316 private links
Bref, comme j'écris beaucoup sur les RFC, je vais m'en tenir à la terminologie des RFC, où « échange de clés » (key exchange) désigne toutes les méthodes d'établissement de clé et où « encapsulation de clé » est un sous-ensemble des méthodes d'échange de clés.
Dark mode : pourquoi le consensus est-il si difficile à atteindre ? - Akiani : le blog centré usages
Le mode sombre est optimal lorsque l'environnement est faiblement éclairé, l'écran de type OLED économise de l'énergie et pourrait aider à maintenir la productivité sous stress.
Le Dark Mode est perçu comme moderne, sophistiqué, high-tech et mystérieux.
Le light mode inspire confiance et professionnalisme.
Comment créer un bon dark mode:
- les teintes noires et blanches magiques pour le dark mode:
background-color: #181818; color: #fafafa; - augmenter la taille du texte (1.2rem / 20% plus grand pour le texte courant)
- utiliser des polices grasses, jamais de light, mais des graisses regular ou medium
- laisser le choix du dark ou light mode
Following https://piccalil.li/projects/personal-site/
The tools used are:
Obsidian, tldraw;, Affinity, Penpot, "HTML, CSS and web components", an internal software Navi for the pattern library, Astro, sugarcube.
Le post détaille le fonctionnement de YGGtorrent.
Concernant le système de paiement:
Le paiement redirige chaque minute vers un site différent.
Le schéma est le suivant : les paiements des utilisateurs transitent par des dizaines de faux sites e-commerce (les "shields" CardsShield), arrivent sur PayPal/Stripe sous l'apparence d'achats de t-shirts, puis sont convertis en crypto via PayGate.to et d'autres processeurs. Une fois en crypto, les fonds sont mélangés via Tornado Cash pour couper la trace, puis retirés vers des wallets anonymes.
Le catalogue est publiée sur https://ygg.gratis/
Next a en fait un article https://next.ink/225748/un-empire-bati-sur-le-racket-yggtorrent-ferme-30-go-de-donnees-dans-la-nature/
No event listeners. No state tracking. No ARIA updates handled in JavaScript. I focused the button, and the tooltip appeared. I pressed the Esc key, and it disappeared.
popovertargetconnects the button to a popover elementpopovertargetactionspecifies what should happen (show, hide, toggle as default)popoverdeclares an HTML element can be targeted bypopovertarget(ou.showPopover())
Note Floating UI already solves many of these issues. CSS anchor positioning should solve most of the layout stuff
Image generation, upscaler, enhancer, uncrop, enlarger, sharpener
À Paris, la moitié des élèves de 6e seront scolarisés dans le privé en 2035, d'après une étude - ICI
Plus d'un tiers des élèves à Paris sont scolarisés dans des écoles privées, pour atteindre la moitié en 2035.
Mais cette contraction ne touche pas les deux secteurs de la même manière. Comme le soulignent les auteurs, "confrontés à une saturation de leurs capacités d’accueil, les établissements privés maintiennent leurs effectifs malgré la baisse démographique, tandis que les établissements publics absorbent l’essentiel de la diminution".
« Ne jamais attribuer à la malveillance ce que la bêtise suffit à expliquer. »
Il y a aussi le corolaire: la loi de Grey:
À un degré suffisant, la bêtise ou l’incompétence sont indistinguables de la malveillance.
Cela confirme les théories conspirationnistes.
Similar to Excalidraw
The new users doesn't know how the technologies work. "They know how to use apps. They do not know what apps are. They know files exist somewhere, in the cloud maybe, or possibly inside the app itself — the distinction isn’t clear to them and they’ve never needed it to be."
And that’s the real damage. It’s not just end users who don’t know this stuff. It’s developers.
The smartphones initiated by Apple is also to a certain degree. The hardware is locked behind safety reasons, but "safety is the stated reason, revenue protection is the operational reality".
Google started Android as an opposition, but they added the Compatibility Test Suite, then Play Protect (treats every sideloaded app as a threat by default), then the long series if API deprecations, then changes to make bootloader unlocking harder with device-specific security keys. Then the Play Integrity API.
You paid for the phone. You own the phone. Google and its partners have decided that ownership does not include the right to modify it.
It leads to the more harder point: "The users who grew up on these platforms don’t know what they’re missing. They’ve never used a system where they were genuinely in control."
So they are only consumers. It has its own issue: "The problem is that users have been convinced to treat pervasive surveillance infrastructure as benign or beneficial, and to respond to any criticism of it as paranoia, technical elitism, or failure to appreciate convenience. The learned helplessness is the crisis."
Apple tells not to install Apps from outside the App Store because it's dangerous and people nod.
Microsoft's Recall feature was reintroduced quietly.
Algorithm does not encourage what is healthy and good for the people, but what converts to engagement. The correct response to this is to reject the algorithmic curation model and use information architectures that don’t depend on it. RSS still works. The actual response is to try to game the algorithm. To figure out what the system wants and feed it signals that will produce better outputs.
Technical literacy is valuable and we're losing the ability to audit It's the prerequisite for meaningful consent. We're losing resilience compared to the Google Reader case, the Twitter's API one. The builder pipeline is also losing: "Power users become developers. Tinkerers become engineers." Developers are only building within the platform constraints. The adversarial capacity to break platform lock-in has atrophied.
The technical community is mostly not going to fix it either, because most of it has retreated into professional specialization and has largely given up on the broader project of maintaining technical literacy outside the profession. The OSS community does important work but it communicates almost entirely with itself.
So what’s left is individual stubbornness. Which is not nothing. Organized individual stubbornness, pointed in the right direction, is how every important counter-cultural technical movement has worked.
So how? The answers relies in the following paragraphs. " It is an argument for being considerably angrier about it than most people currently are."
The NIS-2 directive is a EU norm to increase digital security. Here is the german version of it.