364 private links
Le broker MQTT de Meari était ouvert depuis 1 041 jours sans mot de passe !
En entrant par cette porte laissée ouverte, Sammy s'est retrouvé face à un tableau de bord EMQX qui liste en temps réel tous les babyphones connectés dans le monde. On sait ainsi qui est en ligne, depuis quand, et surtout ce que filme chaque caméra. Pour le démontrer concrètement, il a développé un petit outil (CloudEdge Babyphone PoC) capable de cibler n'importe lequel de ces appareils.
Liste des marques impliquées: https://drive.google.com/file/d/1tg_Piq13wNyH5niZe_WwuoeAOvZ0sgPR/view
Je ne sais pas si c'est sain, de promouvoir les élections de cette manière. Cela ressemble à de la manipulation.
Où est l'éducation civique et l'engagement ?
Quelques applications concernées: WeWard, Tinder, Leboncoin, Blablacar, Lime, Bolt, ou encore sur la chaîne des musiques urbaines Trace TV.
« Mais depuis plusieurs années, la parole institutionnelle a du mal à passer, constate Michaël Nathan »
Ah bien! Mais utiliser ce genre de partenariat pour la vie publique semble toujours malsain... Pourquoi la parole institutionnelle a du mal à passer d'abord ?
Ce qui me travaille est surtout que l'État dépense pour ces communications, alors que cela devrait fonctionner normalement.
Provide the city and more informations based on the ZIP code and the country.
Country -> Zip -> ...
Autocompletes the user input to avoid errors.
- Use
inputmode="numeric"for a ZIP code - work with autofill and its
autocompleteattributes:postal-code,address-line1,country - country first in case of international addresses
See the service for it: https://api.zippopotam.us/
Every time a tool has transitive dependencies, it got:
- Reproducibility. The tree can resolve differently each time, so you need a lockfile to record what you got.
- Supply chain amplification. A single compromised package deep in the tree can cascade outward through every project that depends on it.
- Override and exclusion. Users need mechanisms to deal with transitive dependencies they didn’t choose and don’t want.
- Mutable references. Version tags that can be moved, rewritten, or force-pushed mean the same identifier can point at different code tomorrow.
- Full-tree pinning. Pinning your direct dependencies means nothing if their dependencies use mutable references.
- Integrity verification. You need to know that what you’re running today is the same thing you ran yesterday.
This video was released by #Forbrukerrådet, the Norwegian #Consumer Council, a few days ago. It imagines the career trajectory of an "enshittificator"
It was hard for him to enshittify minor aspects of daily life in person, but became easy for him to do so at scale once he embraced the #Internet and #technology
Another one
I really enjoy the examples provided on the page.
Fitts's Law
The time required to move to a target is a function of the target's size and distance from the starting point.
The target such as buttons must be bigger.
HIck's law:
The time it takes to make a decision increases with the number and complexity of choices.
Miller's law:
The average person can hold about 7 (plus or minus 2) items in working memory at any given time
Format the informations correctly (Phone, Card, Social, Serial, Currency)
Doherty Threshold:
Productivity soars when a computer and its users interact at a pace that ensures neither has to wait on the other. The threshold is 400 milliseconds.
I would say "instant" is reach under 200ms
Postel's law:
Be conservative in what you send, be liberal in what you accept.6
The more formats you accept, the less friction people experience. Validate generously, format strictly.
6.6kW of power with 18 panels.
Attention: les données proviennent de Wikipédia et sont traitées par IA afin d'être affichée tel quel sur le site.
il y a certain manquement, comme par exemple les condamnations de Mélenchon. La présentation sous forme d'hémicycle est trompeur, puisqu'il n'y a pas que des députés dans la liste.
Bloquer les IPs lisant des wordpress douteux, des .php sur un site statique, etc...
Forbid AI to consume the project. A no-agents.md file.
22 vulnerabilities found and 14 marked as high-severity
A post is also available on mozilla's blog:https://blog.mozilla.org/en/firefox/hardening-firefox-anthropic-red-team/
C'est fait.
The collateral of the investments is the hardware. The same hardware that will be worth nothing after three years... unless the price of the new hardware goes up. So these companies have interest into increasing the hardware prices.
The timing is awfully convenient for the tech companies.
Indeed Rust is efficient. Postgres also covers a lot of features.