No, the other epic games. He only mentions one game, not the others.
No, the other epic games. He only mentions one game, not the others.
Yea, did he mention all the other successful epic games? No. There aren’t any. Or they’re dying.
Gotta read between the lines.
Maybe if they ran on Linux, people would buy it. Give it a shot there, Timbo
I don’t think ive heard about any privacy issues regarding modems. They convert your data into the Level 1 format so that it can be moved to the next hop. There isn’t really anything to spy on, and its very hardware dependent (hence no open source software that can standardize across each device). There might be open source modems out there, but your ISP probably doesn’t support them.
cuz I don’t have a ps5?
As you wish. But maybe open up to some new perspectives.
What does a healthy opinion of F-Droid look like though? Lol
Well, then its still 2FA. Something you are and something you have.
The website has to build in support for them. Youll start seeing it more over time.
To be fair, you cant use the passkeys unless you are logged into your password manager, which requires a password you “know”.
This blog is specifically for websites that are public facing. Sure, you can wireguard into your local network, but you can also SSH into your local network. Either way you have to poke a hole.
Good read.
I would just like to add some additional information that favors changing your SSH port to something other than the default. When crawlers are going around the internet looking for vulnerable SSH servers, they’re more than likely going to have an IP range and specifically look for port 22.
Now can they go through and scan your IP and all of its ports to look for the SSH service? Yes. But you will statistically have less interactions with bad actors this way since they might specifically be looking for port 22.
They’ve been doing this tactic for a few years now. Not a new thing tbh.
Yes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.
If the hardware is tampered, it will not pass the attestation test, which is an online component. It will fail immediately and you will be alerted. Thats the part of verified boot that makes this so much harder for adversaries. They would have to compromise both systems. The attestation system is going to be heavily guarded.
Compromised hardware doesn’t know the signatures. Math.
Well, we can save the planet! Kamala just has to show courage!