<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    
    <title>CogSec</title>
    <description>Sécurité cognitive et architectures de contrôle — documentation académique — With community reaction statistics.</description>
    <link>https://cogsec.fr/</link>
    <atom:link href="https://cogsec.fr/feed_rss_enriched.xml?lang=en" rel="self" type="application/rss+xml" />
    <atom:link rel="alternate" hreflang="fr" href="https://cogsec-9tt.pages.dev/feed_rss_enriched.xml?lang=fr" />
    <atom:link rel="alternate" hreflang="en" href="https://cogsec-9tt.pages.dev/feed_rss_enriched.xml?lang=en" />
    <atom:link rel="alternate" hreflang="zh" href="https://cogsec-9tt.pages.dev/feed_rss_enriched.xml?lang=zh" />

    
    
    
    <language>en-US</language>

    
    <pubDate>Thu, 19 Feb 2026 16:01:50 -0000</pubDate>
    <lastBuildDate>Thu, 19 Feb 2026 16:01:50 -0000</lastBuildDate>
    <ttl>1440</ttl>

    
    <generator>CogSec RSS v1</generator>

    
    
    <image>
      <url>https://cogsec.fr/assets/images/favicon.png</url>
      <title>CogSec</title>
      <link>https://cogsec.fr/</link>
    </image>
    

    
    
    <item>
      <title>008 — Autopsie Volontaire (EN)</title>
      
      
      
      
        
      <category>academic</category>
        
      <category>cognitive-security</category>
        
      <category>documentation</category>
        
      <category>forced-transparency</category>
        
      <category>information-asymmetry</category>
        
      <category>institutional-control</category>
        
      
      <description>[👁️ 7 community reactions] Analysis of the mechanism by which institutions are compelled to document their own dysfunctions. Unraveling, disclosure, binary trap. Sources: Milgrom, Grossman, Akerlof, Vaughan, Power.</description>
      <link>https://cogsec.fr/articles/008-autopsie-volontaire.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Fri, 13 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/008-autopsie-volontaire.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>008 — Autopsie Volontaire</title>
      
      
      
      
        
      <category>académique</category>
        
      <category>asymétrie-informationnelle</category>
        
      <category>contrôle-institutionnel</category>
        
      <category>documentation</category>
        
      <category>sécurité-cognitive</category>
        
      <category>transparence-forcée</category>
        
      
      <description>[👁️ 7 community reactions] Analyse du mécanisme par lequel les institutions sont contraintes de documenter leurs propres dysfonctionnements. Unraveling, disclosure, piège binaire. Sources : Milgrom, Grossman, Akerlof, Vaughan, Power.</description>
      <link>https://cogsec.fr/articles/008-autopsie-volontaire/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Fri, 13 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/008-autopsie-volontaire/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
    <item>
      <title>008 — Autopsie Volontaire (中文)</title>
      
      
      
      
        
      <category>信息不对称</category>
        
      <category>制度控制</category>
        
      <category>学术</category>
        
      <category>强制透明</category>
        
      <category>文档记录</category>
        
      <category>认知安全</category>
        
      
      <description>[👁️ 7 community reactions] 分析机构被迫记录自身缺陷的机制。展开效应、信息披露、二元陷阱。来源：Milgrom、Grossman、Akerlof、Vaughan、Power。</description>
      <link>https://cogsec.fr/articles/008-autopsie-volontaire.zh/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Fri, 13 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/008-autopsie-volontaire.zh/</guid>
      <dc:language>zh</dc:language>
      
    </item>
    
    <item>
      <title>007 — Le Cargo Cult Du Controle (EN)</title>
      
      
      
      
        
      <category>academic</category>
        
      <category>cargo-cult</category>
        
      <category>conformity</category>
        
      <category>isomorphism</category>
        
      <category>moral-disengagement</category>
        
      <category>operators</category>
        
      <category>social-control</category>
        
      
      <description>[👁️ 6 community reactions] Analysis of the psychological and behavioral profile of operators who reproduce social control mechanisms without understanding their logic. Cargo cult science, moral disengagement, conformity, role absorption, normalization of deviance. Sources: Feynman, Bandura, Asch, Zimbardo, Vaughan, Kruger &amp; Dunning.</description>
      <link>https://cogsec.fr/articles/007-le-cargo-cult-du-controle.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Tue, 10 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/007-le-cargo-cult-du-controle.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>007 — Le Cargo Cult Du Controle</title>
      
      
      
      
        
