Daily Shaarli

All links of one day in a single page.

May 17, 2025

Les taux monétaires directeurs | Banque de France
Ardoise

Continuant Scribouilli, Ardoise "va télécharger le dépôt fourni, l'analyser et générer le site. Puis, Ardoise publie le site à une adresse correspondant au nom du dépôt. Par exemple, si le dépôt s'appelle "citron", le site sera disponible à l'adresse : https://citron.ardoise.net/"

Ardoise est un outil libre permettant à tout un chacun de publier un site statique en ligne.

Ardoise est un projet né suite au constat qu'énormément de personnes utilisent les outils privateurs Github de Microsoft pour publier des blogs personnels, de la documentation de projets open-source et d'autres choses encore.

Suite à ce constat, le besoin de permettre à ces personnes de s'émanciper de cette nasse logicielle a grandi et les idées parfois floues ont abouties à un projet concret.

Bad Type Patterns - The Duplicate duck

Create a type similar to another existing type :O

Is Rust the Future of Programming? | The RustRover Blog

Some interesting statistics.

Rust interact with other parts of the codebase through

  1. Rest API (56%)
  2. Language interop (44%)
  3. RPC (21%)
  4. WebAssembly /WASI (19%)

Projects developed in Rust are:

  1. CLI tools (40%)
  2. Systems programming (38%)
  3. Web development (35%)
  4. Desktop / GUI applications (21%)
  5. Network programming (17%)
  6. Embedded / IoT (12%)
  7. Academic /Scientific / Numeric (9%)
    and more games, databases, DevOps, Security, data science / ML / AI, Blockchain, ...

As for why: write safer code, build high-performance applications, iterest or fun, improve skills and career opportunities (stay competitive in the industry), handle concurrency or multithreading safely, ...

How to learn?

  • official rust documentation (95%)
  • books (32%)
  • video or podcasts (19%)
  • online courses (12%)
  • University or academic coursework (5%)
    and employer-provided training, rust training companies, ...
The future of the web depends on getting this right

Firefox needs the revenue of Google

Nestlé obligé de retirer les filtres illégaux de ses usines
The Database Row That Did and Didn't Exist - The Future Is Now

The integer used by the Django data model is an Int, but the database used BigInt. The discrepancy occured for the row IDs greater than the maximum value of the int.

Specifically, several tables—including this one—were specified as using an int for their primary key in Django, but used bigint in the real database.

Introducing oniux: Kernel-level Tor isolation for any Linux app | The Tor Project

Oniux uses the Linux namespaces to isolate parts of the technologies (network, file system, ...) of the running program.

oniux curl https://icanhazip.com

Entrainement des IA sur les données des européens : noyb menace Meta de class action - Next

L'organisation non-gouvernementale Noyb travaille bien à faire respecter le RGPD.

ce combat porte essentiellement sur la question de savoir s'il faut demander le consentement des gens ou simplement prendre leurs données sans leur consentement

Meta a commenté:

L'entreprise a ajouté : « les recours en série de noyb font partie d'une tentative d'une minorité bruyante de groupes activistes de retarder l'innovation en matière d'IA dans l'UE, ce qui nuit en fin de compte aux consommateurs et aux entreprises qui pourraient bénéficier de ces technologies de pointe ».

Accueil 🇫🇷 — Perrin Remonté - Cartographie - Photographie

Un site bien chouette de cartes alternatives aux cartes de territoire habituelles.

Les problèmes récurrents rencontrés par un arrêt de la Cour de Cassation, je rencontre en permanence avec le RGPD (@aeris) | imirhil.fr

Ou comment tous les monde se trompe entre la cour d'appel, la cour de cassation et la partie plaignante.

A Ledger In PostgreSQL Is Fast! - Paul Gross’s Blog
Qwant rachète le moteur de recherche « solidaire » Lilo.org - Next
Adactio: Journal—A tiny taxonomy of meetings

divergent meetings: goal is to generate idea

convergent meeting: goal is to come to a decision

chemistry meeting: there is no tangible output. The goal is to get to know one another.

These three should cover 90% of the possible meetings.

And if you’re trying to categorise a meeting and you find yourself thinking, “This meeting is mostly so I can deliver information” …that meeting should be an email.

Why I use WebAssembly - nasso
  • the engine of application state (instead of deferring it to the server), when possible
  • web apps AND desktop apps: all in one
  • a universal binary format
  • reuse other tools in the browser such as @ffmpeg/ffmpeg

Tauri reuses the system web view instaed of shipping the entirety of Chromium.

[...] If that scares you, remember that Figma, a ui design tool, took over the market with an app built on web technologies. Same for Visual Studio Code, Slack, Discord, Microsoft Teams, and an increasing number of apps nowadays. Always bet on the web!

