The cheap models can not be flashed with openwrt since they use some proprietary drivers or something.
The complete Opal series is not supporte iirc.
The cheap models can not be flashed with openwrt since they use some proprietary drivers or something.
The complete Opal series is not supporte iirc.
You should have read the post more carefully. The CVE affects every OS. Just the first shown example is Windows only.
Also, the relevant commits are outlined in the first paragraph. This article is not for the stupid user it’s a technical analysis on a few ways to exploit it and for those cases the commits are more relevant than the version. Also saying which versions are affected is not that easy, commits can be backported into an older version by for example the packager.
You want the mail-crypt-plugin in dovecot.
And how often. have you said stuff that you have not received advertising for? You will notice it when you get a positive match but not on a negative.
Data collecting companies can predict/rate your behavior for more then 20 years based. Since then. it has been perfected. They know that you are interested in those topics without having the need to waste resources on recording and analyzing every single audio stream.
Extracting the key from a TPM is actually trivial but immense time consuming.
Basically this with probably more modern chips and therefore even smaller cells. https://youtu.be/lhbSD1Jba0Q
Also sniffing is a thing since the communication between CPU und TPM is not encrypted.
Wasn’t the CVE fixed in a reasonable time frame? I seriously doubt that the maintainers would have ignored it if it wouldn’t have been discussed so publicly.
AFAIK, to exploit it, you need network access to CUPS then add the printer and then the client needs to add/select a new printer on the client device and actively print something.
If CUPS is reachable from the internet, then the system/network is misconfigured anyway, no excuse for ignoring the issue but those systems have other sever issues anyway.
TPM is not only used by the system encryption. But no i do not use it for it. Not because of privacy, cause of security reasons.
As for a backup, I figured I would have to raid it.
RAID is not a backup. Never ever consider having the data on a RAID to be backed up.
Basically, when you do not run server side transcoding and instead rely on client side support you will run from time to time into issues. Jellyfin does not have the ppl to get every client to work with all the different formats on every hardware.
1080 h264/h265 does not say much about the media format. Those codec differentiate in things like Chroma (4:2:0; 4:4:4, etc) or in color depth like 8 or 10 bit. So not every h264 media file does run on the same hardware. Audio codecs are even more complicated.
I think since i setup my hardware transcoding I ran into a not playable file once. But depending on the hardware it can be worse. On android TV you may have to play around with the settings.
I understand that this can be a deal breaker for some ppl.
Yes you have. Please explain to me the additional context. I seem to not grasp it.
What else are they doing then asking? Doing some marketing around it? If you get pressured by that you should not lead a company.
If you don’t want a permissive license don’t license your software that way, your motivation clearly doesn’t align with these licenses anyway.
Why does asking for money not align with the licenses?
Any software potentially has security issues. The matter is how they deal with it.
You still need to store those secrets. You would probably refer to a keychain but in the end it is still a password/secret manager.
And the current implementation is not really better, services like paypal still do not allow you to use a passkey on the desktop.
That is why you use an open source manager. KeePassXC for example is not owned by a for-profit company.
Losing the container due to corruption disk failure etc can be easily managed with backups.
Losing the password. Yes this is a real valid scenario. I personally have no problem with that i manage fine for years without having to write it out on paper to backup it. A solution would be to actually write that password out somewhere and hide it/ put it into a safe. An attack then needs to attack both, depending if you use disk encryption it is easy to get access to the password safe or not. There are other things to consider, like you could try to hide it in a very long string of characters like 20 pages of random characters, even if you forget it you will be able to find it cause it is very likely that you remember a few characters.
I know a lot of services that log you out regularly. Or need a password when you change settings or whatever.
Well yea people with the “I don’t care. I just press the button and it always works” model do exist.
WTF no. Password managers are reasonable secure. That is no i don’t care behavior.
And when you are worried about password managers you should not use cookies. Stealing a cookie is much more simple than stealing and encrypting your password safe.
Differences in the thread model. And of course convince. How to you backup your paper regulary? How do you transfer it? What if you need to access a pasdword when you are not home?
Most ppl will just reuse or use very weak passwords when they have to write every password they have to enter.
Best we have and probably will ever have on the current web. Not sure what the problem is with password managers?
No Web Screenshots are included.
Would it be not much easier (and more portable) if you create a Linux VM in for example VirtualBox? From there you could just follow any Linux guide.