      <category>académique</category>
        
      <category>cargo-cult</category>
        
      <category>conformité</category>
        
      <category>contrôle-social</category>
        
      <category>désengagement-moral</category>
        
      <category>isomorphisme</category>
        
      <category>opérateurs</category>
        
      
      <description>[👁️ 6 community reactions] Analyse du profil psychologique et comportemental des opérateurs qui reproduisent des mécanismes de contrôle social sans en comprendre la logique. Cargo cult science, désengagement moral, conformité, absorption de rôle, normalisation de la déviance. Sources: Feynman, Bandura, Asch, Zimbardo, Vaughan, Kruger &amp; Dunning.</description>
      <link>https://cogsec.fr/articles/007-le-cargo-cult-du-controle/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Tue, 10 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/007-le-cargo-cult-du-controle/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
    <item>
      <title>007 — Le Cargo Cult Du Controle (中文)</title>
      
      
      
      
        
      <category>从众</category>
        
      <category>同构</category>
        
      <category>学术</category>
        
      <category>操作者</category>
        
      <category>社会控制</category>
        
      <category>货物崇拜</category>
        
      <category>道德脱离</category>
        
      
      <description>[👁️ 6 community reactions] 对那些在不理解控制逻辑的情况下复制社会控制机制的操作者的心理与行为画像分析。货物崇拜科学、道德脱离、从众、角色吸收、偏差正常化。来源：Feynman, Bandura, Asch, Zimbardo, Vaughan, Kruger &amp; Dunning。</description>
      <link>https://cogsec.fr/articles/007-le-cargo-cult-du-controle.zh/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Tue, 10 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/007-le-cargo-cult-du-controle.zh/</guid>
      <dc:language>zh</dc:language>
      
    </item>
    
    <item>
      <title>006 — Cycles De Conditionnement (EN)</title>
      
      
      
      
        
      <category>academic</category>
        
      <category>behavioral-conditioning</category>
        
      <category>cognitive-security</category>
        
      <category>conditioning</category>
        
      <category>control-techniques</category>
        
      <category>learned-helplessness</category>
        
      <category>mind-control</category>
        
      <category>ostracism</category>
        
      <category>psychological-manipulation</category>
        
      <category>social-control</category>
        
      <category>social-isolation</category>
        
      
      <description>[👁️ 20 community reactions] Cognitive security: mind control techniques and institutional behavioral conditioning. Psychological manipulation through repeated cycles, status degradation, social isolation. Documented methods of psychological neutralization. Sources: Garfinkel, Seligman, Williams.</description>
      <link>https://cogsec.fr/articles/006-cycles-de-conditionnement.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/006-cycles-de-conditionnement.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>006 — Cycles De Conditionnement</title>
      
      
      
      
        
      <category>académique</category>
        
      <category>conditionnement</category>
        
      <category>conditionnement-comportemental</category>
        
      <category>contrôle-mental</category>
        
      <category>contrôle-social</category>
        
      <category>impuissance-apprise</category>
        
      <category>isolement-social</category>
        
      <category>manipulation-psychologique</category>
        
      <category>ostracisme</category>
        
      <category>sécurité-cognitive</category>
        
      <category>techniques-de-contrôle</category>
        
      
      <description>[👁️ 20 community reactions] Sécurité cognitive : techniques de contrôle mental et conditionnement comportemental institutionnel. Manipulation psychologique par cycles répétés, dégradation de statut, isolation sociale. Méthodes documentées de neutralisation psychologique. Sources: Garfinkel, Seligman, Williams.</description>
      <link>https://cogsec.fr/articles/006-cycles-de-conditionnement/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/006-cycles-de-conditionnement/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
    <item>
      <title>006 — Cycles De Conditionnement (中文)</title>
      
      
      
      
        
      <category>习得性无助</category>
        
      <category>学术</category>
        
      <category>心理操控</category>
        
      <category>思维控制</category>
        
      <category>排斥</category>
        
      <category>控制技术</category>
        
      <category>条件化</category>
        
      <category>社会孤立</category>
        
      <category>社会控制</category>
        
      <category>行为条件反射</category>
        
      <category>认知安全</category>
        
      
      <description>[👁️ 20 community reactions] 认知安全：思维控制技术与机构行为条件反射。通过重复循环的心理操控，地位降格，社会孤立。记录的心理中和方法。来源：Garfinkel, Seligman, Williams。</description>
      <link>https://cogsec.fr/articles/006-cycles-de-conditionnement.zh/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/006-cycles-de-conditionnement.zh/</guid>
      <dc:language>zh</dc:language>
      
