325 private links
Key features:
- (mostly) Static memory management
- Advanced type system
- LLVM-backed compiler with "write once, run anywhere"
- Open governance and decentralized development
There are drawbacks:
- weird proposals
- the compiler uses a lot of resources
- the syntax can be heavy sometimes
- it's anemic standard library. It's a nightmare of supply chain security. The rust needs an official extended standard library packages for all the most common tasks: base64, crypto, rand, uuid...
Haha, Rust
I have the same feeling. There is currently no alternatives to Firefox. All "alternatives" are chromium-based browsers that does not help in the long-term.
I still have hope for LadyBird or Servo.
GreyNoise watches the internet's background radiation—the constant storm of scanners, bots, and probes hitting every IP address on Earth. We've cataloged billions of these interactions to answer one critical question: is this IP a real threat, or just internet noise? Security teams trust our data to cut through the chaos and focus on what actually matters.
The website design changes every time it loads.
ul.notes li {
list-style-type: "Note: ";
list-style-position: inside;
}
The ::marker pseudo-selector can be used to customize the rest. Generating content for markers is supported by Chromium and Firefox, but not by WebKit.
A list of symbols can be used with symbols(). The browser support is not great though. @counter-style can be used instead. It's Baseline Newly Available since 2023.
There is also the old ::before trick to set custom contents.
As summary:
| CSS | Use Case |
|---|---|
| list-style | Changing the basic bullet styles or numbering system. Using a Unicode symbol, emoji or text in place of a bullet. Using images for bullets. |
| li::marker | Colouring the numbering or bullets differently to the list text. Changing the font- properties of the numbering (but not its size unless the difference is subtle). |
| symbols() | Only supported by Firefox, use @counter-style instead. |
| @counter-style | For defining your own sequence of bullet symbols (not images) or a completely customised numbering system. |
| extends | Used within @counter-style to modify existing numbering systems, for example to change or remove the default ”.” suffix. |
| li::before | For complete control over marker positioning, especially if your bullets or numbering are much larger than the list text. |
An example of backend project built with Axum to consume databases and provide a UI for it
An IPv6 can de divided into 3 pieces:
- 48 or more bits of network identifier (also known as the subscriber prefix)
- 16 or fewer bits of subnet identifier
- 64 bits of interface identifier
The RFC mentioned can be obsolete, but are kept up to date at
Using MAC adresses was flawed, and location data was too. The randomization defined in RFC 30411 was then refined in RFC 7217. Here comes the SLAAC protocol.
Steps:
- Calculating a link-local address
- Link-local Duplicate Address Detection (DAD)
- Locating a router (by sending a Router Advertisement (RA) message)
- Calculating a routable address
DHCPv6 (RFC 3315) solves also the domain name association with IPv6 while distributing additional information.
There is an address renegotiation to preserve privacy.
Slaac is vulnerable to RA spoofing, and DNS spoofing. The proposed solution is to use IPsec, but it's complicated to deploy. SEcure Neighbor Discovery introduced a dedicated cryptographic authentication protocol for network discovery.
Another potential issue is that a network device can respond with Neighbor Advertisement packets for every Neighbor Discovery it sees. This will effectively block any device from completing Duplicate Address Detection, hence blocking SLAAC from completing. Preventing this attack is a current research topic 1, 2, 3
Persona’s exposed code compares your selfie to watchlist photos using facial recognition, screens you against 14 categories of adverse media from mentions of terrorism to espionage, and tags reports with codenames from active intelligence programs consisting of public-private partnerships to combat online child exploitative material, cannabis trafficking, fentanyl trafficking, romance fraud, money laundering, and illegal wildlife trade.
Once a user verifies their identity with Persona, the software performs 269 distinct verification checks and scours the internet and government sources for potential matches, such as by matching your face to politically exposed persons (PEPs), and generating risk and similarity scores for each individual. IP addresses, browser fingerprints, device fingerprints, government ID numbers, phone numbers, names, faces, and even selfie backgrounds are analyzed and retained for up to three years.
We are cooked by this
Les captures montrent des accès à plusieurs outils internes de la Gendarmerie :
- Recrutement : gestion et consultation de dossiers de candidatures
- Gendform : plateformes de formation
- Oryx : outils de reconversion professionnelle
Les captures montrent également un accès au compte Keycloak du ministère, le système central qui gère l’authentification et les autorisations vers de nombreux services internes de l’État.
Ainsi qu'une capture d'écran au compte MindefConnect qui configure le 2FA aux applications.
Le risque principal n’est donc pas “des sites gouvernementaux hackés”, mais la compromission d’identités d’agents, susceptible de provoquer un effet domino sur des systèmes sensibles de l’État.
On December 12, 2025, PayPal identified that due to an error in its PayPal Working Capital ("PPWC") loan application, the PII of a small number of customers was exposed to unauthorized individuals during the timeframe of July 1, 2025 to December 13, 2025
The data breach involves 100 customers