<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Base Secrète</title>
    <description>{&quot;en&quot;=&gt;&quot;Base Secrète is a web design and development studio specialized in Ruby on Rails applications.&quot;, &quot;fr&quot;=&gt;&quot;Base Secrète est une équipe de design et de développement web spécialisée en applications Ruby on Rails.\&quot;&quot;}</description>
    <link>https://basesecrete.com/</link>
    <atom:link href="https://basesecrete.com/feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Fri, 30 Jan 2026 10:38:29 +0000</pubDate>
    <lastBuildDate>Fri, 30 Jan 2026 10:38:29 +0000</lastBuildDate>
    <generator>Jekyll v4.2.2</generator>
    
     
      <item>
        <title>New Relic Vs Rorvswild</title>
        <description>&lt;article&gt;
  &lt;header&gt;
    &lt;h1&gt;RoRvsWild vs. New Relic&lt;/h1&gt;
    &lt;time pubdate date=&quot;2023-06-30&quot;&gt;June 30, 2023&lt;/time&gt;
  &lt;/header&gt;
  &lt;section class=&quot;content&quot;&gt;
    &lt;p class=&quot;is-large&quot;&gt;
      We are making &lt;a href=&quot;https://www.rorvswild.com&quot; target=&quot;_blank&quot;&gt;RoRvsWild&lt;/a&gt;, a monitoring tool for Ruby on Rails applications. &lt;a href=&quot;https://newrelic.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;New relic&lt;/a&gt; does that too, and much more.
    &lt;/p&gt;
    &lt;p class=&quot;is-large&quot;&gt;
      RoRvsWild vs. New Relic seems like an unfair fight.&lt;br&gt;
      We might be biased, but like for David vs. Goliath or Ukraine vs. Russia, there is always a chance the kid kicks the ass of the giant.
    &lt;/p&gt;

    &lt;h2&gt;New Relic&lt;/h2&gt;
    &lt;p&gt;New Relic is the &lt;acronym title=&quot;Original Gangster&quot;&gt;OG&lt;/acronym&gt; in web app monitoring. They have been the only choice for a while.&lt;/p&gt;
    &lt;p&gt;Today New Relic is also known as $NEWR, a public company with thousands of employees and huge revenue. Their stock rises and pleases their shareholders when they announce massive layoffs or when there is a rumor they are about to sell to an investment firm. This week alone, they fired 200 employees after the investment firm finally canceled their offer.&lt;br&gt;
      Still, they lose a staggering amount of money, $52 million in the last quarter alone, with a big part of their expenses in marketing and sales.&lt;br&gt;For how long can they stay in business? Are they too big to fail? Who knows? Probably their Chief Revenue Officer who just sold his shares.&lt;/p&gt;
    &lt;p&gt;New Relic is a powerful and feature-rich tool with a steep learning curve. They support all languages and target mainly «enterprises» with specialized DevOps teams. Understanding its graphs and menus requires a significant investment of time and effort.&lt;/p&gt;
    &lt;p&gt;They have a free plan, but their pricing structure can quickly get expensive. The cost explodes as you add more people, monitor additional hosts, etc. We have been using New Relic in another life when working in a comfortably VC-funded startup. It was overkill. The startup does not exist anymore.&lt;/p&gt;
    &lt;p&gt;Their agent is heavier as they grab much more data. They now collect all your logs by default, which some consider a shady tactic to get everyone to pay more and grow their revenue. It also raises privacy concerns, as they feed AI with your data; and use a massive count of trackers.&lt;/p&gt;
    &lt;p&gt;Last but not least, people frequently report challenges with their support services, including slow response times.&lt;/p&gt;

    &lt;h2&gt;RoRvsWild&lt;/h2&gt;
    &lt;p&gt;RoRvsWild is an independent company. We have no investors and a team of 2. The only people we have to please are our customers.&lt;/p&gt;
    &lt;p&gt;RoRvsWild is Ruby on Rails only. In the Rails community, we like to boast about how some big companies like Shopify use Rails. But in reality, most teams using Rails are small, as this framework makes it relatively easy to launch an app. It is unlikely you have a DevOps, performances, or site reliability team. Rails developers generally have to take care of performances and errors themselves.&lt;br&gt;
    RoRvsWild has no learning curve and is the fastest way to find an issue and get back to code.&lt;/p&gt;
    &lt;p&gt;We don’t have a free plan, but our simple pricing is requests based, with no hidden costs, much more affordable and granular. We certainly need to improve our marketing and communication, but we are not losing money; we are here for the long run.&lt;/p&gt;  
    &lt;p&gt;We do our best to answer every request we get. We cannot escalate an issue. We all receive support emails, and you receive direct answers from the people building the service. You also get a high probability your feedback and feature requests will make it into the product.&lt;/p&gt;