    </item>
    
    <item>
      <title>005 — Le Triple Mur (EN)</title>
      
      
      
      
        
      <category>HIP-ASD</category>
        
      <category>academic</category>
        
      <category>behavioral-conditioning</category>
        
      <category>cognitive-overload</category>
        
      <category>cognitive-security</category>
        
      <category>cognitive-vulnerabilities</category>
        
      <category>learned-helplessness</category>
        
      <category>psychological-manipulation</category>
        
      <category>social-control</category>
        
      <category>working-memory</category>
        
      
      <description>[👁️ 16 community reactions] Cognitive security: analysis of social control mechanisms and psychological manipulation techniques. Three documented methods: cognitive overload, double bind, behavioral conditioning. Academic sources: Miller, Bateson, Seligman.</description>
      <link>https://cogsec.fr/articles/005-le-triple-mur.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Thu, 29 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/005-le-triple-mur.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>005 — Le Triple Mur</title>
      
      
      
      
        
      <category>HPI-TSA</category>
        
      <category>académique</category>
        
      <category>conditionnement-comportemental</category>
        
      <category>contrôle-social</category>
        
      <category>impuissance-apprise</category>
        
      <category>manipulation-psychologique</category>
        
      <category>mémoire-de-travail</category>
        
      <category>surcharge-cognitive</category>
        
      <category>sécurité-cognitive</category>
        
      <category>vulnérabilités-cognitives</category>
        
      
      <description>[👁️ 16 community reactions] Sécurité cognitive : analyse des mécanismes de contrôle social et manipulation psychologique. Trois techniques documentées : surcharge cognitive, double contrainte, conditionnement comportemental. Sources académiques : Miller, Bateson, Seligman.</description>
      <link>https://cogsec.fr/articles/005-le-triple-mur/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Thu, 29 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/005-le-triple-mur/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
    <item>
      <title>005 — Le Triple Mur (中文)</title>
      
      
      
      
        
      <category>HIP-ASD</category>
        
      <category>习得性无助</category>
        
      <category>学术</category>
        
      <category>工作记忆</category>
        
      <category>心理操控</category>
        
      <category>社会控制</category>
        
      <category>行为条件反射</category>
        
      <category>认知安全</category>
        
      <category>认知脆弱性</category>
        
      <category>认知超载</category>
        
      
      <description>[👁️ 16 community reactions] 认知安全：社会控制机制与心理操控技术分析。三种记录方法：认知超载、双重束缚、行为条件反射。学术来源：Miller, Bateson, Seligman。</description>
      <link>https://cogsec.fr/articles/005-le-triple-mur.zh/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Thu, 29 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/005-le-triple-mur.zh/</guid>
      <dc:language>zh</dc:language>
      
    </item>
    
    <item>
      <title>004 — Architecte Quon Prend Pour Un Con (EN)</title>
      
      
      
      
        
      <category>HPI-ASD</category>
        
      <category>academic</category>
        
      <category>documentation</category>
        
      <category>information-asymmetry</category>
        
      <category>reverse-engineering</category>
        
      <category>social-control</category>
        
      
      <description>[👁️ 17 community reactions] Analysis of unanticipated effects of excluding an expert in systems analysis. Social reverse engineering, inverted information asymmetry, documentation as leverage. Sources: Merton, Goffman, Akerlof, Tetlock.</description>
      <link>https://cogsec.fr/articles/004-architecte-quon-prend-pour-un-con.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/004-architecte-quon-prend-pour-un-con.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>004 — Architecte Quon Prend Pour Un Con</title>
      
      
      
      
        
      <category>HPI-TSA</category>
        
      <category>académique</category>
        
      <category>asymétrie-informationnelle</category>
        
      <category>contrôle-social</category>
        
      <category>documentation</category>
        
      <category>reverse-engineering</category>
        
      
      <description>[👁️ 17 community reactions] Analyse des effets non anticipés de l&#39;exclusion d&#39;un profil expert en analyse de systèmes. Reverse engineering social, asymétrie informationnelle inversée, documentation comme levier. Sources: Merton, Goffman, Akerlof, Tetlock.</description>
      <link>https://cogsec.fr/articles/004-architecte-quon-prend-pour-un-con/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/004-architecte-quon-prend-pour-un-con/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
    <item>
      <title>004 — Architecte Quon Prend Pour Un Con (中文)</title>
      
      
      
      
        
