383 private links
12 GW de fossile (qui n’est que la première partie du projet : au total Scholz voulait 24 GW, et certains parlent même de 30 GW).
Alors qu’ils ont fermé ~25 GW de nucléaire en 25 ans¹.
Par contre il ne faut pas dire que leur nucléaire est remplacé par du fossile, car c’est pas vrai. Fin de la blague.
Ah, il paraît que c’est juste un backup. On lance les paris ?
Parce que bon, qui va dépenser des dizaines de milliards pour un truc qui ne fonctionnera qu’en plan B, surtout quand on est religieusement convaincu que leur plan A est le meilleur du monde ?
Et les allemands veulent être neutre en carbone en 2045-2025 ?
The moral of both stories is that there is worth in what seem to be boring or painful experiences. Effort has intrinsic value.
Value isn't replaceable. AI is a great tool only if it's used correctly:
- treat generated code as ephemera rather than the finished product
- review every line, increasing our skillset at the same time
- solve new problems and build new instincts
As written in another post:
- Never let an LLM speak for you
- Never let an LLM think for you
A microblog of notes, musings, WIPs, and TILs
That's minimalistic and practical
Un formulaire et un site afin de partir des services mails de Google
Alternatives trouvées pour un particulier: Proton, Infomaniak, OVH, Migadu et Fastmail
La CNIL condamne Intersport – pardon, une « société X » – à 3,5 millions d’euros d’amende pour des manquements au RGPD et à la loi Informatique et libertés. Le nom de l’entreprise n’est pas donné pour ne pas « fragiliser son équilibre commercial ainsi que la confiance de ses adhérents », mais la piste est relativement facile à remonter. On vous explique comment.
Le rapport était normalement anonymisé mais les journalistes de Next ont pu retrouver la source avec un peu d'investigation sur Internet (nom La Team X, suivre le lien en savoir plus sur vos droits, puis avoir la confirmation sur la wayback machine)
En cause, les « règles de complexité des mots de passe des comptes utilisateurs n’étaient pas suffisamment robustes ». La formation restreinte rappelle aussi que « la fonction de hachage SHA-256 ne permettait pas un stockage sécurisé des mots de passe ».
De plus, 11 cookies soumis à consentement étaient déposés sur le terminal avant même que l'utilisateur ai pu faire un choix.
The goal was to show how you can use patterns from the GOV.UK Design System to design complex case working systems.
The prototype was complete user flows with URL changes. No validators, only examples of flows with the existing design system.
That’s 100x harder to do with Figma. The audience is focused on the Figma navigation instead of experiencing the design. It also hides problems: transitions, loading states, error states adn edge cases.
Chacha20 can sue 192-bit nonces with a 256-bit key. A single function returns the key, the authentication key and the nonce.
The name changes in order to avoid arguing why ChaCha12 is as secure as ChaCha20, because the implementation is compatible with it.
The final specification https://kerkour.com/chacha20-blake3 and the research used https://kerkour.com/chacha20-blake3 can be helpful.
Utile peut-être pour plus tard
500 000 jobs in eu until 2032
Data is carelessly collected, stored on insecure servers, shared to countless subcontractors and sold to advertisers. Billions of $ / € and millions of hours are lost every year to the fraud resulting from these data breaches and abuse of trust.
If the past years have taught me something, it is that our digital infrastructure was not designed to withstand attacks from criminals from all around the world, invaders and internal threats aiming for total control and unchallenged power through mass surveillance.
Note that the Rust uses C bindings under the hood.
In 2023, ssh added keystroke timing obfuscation. The idea is that the speed at which you type different letters betrays some information about which letters you’re typing. So ssh sends lots of “chaff” packets along with your keystrokes to make it hard for an attacker to determine when you’re actually entering keys.
Créer ses propres cartes de villes en image, imprimables et toute belles.
Ok, that's funny
Shadcn makes the radio button overly complex, even if <input type="radio" name="beverage" value="coffee" /> with 30 lines of CSS is enough.
The library uses 3 imports (and 2 components) and 45 lines of code and ARIA.
So what does all this mean for American users—including conservative dissidents—who believe that Signal is a secure application for communication? It means that they should be cautious. “Maher’s presence on the board of Signal is alarming,” says national security analyst J. Michael Waller. “It makes sense that a Color Revolutionary like Maher would have interest in Signal as a secure means of communicating,” he says, but her past support for censorship and apparent intelligence connections raise doubts about Signal’s trustworthiness.
As she once explained, she abandoned the mission of a free and open Internet at Wikipedia, because those principles recapitulated a “white male Westernized construct” and “did not end up living into the intentionality of what openness can be.”