    &lt;p class=&quot;is-large&quot;&gt;So yes, we are taking our chance. Sometimes, we feel like we have to keep going and that New Relic will soon be a piece of history.&lt;/p&gt;
  &lt;/section&gt;
&lt;/article&gt;
</description>
        <pubDate>Fri, 30 Jun 2023 00:00:00 +0000</pubDate>
        <link>https://basesecrete.com/rorvswild_vs_newrelic.html</link>
        <guid isPermaLink="true">https://basesecrete.com/rorvswild_vs_newrelic.html</guid>
        
        
      </item>
      
    
     
      <item>
        <title>Active Hashcash</title>
        <description>&lt;article&gt;
  &lt;header&gt;
    &lt;h1&gt;Active Hashcash Ruby Gem&lt;/h1&gt;
    &lt;time pubdate date=&quot;2022-07-07&quot;&gt;Aug 12, 2022&lt;/time&gt;
  &lt;/header&gt;
  &lt;section class=&quot;content&quot;&gt;
    &lt;p class=&quot;is-large&quot;&gt;
      Securing a web application is not trivial.
      Every feature and especially public exposed forms are potential security breaches. Any breach will eventually be exploited, even on small applications.
    &lt;/p&gt;

    &lt;p class=&quot;is-large&quot;&gt;
      For a long time, we have been looking for the best way to protect login and registration forms against brute force attacks and spam bots, often using a combination of techniques.
    &lt;/p&gt;

    &lt;p class=&quot;is-large&quot;&gt;
      Today, we are releasing &lt;a href=&quot;https://github.com/BaseSecrete/active_hashcash&quot;&gt;active_hashcash&lt;/a&gt;, a gem to protect Ruby on Rails applications forms. 
    &lt;/p&gt;

    &lt;h2&gt;What about current solutions?&lt;/h2&gt;

    &lt;h3&gt;IPs rate limiting&lt;/h3&gt;
    &lt;p&gt;This technique limits how often someone can repeat an action within a given timeframe.
      IPs rate limiting is efficient against brute force or DoS attacks, but not so much against bots or botnets. 
      It might block legitimate users and lock them out of their accounts after too many failed login attempts.
    &lt;/p&gt;
    &lt;p role=&quot;alert&quot; class=&quot;is-success&quot;&gt;
      We can use IPs rate limiting carefully. It is not sufficient to protect our applications.
    &lt;/p&gt;

    &lt;h3&gt;Honeypot fields&lt;/h3&gt;
    &lt;p&gt;
      This technique uses fake hidden input fields.
      If those fake inputs are not left empty on form submission, you can assume a bot filled the form.
      Honeypot form fields are simple and efficient against dumb bots.
      A bespoke bot targeting your site will not fall for it. Also, honeypot fields do not help against brute force attacks.
    &lt;/p&gt;
    &lt;p role=&quot;alert&quot; class=&quot;is-success&quot;&gt;
      We can use Honeypot fields. It is not sufficient to protect our applications.
    &lt;/p&gt;

    &lt;h3&gt;Captchas&lt;/h3&gt;
    &lt;p&gt;
      Captchas require someone to correctly evaluate and enter a sequence of letters or numbers perceptible in a distorted image displayed on their screen. 
      Captchas are efficient for blocking bots or slowing them down for the least.
    &lt;/p&gt;
    &lt;p&gt;
      Captchas also have some severe drawbacks:
    &lt;/p&gt;
    &lt;ul&gt;
      &lt;li&gt;They are annoying for the legitimate users of your application. Filling a captcha is fastidious and sometimes hard to do correctly. It takes the average person approximately 10 seconds to solve a typical CAPTCHA. This technique receives much criticism, especially from people with disabilities.&lt;/li&gt;
      &lt;li&gt;They depend on an external service, which can be slow or down, thus blocking access to your application.&lt;/li&gt;
    &lt;/ul&gt;