      <category>HPI-ASD</category>
        
      <category>信息不对称</category>
        
      <category>学术</category>
        
      <category>文档</category>
        
      <category>社会控制</category>
        
      <category>逆向工程</category>
        
      
      <description>[👁️ 17 community reactions] 分析排斥系统分析专家的意外后果。社会逆向工程、信息不对称反转、文档作为杠杆。来源：Merton、Goffman、Akerlof、Tetlock。</description>
      <link>https://cogsec.fr/articles/004-architecte-quon-prend-pour-un-con.zh/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/004-architecte-quon-prend-pour-un-con.zh/</guid>
      <dc:language>zh</dc:language>
      
    </item>
    
    <item>
      <title>003 — Langage N Dimensions (EN)</title>
      
      
      
      
        
      <category>HPI-ASD</category>
        
      <category>academic</category>
        
      <category>cognitive-architecture</category>
        
      <category>cognitive-biases</category>
        
      <category>double-bind</category>
        
      <category>social-control</category>
        
      
      <description>[👁️ 27 community reactions] Analysis of the n-dimensional cognitive architecture of HPI/ASD/ADHD profiles facing paradoxical communication. Double bind, pattern recognition, multidimensional processing. Sources: Bateson, Baron-Cohen, Watzlawick.</description>
      <link>https://cogsec.fr/articles/003-langage-n-dimensions.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Sun, 18 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/003-langage-n-dimensions.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>003 — Langage N Dimensions</title>
      
      
      
      
        
      <category>HPI-TSA</category>
        
      <category>académique</category>
        
      <category>architecture-cognitive</category>
        
      <category>biais-cognitifs</category>
        
      <category>contrôle-social</category>
        
      <category>double-bind</category>
        
      
      <description>[👁️ 27 community reactions] Analyse de l&#39;architecture cognitive n-dimensionnelle des profils HPI/TSA/TDAH face à la communication paradoxale. Double bind, pattern recognition, traitement multidimensionnel. Sources: Bateson, Baron-Cohen, Watzlawick.</description>
      <link>https://cogsec.fr/articles/003-langage-n-dimensions/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Sun, 18 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/003-langage-n-dimensions/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
    <item>
      <title>003 — Langage N Dimensions (中文)</title>
      
      
      
      
        
      <category>HPI-ASD</category>
        
      <category>双重束缚</category>
        
      <category>学术</category>
        
      <category>社会控制</category>
        
      <category>认知偏误</category>
        
      <category>认知架构</category>
        
      
      <description>[👁️ 27 community reactions] 分析HPI/ASD/ADHD特征在面对悖论沟通时的N维认知架构。双重束缚、模式识别、多维处理。来源：Bateson、Baron-Cohen、Watzlawick。</description>
      <link>https://cogsec.fr/articles/003-langage-n-dimensions.zh/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Sun, 18 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/003-langage-n-dimensions.zh/</guid>
      <dc:language>zh</dc:language>
      
    </item>
    
    <item>
      <title>002 — Briefing Nouveaux Arrivants (EN)</title>
      
      
      
      
        
      <category>HPI-ASD</category>
        
      <category>academic</category>
        
      <category>cognitive-biases</category>
        
      <category>social-control</category>
        
      <category>stigmatization</category>
        
      
      <description>[👁️ 24 community reactions] Analysis of preventive narrative transmission mechanism. Confirmation bias, primacy effect, stigmatization. Sources: Goffman, Rosenhan, Lemert.</description>
      <link>https://cogsec.fr/articles/002-briefing-nouveaux-arrivants.en/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Sat, 10 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/002-briefing-nouveaux-arrivants.en/</guid>
      <dc:language>en</dc:language>
      
    </item>
    
    <item>
      <title>002 — Briefing Nouveaux Arrivants</title>
      
      
      
      
        
      <category>HPI-TSA</category>
        
      <category>académique</category>
        
      <category>biais-cognitifs</category>
        
      <category>contrôle-social</category>
        
      <category>stigmatisation</category>
        
      
      <description>[👁️ 24 community reactions] Analyse du mécanisme de transmission préventive d&#39;un narratif. Biais de confirmation, effet de primauté, stigmatisation. Sources: Goffman, Rosenhan, Lemert.</description>
      <link>https://cogsec.fr/articles/002-briefing-nouveaux-arrivants/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=cogsec</link>
      <pubDate>Sat, 10 Jan 2026 00:00:00 +0000</pubDate>
      <source url="https://cogsec.fr/feed_rss_enriched.xml?lang=en">CogSec</source>
      
      <guid isPermaLink="true">https://cogsec.fr/articles/002-briefing-nouveaux-arrivants/</guid>
      <dc:language>fr</dc:language>
      
    </item>
    
  </channel>
</rss>