Even there, if the stars align (network access, cups being used), you still need to convince the user of the device to switch printer.
Even there, if the stars align (network access, cups being used), you still need to convince the user of the device to switch printer.
As far as I’m aware, the exploit requires someone to try printing using a malicious networked printer. It is a vulnerability, yes, but it affects essentially nobody. Who tries manually printing something on a server exposed to the internet?
Although for local network access, like in a corporation using Linux on desktops, the vulnerability is an actual risk.
If this was the case, the phrashing around the issue would’ve likely been different. Yet bitwarden remained very vague, and even locked github comments on the issue.
Especially considering that a move like this alienates their core target demographic (people who use FOSS), they would’ve been much more open and much quicker if it wasn’t intentional.
I will personally be switching, likely to KeePassXC.
GrapheneOS developer is very toxic, if you trust him is up to you. I prefer not running his code on my personal devices, especially after him blaming large parts of his community for coordinated harassment. Watch Louis Rossman’s video on it.
Although for security-focussed custom roms on the google pixel, like Calyx or Divest, you can re-lock the bootloader, so there’s less security risk. A factory reset is required to unlock it again, similar to a factory bootloader lock.
According to Jim Starkey, the person who coined the term, “Blob don’t stand for nothin’.” However, it is often referred to as a “Binary Large OBject”, meaning a large file with content not easily readable by people.
With an open source project, you have source code which is turned into executables/“blobs” by the compiler. As long as you trust the compiler, you can (functionally) know the content of the blobs by looking at the source code they were made from.
In the case of Ventoy, several “blobs” are included from an unknown or vague origin. This is a great way to bundle malware, as seen with the XZ backdoor from earlier this year. As such, the original creator of the linked issue is requesting they are built/obtained at compile time, so either the content or origin of these files can easily be found.
No, this is Patrick!
The actual cheaters completely bypassed the new anti-cheat in about 6 hours. They had to update their cheats a bit, but are otherwise essentially unaffected. Linux users, Steam Deck users, and people who don’t want to give a single game full hardware access, are all affected. None of those can play GTA:Online anymore, unless they mod the game to bypass the anti-cheat, which can be seen as cheating in itself, and could result in a ban.
The ddos attacks are likely being orchestrated by a small group of people or even an individual, it probably does not represent the vast majority of affected users.
Linux, it fits my needs better on desktop, and is much less painful to troubleshoot than Windows, with more freedom and control than macOS.
I took a shortcut when typing that, quoting the OP instead of further explaining. It is definitely possible to visualize 4 datapoints, but not 4 spatial dimensions. The only way to do so is to project to lower dimensions or take a lower dimension slice and display that. That works for 2D slices/projections of 3D objects because we already have a full understanding of 3D. It does not work for 2D projections of 4D objects, similar to how “flatlanders” couldn’t make sense of a 2D or 1D projection of a 3D object.
Wasted my time watching this. 23 minute video that repeats itself so often there’s only ~30 seconds of information. It feels very AI-generated. And it is not possible to “visualize 4D”, the video does not prove otherwise.
Correct, Vector does not receive this information unless you willingly share it with them.
Element is able to use features called “Integration Manager” and “Identity Server”. When using an Identity Server, you can choose to link name, email, and phone number to your Matrix account. When using an Integration Manager, there’s a feature to share your location with others in chat.
As such, Vector discloses that they “collect this information”, although (except some diagnostics), this is completely optional.
(I am not associated with Vector, just interested in Matrix)
“clean driver install”, which heavily suggests you installed nvidia drivers, probably from the website. That issue is entirely on you.
Although “custom Windows ISOs” are a big security risk, AtlasOS isn’t a “custom ISO” and running a random binary off some guy on YouTube is arguably just as bad. He has next to no knowledge of Linux, neither do any other “Linux YouTubers”. Trusting someone like that with your Linux machine is risky at best.
They do make other Android-based devices like the Meta Quest line of VR headsets, and Facebook was just an example, any other OEM fits in that statement as well, like Samsung, Google, OnePlus, etc.
Lets go through the summary and see if anything is wrong or misleading:
Linutil is a distro-agnostic toolbox designed to simplify everyday Linux tasks. It helps you set up applications and optimize your system for specific use cases. The utility is actively developed in Rust 🦀, providing performance and reliability.
sudo pacman -S networkmanager
as “helping”, even when it ignores existing network configuration.So lets revise the short description, to exclude any incorrect/misleading statements:
Linutil is a toolbox. The utility is actively developed.
Alongside all that, the “installation instructions” include the biggest sin of all:
curl -fsSL https://christitus.com/linux | sh
TL;DR Never trust Chris Titus, or any “Linux YouTuber”, with your Linux machine. They do not know what the hell they’re doing.
That indicator and the permission system are provided by the OS on your phone. If you trust your OEM not to abuse it, then it works. If the company that made your device is facebook, neither of those features prevent facebook from listening in 24/7.
mount -o remount,ro /
That was a possibility with this exploit, but realistically that doesn’t affect nearly as many people as “All GNU/Linux systems”.