    &lt;p role=&quot;alert&quot; class=&quot;is-error&quot;&gt;
      As we want to build more accessible web applications, we would prefer not using captchas.
    &lt;/p&gt;

    &lt;h3&gt;reCaptcha&lt;/h3&gt;
    &lt;p&gt;
      reCaptcha, the most popular Captcha solution, is Google’s property. Your visitors become Google’s product.
    &lt;/p&gt;
    &lt;ul&gt;
      &lt;li&gt;Google collects and sells your customers&apos; data to advertisers.&lt;/li&gt;
      &lt;li&gt;Google uses your visitors’ time to train its AI efforts for free.&lt;/li&gt;
    &lt;/ul&gt;
    &lt;p&gt;
      Google or any other giant corporation should not own the internet.&lt;br&gt;
      We previously made an &lt;a href=&quot;/active_analytics.html&quot;&gt;analytics gem&lt;/a&gt; to stop using Google Analytics and to respect our visitors’ privacy.
    &lt;/p&gt;

    &lt;p&gt;
      
    &lt;/p&gt;

    &lt;p&gt;
      Moreover, reCaptcha does not block all bots.
      Some bots can solve captchas.
      Some even hire low-wage humans to do it for them.
    &lt;/p&gt;

    &lt;p role=&quot;alert&quot; class=&quot;is-error&quot;&gt;
      For the same reasons, we would not use reCaptcha.
    &lt;/p&gt;

    &lt;h3&gt;Reverse proxies&lt;/h3&gt;

    &lt;p&gt;
      Another solution is to move behind a third party service such as Cloudflare.
      The goal of that extra layer is to block bad trafic before it reaches your site.
      But it makes the Internet more centralized and add an external dependency where you have no leverage.
      The reverse proxy sees all trafic sent to you.
      That means, you must have an extremely high trust into this service.
      Furthemore, it could be a nightmare for some legitimate users depending of their country.
    &lt;/p&gt;

    &lt;p role=&quot;alert&quot; class=&quot;is-error&quot;&gt;
      For these reasons, we would not use a third party reverse proxy.
    &lt;/p&gt;

    &lt;h2&gt;Active Hashcash: An alternative to captchas&lt;/h2&gt;

    &lt;p&gt;
      We wanted to replace captchas with a user-friendlier solution, and after seeing some brute 
      force attacks against our &lt;a href=&quot;https://www.rorvswild.com&quot;&gt;Rails application monitoring service RorVsWild&lt;/a&gt;, 
      we developed the &lt;a href=&quot;https://github.com/BaseSecrete/active_hashcash&quot;&gt;ActiveHashcash gem&lt;/a&gt;.
    &lt;/p&gt;

    &lt;p&gt;
      Hashcash is not a new technique. It was created in 1997 by Adam Back. 
      It is used to help detecting email spam and by crypto currencies. 
      It is a proof-of-work algorithm that can be useful as a denial-of-service countermeasure technique. 
      The client has to spend some time solving a complex problem that is easy to verify for the server.
    &lt;/p&gt;

    &lt;blockquote&gt;
      Hashcash is a proof-of-work algorithm
    &lt;/blockquote&gt;

    &lt;p&gt;
      By enabling Active Hashcash on sensitive forms, the browser solves the problem while the user fills out the form. 
      It cannot be submitted as long as the proof of work is not solved.
      Then the server verifies the proof of work from the hidden field.
    &lt;/p&gt;

    &lt;p&gt;Here is a &lt;a href=&quot;https://www.rorvswild.com/account/new&quot;&gt;demo on a registration form&lt;/a&gt;.&lt;/p&gt;

    &lt;img src=&quot;https://github.com/BaseSecrete/active_hashcash/raw/master/demo.gif&quot;/&gt;

    &lt;p&gt;
      Most humans will not notice Active Hashcash since the problem is solved before they 
      finish filling the form. Others, with less performant devices, will have to wait for a 
      few seconds instead of deciphering hieroglyphics or solving a puzzle.
    &lt;/p&gt;