This is how they build https://nemastudio.app/

RGPD : l’épineux sujet de la simplification - Next
EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis - Irish Council for Civil Liberties

Google, Microsoft, Amazon, X, and the entire tracking-based advertising industry rely on the “Transparency & Consent Framework” (TCF) to obtain “consent” for data processing. This evening the Belgian Court of Appeal ruled that the TCF is illegal. The TCF is live on 80% of the Internet.

Dr Johnny Ryan said "Today's court's decision shows that the consent system used by Google, Amazon, X, Microsoft, deceives hundreds of millions of Europeans. The tech industry has sought to hide its vast data breach behind sham consent popups. Tech companies turned the GDPR into a daily nuisance rather than a shield for people."

Infringements include failing to ensure personal data are kept secure and confidential, fail to properly request consent and TCF (Transparency & Consent Framework) uses "legitimate interest" wrong. TCF fails to provide transparency about data processing.

How Often Should We Speak About HTML Conformance? · Jens Oliver Meiert

There’s a taste of “commercial frontend development” being less interested in shipping HTML that is valid and error-free than is our community of frontend developers.

There is few talks about HTML conformance, valid HTML, HTML validation or standards compliance.

Comment dompter la hauteur de ligne en CSS - YouTube
LibRedirect – Adoptez cette extension pour 🦊 Firefox (fr)

Redirect some websites to website proxies (Invidious for Youtube).

Scu, bousier jovial : « @LoboTom@mastodon.social @serenity@rivals.space … » - Piaille

99 Luftballons

Parcours d'une noob des internets - Pas Sage en Seine

Un témoignage d'une personne qui a tout appris sur le tas

Scribouilli

Un service d'hébergement simple à prendre en main (pour des non-initiés)

(via PSES 2024 https://video.passageenseine.fr/w/73BkMhTGTRzHrTiSeZQ5yT)

ULID Identifiers and ULID Tools Website - Paul Gross’s Blog

Great for many usages.

Numeric IDs take up a lot less space though. ULIDs are a bit long, which is inconvenient for URLs and sometimes, it's undesirable to expose when an ID was created.

What is HDR, anyway?
Rust nightly features you should watch out for
  • gen blocks: similar to python generators as far as I understand. They are lightweight compared to the classic Iterator pattern
  • default field values (and avoid new() for it)
  • inner structs
  • never type
  • try expressions

The ability to run scripts is also a great feature imho.

Marvel Symphony | Cinema Medley 2 by Imperial Orchestra - YouTube
Why gzip Just Beat a Large Language Model | Hendrik Erz

The paper in question: https://aclanthology.org/2023.findings-acl.426.pdf

Gzip output could be used as input for LLMs. They won't be "Large" in this case and this is a perfect fit for less ressource consumption.

(via https://nicolas-delsaux.hd.free.fr/Shaarli/shaare/kyvTdw)

UN Gives the Encrypted Open-Source Office Suite CryptPad a Try - FOSS Force

CryptPad is a great tool and I can only be relieved that the United Nations start to use it.

The project runs mainly thanks to research grants. Only 20% comes from donations or suscriptions.

The main selling poitn is it's easy for users to share encryption keys for sharing documents.

The first method — for those without accounts — works like this: When you create a document, a key is generated in your browser and stored locally in your computer or your encrypted drive. When you share this document with a user without a CryptPad account, a URL with a long string after the “#” is sent, containing both the address of the document and the encryption key. What is important is that all content in the URL after the “#” is never transmitted to the server, which means the encryption key stays private.

If you and the person with whom you are sharing both have accounts with CryptPad, you have the additional option to share content using CryptPad’s internal sharing mechanism. This allows sending the document keys in a public-key encrypted box that only designated recipients can open. [...] Also, CryptPad is even more private, because an important feature is that anyone who hosts your data will never have access to the encryption keys.

Another thing to remember is CryptPad will only be as secure as your computer and browser.

Also be careful with browser extensions, because these can snoop in your URLs.

Links About Blogging | Leon Mika
La crise du logement s’accélère à cause des logements vides non rénovés
Comment agacer les scammers ? Un article qui n’a rien à voir avec Vivatech - Cyroul

Alors forcément je me pose quelques questions :
Comment est-il possible, en 2025, de ne pas pouvoir signaler un arnaqueur en 2 clics, à l’heure où les arnaques deviennent monnaie courante ?
Comment est-il possible que des arnaqueurs utilisent des numéros de téléphone en 01 ? Sans que ça dérange l’Arcep, peut-être trop occupée à fliquer les particuliers pour qu’ils ne téléchargent pas des torrents sur leur ordi.
Comment est-il possible de laisser ces truands s’amuser en toute quiétude ? Alors que nos connexions internet sont de plus en plus surveillées et des contenus en ligne censurés.