lol! There’s such a mix of people being genuinely helpful and people telling me the joke is past its sell-by date. But I hadn’t come across reflector before and will definitely give it a go—thanks :)
lol! There’s such a mix of people being genuinely helpful and people telling me the joke is past its sell-by date. But I hadn’t come across reflector before and will definitely give it a go—thanks :)
Thanks—will give this a try.
Thanks—I am running the zen kernel because I didn’t really understand the question during archinstall, and have added an AUR helper but still no lack of joy.
I’ll definitely give this a go—probably on Friday afternoon.
10 years of idle time in 10 years. Did you just like leave a computer switched on for 10 years while you took up farming?
Partially. The summary isn’t quite in line with the detail:
Android is the only operating system that fully immunizes VPN apps from the attack because it doesn’t implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.
Just archive it and take up farming.
The graphs are all interactive (touch to show labels, etc.). That can interfere with scrolling—try dragging at the edge or one of the pie chart titles. Fwiw, it scrolls ok on mobile safari…
It’s funny you getting downvoted for quoting the linked article :/
And likely Crowdstrike will have their own insurance. At the end of the day, it’s just gamblers sitting at the table, moving the chips around.