Engineer. Creator.
en/es/eu
| My blog | https://ekaitz.elenq.tech |
| My work | http://elenq.tech |
| Artodon, the mastodon art gallery | https://ekaitz-zarraga.codeberg.page/artodon/ |
Engineer. Creator.
en/es/eu
| My blog | https://ekaitz.elenq.tech |
| My work | http://elenq.tech |
| Artodon, the mastodon art gallery | https://ekaitz-zarraga.codeberg.page/artodon/ |
We published a new SRFI 269: Portable Test Definitions.
https://srfi.schemers.org/srfi-269/
We already got a very positive feedback from seasoned Scheme hackers, but we also looking forward to yours. We have a few more weeks to incorporate the changes.
P.S. 21 years have passed since SRFI-64.
P.P.S. There are links to demo video of the library usage at the end of the SRFI.
BTW, this huge work is possible thanks to @nlnet and funding they provide!
and this is how it looks after:
cookblablabal | fmt | pr | less
I made a cooklang parser, and started a recipe visualizer, which I'm actually thinking on making interactive
Here's what I have right now.
Apparently #LinkedIn runs a silent browser scan on every #Chrome user who visits the site.
6.222 extensions.
~405 million users affected.
No consent, no disclosure, no mention in their privacy policy.
Read the full technical breakdown, legal analysis and searchable database of every scanned extension: https://browsergate.eu/
Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm. The user is never asked. Never told. LinkedIn’s privacy policy does not mention it. Because LinkedIn knows each user’s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.