Maybe setup a live USB and mount it from a live environment to see what it comes up with?
Maybe setup a live USB and mount it from a live environment to see what it comes up with?
I would get a faraday bag or a phone with a physically removable battery if you want to be 100% sure. Even then, it’ll depend on how many traffic cams there are. It can be really difficult to not get tracked anymore.
Vaultwarden (self hosted bitwarden) is my go to.
Depends on your definition of success. If you mean at removing drugs from wide availability, none. If you define success as making the prison industrial complex obscenely rich by locking away a new class of slaves and absolutely fucking ruining their lives, all of them.
You could have ended that sentence with enshitting and still been correct.
Not to mention, as stated above, native ports are often not maintained so when the libraries required for them eventually break API, proton is your only option anyway.
Quest headsets maybe
I must have just missed that originally, I was commenting before coffee.
I see you have the combination graphics (Optimus is what it was originally called IIRC) which has a history of sleep wake issues, that might be a good place to start on the monitor search.
Sorry, I forgot that it doesn’t default to latest. Make a share text of journalctl -b instead
Any additional details you can add would go a long way towards troubleshooting. That desktop are you using (ex: Gnome, KDE, etc) and what model of laptop, the full hardware specs including CPU, GPU, WiFi model, etc. Finally, you’ll want to look at the system logs to see if there’s anything useful in there after resuming from sleep (journalctl).
That was one I didn’t know about before. Someone in the UN, please make this happen. Maybe if China brought it to the general assembly.
TBF, that joke predates me using Linux as my main which I just realized has been 18 years now.
Yep, perfectly acceptable to be happy now, but do not let your guard down. The USA has done the same shit with trying to end civilian access to true encryption how many times?