    &lt;p&gt;
      The complexity can be changed via &lt;code&gt;ActiveHashcash.bits = 20&lt;/code&gt;.
      It can also be changed dynamically by overriding the controller&apos;s method &lt;code&gt;hashcash_bits&lt;/code&gt;.
    &lt;/p&gt;

    &lt;p&gt;
      Active Hashcash is efficient against DoS.
      It blocks bots that do not interpret JavaScript; It slows down the others.
      For a default complexity of 20, the attacker must have 2^20 more CPU power than your site!
      That&apos;s 1&apos;048&apos;576 times more, which is quite a lot even with a small server.
    &lt;/p&gt;

    &lt;p role=&quot;alert&quot; class=&quot;is-success&quot;&gt;
      Active Hashcash is complementary to rate IP limiting and honeypot field form.
      We strongly encourage everyone to have all three protections.
    &lt;/p&gt;

 

    &lt;h2&gt;Compromises and future improvements&lt;/h2&gt;

    &lt;p&gt;
      Some might object that botnets don&apos;t care about burning CPU cycles.
      An innocent is probably paying the electricity bill for them.
      But time is money too.
      The goal here is to become a difficult target.
      Eventually, they will look after a less protected one.
    &lt;/p&gt;

    &lt;p&gt;
      Others will retort that it&apos;s a lot of wasted energy and not environment friendly.
      For legitimate people, it&apos;s very true and sad. 
      But as it does not concern all requests, the extra consumption is limited.
      And Bots would have wasted that same energy to attack more sites anyway.
    &lt;/p&gt;

    &lt;p&gt;
      We know Active Hashcash is not perfect and you can help:
    &lt;/p&gt;

    &lt;ul&gt;
      &lt;li&gt;The JavaScript implementation is 20 times slower than the official C version.
        It needs some work to be optimized, and your contributions are more than welcome.
      &lt;/li&gt;
      &lt;li&gt;
        We could have a dynamic complexity.
        If the same IP is requesting many times a login form, the complexity could be increased gradually.
        When the IP address is coming from a datacenter, the odd for a legitimate user are lower.
        In that case it could make sense to increase the complexity...
      &lt;/li&gt;
    &lt;/ul&gt;
     
    &lt;p&gt;
      Good humans, let&apos;s unite against bots! &lt;a href=&quot;https://github.com/BaseSecrete/active_hashcash&quot;&gt;Please Contribute&lt;/a&gt;
    &lt;/p&gt;
  &lt;/section&gt;
&lt;/article&gt;
</description>
        <pubDate>Fri, 12 Aug 2022 00:00:00 +0000</pubDate>
        <link>https://basesecrete.com/active_hashcash.html</link>
        <guid isPermaLink="true">https://basesecrete.com/active_hashcash.html</guid>
        
        
      </item>
      
    
     
      <item>
        <title>Ruby On Rails Developer</title>
        <description>&lt;article&gt;
  &lt;header&gt;
    &lt;h1&gt;Ruby on Rails Developer (m/f)&lt;/h1&gt;
    &lt;time pubdate date=&quot;2021-06-09&quot;&gt;November 24th, 2021&lt;/time&gt;
  &lt;/header&gt;
  &lt;section class=&quot;content&quot;&gt;
    &lt;p&gt;&lt;a href=&quot;https://basesecrete.com&quot;&gt;Base Secrète&lt;/a&gt; is a small independent web agency based in Geneva, specializing in Ruby on Rails development.
    &lt;/p&gt;
    &lt;p&gt;We are making web applications for our clients and operating &lt;a href=&quot;https://www.rorvswild.com&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;RoRvsWild.com&lt;/a&gt; – A Rails application monitoring tool. 
      We also publish some open-source libraries – &lt;a href=&quot;https://github.com/basesecrete&quot;  rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;https://github.com/basesecrete&lt;/a&gt;.
    &lt;/p&gt;
    &lt;p&gt;
      We are mandated to rebuild the website of the prestigious Swiss media Le Temps.
      It&apos;s a big, long-term project for an institution with more than 100 journalists – and a million monthly readers. We are 2 and we could be 3.
    &lt;/p&gt;
    &lt;p&gt;
      We are looking for a Ruby on Rails developer to strengthen and balance our team.
      We offer flexible conditions to discuss.
    &lt;/p&gt;
    &lt;ul&gt;
      &lt;li&gt;3+ years of experience in Ruby on Rails development&lt;/li&gt;
      &lt;li&gt;Independent or hire&lt;/li&gt;
      &lt;li&gt;60% to 100%&lt;/li&gt;
      &lt;li&gt;Remote (Timezone Geneva -2/+2)&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
&lt;/article&gt;</description>
        <pubDate>Thu, 11 Nov 2021 00:00:00 +0000</pubDate>
        <link>https://basesecrete.com/rails_developer.html</link>
        <guid isPermaLink="true">https://basesecrete.com/rails_developer.html</guid>
        
