386 private links
Some interesting statistics.
Rust interact with other parts of the codebase through
- Rest API (56%)
- Language interop (44%)
- RPC (21%)
- WebAssembly /WASI (19%)
Projects developed in Rust are:
- CLI tools (40%)
- Systems programming (38%)
- Web development (35%)
- Desktop / GUI applications (21%)
- Network programming (17%)
- Embedded / IoT (12%)
- Academic /Scientific / Numeric (9%)
and more games, databases, DevOps, Security, data science / ML / AI, Blockchain, ...
As for why: write safer code, build high-performance applications, iterest or fun, improve skills and career opportunities (stay competitive in the industry), handle concurrency or multithreading safely, ...
How to learn?
- official rust documentation (95%)
- books (32%)
- video or podcasts (19%)
- online courses (12%)
- University or academic coursework (5%)
and employer-provided training, rust training companies, ...
- the engine of application state (instead of deferring it to the server), when possible
- web apps AND desktop apps: all in one
- a universal binary format
- reuse other tools in the browser such as
@ffmpeg/ffmpeg
Tauri reuses the system web view instaed of shipping the entirety of Chromium.
[...] If that scares you, remember that Figma, a ui design tool, took over the market with an app built on web technologies. Same for Visual Studio Code, Slack, Discord, Microsoft Teams, and an increasing number of apps nowadays. Always bet on the web!
This is how they build https://nemastudio.app/
The paper in question: https://aclanthology.org/2023.findings-acl.426.pdf
Gzip output could be used as input for LLMs. They won't be "Large" in this case and this is a perfect fit for less ressource consumption.
(via https://nicolas-delsaux.hd.free.fr/Shaarli/shaare/kyvTdw)
CryptPad is a great tool and I can only be relieved that the United Nations start to use it.
The project runs mainly thanks to research grants. Only 20% comes from donations or suscriptions.
The main selling poitn is it's easy for users to share encryption keys for sharing documents.
The first method — for those without accounts — works like this: When you create a document, a key is generated in your browser and stored locally in your computer or your encrypted drive. When you share this document with a user without a CryptPad account, a URL with a long string after the “#” is sent, containing both the address of the document and the encryption key. What is important is that all content in the URL after the “#” is never transmitted to the server, which means the encryption key stays private.
If you and the person with whom you are sharing both have accounts with CryptPad, you have the additional option to share content using CryptPad’s internal sharing mechanism. This allows sending the document keys in a public-key encrypted box that only designated recipients can open. [...] Also, CryptPad is even more private, because an important feature is that anyone who hosts your data will never have access to the encryption keys.
Another thing to remember is CryptPad will only be as secure as your computer and browser.
Also be careful with browser extensions, because these can snoop in your URLs.
Google, Microsoft, Amazon, X, and the entire tracking-based advertising industry rely on the “Transparency & Consent Framework” (TCF) to obtain “consent” for data processing. This evening the Belgian Court of Appeal ruled that the TCF is illegal. The TCF is live on 80% of the Internet.
Dr Johnny Ryan said "Today's court's decision shows that the consent system used by Google, Amazon, X, Microsoft, deceives hundreds of millions of Europeans. The tech industry has sought to hide its vast data breach behind sham consent popups. Tech companies turned the GDPR into a daily nuisance rather than a shield for people."
Infringements include failing to ensure personal data are kept secure and confidential, fail to properly request consent and TCF (Transparency & Consent Framework) uses "legitimate interest" wrong. TCF fails to provide transparency about data processing.
Firefox needs the revenue of Google
The integer used by the Django data model is an Int, but the database used BigInt. The discrepancy occured for the row IDs greater than the maximum value of the int.
Specifically, several tables—including this one—were specified as using an int for their primary key in Django, but used bigint in the real database.
Oniux uses the Linux namespaces to isolate parts of the technologies (network, file system, ...) of the running program.
oniux curl https://icanhazip.com
There’s a taste of “commercial frontend development” being less interested in shipping HTML that is valid and error-free than is our community of frontend developers.
There is few talks about HTML conformance, valid HTML, HTML validation or standards compliance.
L'organisation non-gouvernementale Noyb travaille bien à faire respecter le RGPD.
ce combat porte essentiellement sur la question de savoir s'il faut demander le consentement des gens ou simplement prendre leurs données sans leur consentement
Meta a commenté:
L'entreprise a ajouté : « les recours en série de noyb font partie d'une tentative d'une minorité bruyante de groupes activistes de retarder l'innovation en matière d'IA dans l'UE, ce qui nuit en fin de compte aux consommateurs et aux entreprises qui pourraient bénéficier de ces technologies de pointe ».
Alors forcément je me pose quelques questions :
Comment est-il possible, en 2025, de ne pas pouvoir signaler un arnaqueur en 2 clics, à l’heure où les arnaques deviennent monnaie courante ?
Comment est-il possible que des arnaqueurs utilisent des numéros de téléphone en 01 ? Sans que ça dérange l’Arcep, peut-être trop occupée à fliquer les particuliers pour qu’ils ne téléchargent pas des torrents sur leur ordi.
Comment est-il possible de laisser ces truands s’amuser en toute quiétude ? Alors que nos connexions internet sont de plus en plus surveillées et des contenus en ligne censurés.
Redirect some websites to website proxies (Invidious for Youtube).
99 Luftballons
Un site bien chouette de cartes alternatives aux cartes de territoire habituelles.