaging aims to balance privacy, data security and the needs of the authorities. No single text governs it: it is based on a range of laws such as the RGPD, the ePrivacy directive, the Postal Code, or the law on cybersecurity (NIS2).

The use of these messaging systems by criminals raises questions about access to encrypted content, which have often been debated, particularly during recent legislative discussions on combating drug trafficking.

THE CHALLENGESCLARIFICATION
Encryption securityThis model depends entirely on key management. If it is strictly adhered to, the service provider has no way of accessing the content of the messages. However, in many cases, the encryption keys are created, managed and even stored by the provider's servers, even if only temporarily. In these situations, the provider can technically access the messages. End-to-end encryption is therefore only truly protective if key management is strictly local, on the users' devices, and if no copy of these keys is accessible to the provider.
The question of backdoorsThis is a mechanism that is deliberately integrated into a computer system, enabling a specific authority or actor to access it, even if the system is encrypted or protected. This mechanism is highly controversial from the point of view of the protection of fundamental rights, in particular the right to privacy. In 2024, the European Court of Human Rights underlined the illegality of systematic backdoors.
National security VS Right to privacyEncrypted messaging illustrates the persistent tension between the imperatives of national security and respect for privacy. While it guarantees the confidentiality of communications for citizens, it considerably complicates access to evidence as part of cybercrime investigations, particularly into drug trafficking or child pornography.
ANALYSIS
Nicolas Abrioux, Security Governance Leader at Cloud Temple

"The use of encrypted messaging raises another issue: that of trust. Whether it's the publisher, the host or the authorities, there will always be someone likely to interfere with your encrypted communications. The question is therefore to know who you are trusting, and for what types of exchanges. Where is the data stored? Who designs the messaging system, and how secure is it? Who manages the infrastructure, the encryption keys and the messaging terminals? Not all messaging uses present the same security challenges. As a result, hybrid approaches may be appropriate: practical solutions for ordinary use, sovereign or enhanced tools for the most sensitive exchanges.

NEXT STEPS

Article 8 ter of the anti-narcotics bill provided for the imposition of an obligation on providers of encrypted messaging services to make the content exchanged accessible in the event of an investigation, including by technical means.

It aroused strong opposition from the digital industry, which saw it as a direct threat to the right to privacy. Finally judged to be disproportionate and technically unrealistic, the article was withdrawn before the law was promulgated on 13 June 2025.


Receive the latest cloud news
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.