        
      </item>
      
    
     
      <item>
        <title>Developpeur Ruby On Rails</title>
        <description>&lt;article&gt;
  &lt;header&gt;
    &lt;h1&gt;Développeur Ruby on Rails (h/f)&lt;/h1&gt;
    &lt;time pubdate date=&quot;2021-06-09&quot;&gt;11 Novembre 2021&lt;/time&gt;
  &lt;/header&gt;
  &lt;section class=&quot;content&quot;&gt;
    &lt;p&gt;&lt;a href=&quot;https://basesecrete.com&quot;&gt;Base Secrète&lt;/a&gt; est une petite agence web indépendante, 
      basée à Genève, spécialisée en design et développement d’applications sur mesure en Ruby on Rails.
    &lt;/p&gt;
    &lt;p&gt;Nous développons des applications web pour des clients ainsi que nos propres produits
      (&lt;a href=&quot;https://www.rorvswild.com&quot;&gt;RoRvsWild.com&lt;/a&gt;). 
      Nous publions aussi quelques projets de logiciels libres (&lt;a href=&quot;https://github.com/basesecrete&quot;&gt;https://github.com/basesecrete&lt;/a&gt;).
    &lt;/p&gt;
    &lt;p&gt;
      Nous venons d’être mandatés pour la refonte du site du prestigieux média Suisse &lt;a href=&quot;https://www.letemps.ch/&quot;&gt;Le Temps&lt;/a&gt;. 
      C’est un beau projet, pour une institution avec plus de 100 journalistes, et plus de 100 000 lecteurs quotidiens. Nous sommes 2 et ne serons pas trop de 3.
    &lt;/p&gt;
    &lt;p&gt;Nous cherchons un développeur Ruby on Rails pour renforcer et mieux équilibrer notre équipe. 
      Nous proposons des conditions flexibles, sur mesure.&lt;/p&gt;
    &lt;ul&gt;
      &lt;li&gt;3+ années d’expérience en développement Ruby on Rails&lt;/li&gt;
      &lt;li&gt;CDI ou Indépendant&lt;/li&gt;
      &lt;li&gt;Occupation 60% à 100%&lt;/li&gt;
      &lt;li&gt;Télétravail (fuseau horaire Genève -2/+2)&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/section&gt;
&lt;/article&gt;</description>
        <pubDate>Thu, 11 Nov 2021 00:00:00 +0000</pubDate>
        <link>https://basesecrete.com/developpeur_rails.html</link>
        <guid isPermaLink="true">https://basesecrete.com/developpeur_rails.html</guid>
        
        
      </item>
      
    
     
      <item>
        <title>Active Analytics</title>
        <description>&lt;article&gt;
  &lt;header&gt;
    &lt;h1&gt;Active Analytics&lt;/h1&gt;
    &lt;time pubdate date=&quot;2021-06-09&quot;&gt;June 9, 2021&lt;/time&gt;
  &lt;/header&gt;
  &lt;section class=&quot;content&quot;&gt;
    &lt;p class=&quot;is-large&quot;&gt;Website owners use web analytics tools to monitor their performances, to understand 
      what their audiences like, and what they can improve. For years, they relied on third-party cookies and trackers, giving away their
      visitors&apos; privacy to giant tech companies in exchange for these precious insights.
      This is about to change for good.
    &lt;/p&gt;
    &lt;p class=&quot;is-large&quot;&gt;We are releasing a new Ruby gem called &lt;a href=&quot;https://github.com/BaseSecrete/active_analytics&quot;&gt;active_analytics&lt;/a&gt;.
      It is a simple first-party tool to inform Ruby on Rails website owners without compromising their visitors&apos; privacy.
    &lt;/p&gt;

