Ops. Missed that part.
pending anonymous user
Ops. Missed that part.
I use BTRFS for snapshots, and auto compression. Maybe it can be done with raids with LVM? AFAIK BTRFS redundancy is basically the same as traditional RAID, similar to using mdadm. Still, you would want a backup strat instead relying on the disk redundancy. I learn that the hardway.
I would just skip RAID, add all disk to a single BTRFS and use the built in profiles for (meta)data redundancy.
Cache I don’t know much tho.
Is this finally the dusk of SO? It helps alot, but also suck alot.
Yay, more subscriptions.
👌Adobe, I am sticking to my Affinity Photo 1.
It is their job to find evidences, not my resposibility to provide them.
I’m on S21FE and it does NOT.
Not that hard to deal with honestly. Rebooting at night which I’m sleeping does not reduces any functionality, cuz I’m not using it. If someone needs to find me during the night he better call me cuz I won’t wake up by notification which is also suppressed by DND. Yeah it is not design for security but a solution better than none.
Furthermore, rebooting the device periodically is good for security, especially for non-persistent fileless malware.
It does, labled “Auto Restart”, but only when “preformance issues detected” or time specified. Apple is quite late on this feature.
“new security feature” “warning”
🙂
Utill you’re no longer live in the US. I can’t find Ptivacy alternatives after moved out.
I wish it can be installed as PWA
deleted by creator
Unless you want to game. Anti-cheats are notorlessly anti-virtual machines.
So use what browsers? Chrome sounds more secure (I didn’t read previous post), yet I don’t want an advertising company looking at my browsing habbits, nor supporting them dominating the browser market share and have a powerful influence on every web standards.
Maybe. I’m not in the loop but I believe you would need to gain some solid trust from the core team to get that access. It won’t be a knowledge just flows in the scene up for any newly join members to grab.
AFAIK, L1 are hardware backed using Trusted Execution Environment like ARM TrustZone. Unless you can find an exploit to exfil the key from the chip, you have no luck. It was done before and published, but I believe it is patched already. Anyone holding such exploit would keep close to their chest to avoid it beimg patched.
I never used it, but I would assume yes after reading the frontpage and the doc. At no point there is a PSK set between sender and reciever, not I see any signs for key exchange between devices.
This is not a definitive answer though as I didn’t read the source code of Nfty, nor the UnifiedPush spec.
Meta+arrows key to shift windows around
Or is the key call Super? I know for sure it’s the “Windows” key.
How about torrenting?