That was a possibility with this exploit, but realistically that doesn’t affect nearly as many people as “All GNU/Linux systems”.
That was a possibility with this exploit, but realistically that doesn’t affect nearly as many people as “All GNU/Linux systems”.
“But it looks bad and could be bad for the battery!”
Every other wireless mouse has it in the front, Apple has no valid reason to leave it at the bottom.
Even there, if the stars align (network access, cups being used), you still need to convince the user of the device to switch printer.
As far as I’m aware, the exploit requires someone to try printing using a malicious networked printer. It is a vulnerability, yes, but it affects essentially nobody. Who tries manually printing something on a server exposed to the internet?
Although for local network access, like in a corporation using Linux on desktops, the vulnerability is an actual risk.
If this was the case, the phrashing around the issue would’ve likely been different. Yet bitwarden remained very vague, and even locked github comments on the issue.
Especially considering that a move like this alienates their core target demographic (people who use FOSS), they would’ve been much more open and much quicker if it wasn’t intentional.
I will personally be switching, likely to KeePassXC.
GrapheneOS developer is very toxic, if you trust him is up to you. I prefer not running his code on my personal devices, especially after him blaming large parts of his community for coordinated harassment. Watch Louis Rossman’s video on it.
Although for security-focussed custom roms on the google pixel, like Calyx or Divest, you can re-lock the bootloader, so there’s less security risk. A factory reset is required to unlock it again, similar to a factory bootloader lock.
Was yes. They have introduced an “internal sdk” into all their clients with no available source code. That’s what everyone’s complaining about. They call it a “packaging bug”, but in reality Bitwarden clients are just no longer open source.
As in, 0x11 is 17 in decimal.
AI photo, check the coins on the left
VR “works”, but as someone who uses it, I can’t reccomend it for now.
Compatibility is wildly different between headsets. And no matter which route you take, you will need to tinker and troubleshoot. There is no plug and play solution right now.
If you want to plug in your VR headset, and just play some games, stick to Windows for now. If you’re fine tinkering around, there’s always SteamVR, but also check out Envision and Monado.
As for desktop games, you can find what works on ProtonDB. Most games work fine, with the exception of games with kernel level anti-cheat.
SteamOS is not the same as its base Arch Linux. If you want something slightly easier but still Arch-based, try EndeavourOS (but please not Manjaro).
If you have the time, try switching on your own terms within the next year. It’s almost guaranteed you’ll run into issues, but trying to dual-boot now rather than later gives you all the time you need to figure it out before MS forces you on Windows 11.
DuckDuckGo’s webbrowser is somewhat unique, in the sense that it isn’t its own browser at all. It’s a “WebView”, using the OS built-in webbrowser with a coat of paint.
This means it’s Blink/Chromium on Android and Windows, and WebKit on iOS and macOS.
Yes. There’s only 3 major browsers. Chromium (Chrome), Firefox, WebKit (Safari). Nearly every other webbrowser is a fork of one of these, most are forks of Chromium, including Opera. As such, most webbrowsers will be affected by the change.
Still doesn’t make a VPN the “magic all in one solution” it claims to be. And SNI is encrypted on newer servers using encrypted client hello (ECH).
In terms of privacy, you’re switching around which entity gets to see a ton of details. Do you trust random public wifi enough, given modern security standards? Or do you trust a VPN company more, despite false advertising?
Use HTTPS and DoH (Becoming a default on some Android versions), and the average person will be just fine without a VPN.
No, this is Patrick!
The actual cheaters completely bypassed the new anti-cheat in about 6 hours. They had to update their cheats a bit, but are otherwise essentially unaffected. Linux users, Steam Deck users, and people who don’t want to give a single game full hardware access, are all affected. None of those can play GTA:Online anymore, unless they mod the game to bypass the anti-cheat, which can be seen as cheating in itself, and could result in a ban.
The ddos attacks are likely being orchestrated by a small group of people or even an individual, it probably does not represent the vast majority of affected users.
Sadly there would still be wars, as some see “the other side losing” as a win. Even if both sides are completely destroyed.