    &lt;h2&gt;No cookies, no trackers&lt;/h2&gt;
    &lt;p&gt;Thanks to GDPR and other customer protection laws, third-party cookies may
      come to an end.
      Hopefully, those unbearable cookie consent banners could also soon be history,
      when all website owners realize nobody is clicking &lt;i&gt;“Yes, I think Google and
      Facebook are not rich and evil enough.”&lt;/i&gt;, or &lt;i&gt;“Please give me more creepily relevant
      ads”&lt;/i&gt;.
    &lt;/p&gt;
    &lt;blockquote&gt;Strangely enough, when people are given the choice to not being tracked, they choose
      not to be tracked.&lt;/blockquote&gt;
    &lt;p&gt;Apple is also acting to help people block that privacy-invading bits of code,
      making Facebook super angry. It is working pretty well, as 96% of people being
      asked if they want to be tracked by Facebook answer NO.
    &lt;/p&gt;
    &lt;p&gt;Google is preparing for a cookie-less world with floc, or “cohort analysis”.
      Privacy-conscious website owners are already implementing measures to block
      it.
    &lt;/p&gt;

    &lt;h2&gt;No javascript, no third parties&lt;/h2&gt;
    &lt;p&gt;Privacy-focused Google Analytics alternative tools, like Plausible, Fathom or
      Simple Analytics have flourished over the recent years. They are pretty cool, and encounter 
      great success as more and more people are looking for tools that do not sell their customers&apos; 
      moms.
    &lt;/p&gt;

    &lt;p&gt;They don’t use cookies, but a small Javascript script. For some reason, most of
      them are now considered trackers and are blocked by the majority of Privacy
      protecting extensions. As more and more people are concerned with their
      privacy and don’t trust third parties, more and more people find solutions to protect
      themselves. Depending on the kind of people you target (mostly developers in
      our case), this kind of convenient service quickly gets not so accurate.&lt;/p&gt;

    &lt;h2&gt;No bullshit&lt;/h2&gt;
    &lt;p&gt;Metrics like unique users, session duration or bounce rate are flawed.
      There is no way to precisely measure that. Referral spam makes you falsely
      believe your application is popular and can be a nightmare to block.
    &lt;/p&gt;

    &lt;h2&gt;Active Analytics: simple open-source first-party analytics for Ruby
      on Rails applications.
    &lt;/h2&gt;
    &lt;img src=&quot;/assets/img/screenshots/active_analytics.png&quot; alt=&quot;Active Analytics&quot;  width=&quot;2569 &quot; height=&quot;2190&quot; loading=&quot;lazy&quot; /&gt;
    &lt;p&gt;Active analytics is first-party. You mount it in your own Rails app and decide
      yourself where you can access the data, yourdomain.com/analytics for
      example.
    &lt;/p&gt;
    &lt;p&gt;It doesn’t collect any personal data. It cannot be blocked by adblockers and other privacy-protecting extensions. It
      is compliant with all privacy laws and doesn’t require you to add a cookie
      consent banner. 
    &lt;/p&gt;
    &lt;p&gt;It only gives basic information about what is going on in your web application:
      which pages are viewed and what are the sources leading to that pages. It also
      shows where people go from a given page. It never reveals anything about
      specific visitors.
    &lt;/p&gt;
    &lt;p&gt;This is probably enough. Marketers may cry for a while, but sooner or later, they will have to adapt anyway.&lt;/p&gt;
    &lt;p&gt;It is open source. You can &lt;a href=&quot;https://github.com/BaseSecrete/active_analytics&quot;&gt;install the gem and view the source code&lt;/a&gt;. You are very welcome to contribute or to provide us with your feedback on
      &lt;a href=&quot;https://twitter.com/base_secrete&quot;&gt;Twitter&lt;/a&gt;.
    &lt;/p&gt;
  &lt;/section&gt;
&lt;/article&gt;</description>
        <pubDate>Wed, 09 Jun 2021 00:00:00 +0000</pubDate>
        <link>https://basesecrete.com/active_analytics.html</link>
        <guid isPermaLink="true">https://basesecrete.com/active_analytics.html</guid>
        
        
      </item>
      
    
  </channel>
</rss>
