I am curious as per the secure enclave part. Does it mean that they will be signing binaries? Does it mean that we will get secure boot support without self signing? Does it mean that there will be a signing system for the anticheats???
I am curious as per the secure enclave part. Does it mean that they will be signing binaries? Does it mean that we will get secure boot support without self signing? Does it mean that there will be a signing system for the anticheats???
I mean… It mentions waydroid so it is probably going to use that for android compatibility…
I object for the greek one.
We call it
Αμόγκους
Or
Αναμεσάμας
Follow up:
Ok so aparently 7z compression is the culprit. If I extract the file. There is a setup-stub.exe file that shows clear in there.
I got it from the official website.
I have read on the firefox forum that this particular anti-malware engine flags these like that. I just want to know to be sure. Is there somewhere where I can check if it was officially generated by firefox (other than the signature which seems legit)
:")
Finally! Some competition with Steam OS! Hopefully only good things will come out of this!
It should be safe, although for the future, I’d recommend installing the os to a completely separate drive and changing boot device by uefi.
Since you asked, I really don’t have any issue as long as it is no smaller than roughly 15cm in one direction.
Edit: will ofc look at the stuff you sent. Replying quickly since I am doing sth rn : P Thank you!!!
Nothing matters (so do nothing because there is no reason to do something)
Nothing matters (so do anything because why not!?)
Haven’t heard of them, checked it out after this comment and I think it is what I am looking for. A bit concerned about the lack of fillament detector (watched the Maker’s Muse video).
Latest? Have you tried running other versions of proton?
Edi: ignore this comment others seem to have answered.
Ape Sex.
Ok jokes asside, which version of proton are you using?
Oh it is not about them.
They are also for proof.
For the last one, I don’t think they have a choice. Since they effectively don’t have democracy, you can’t blame them since they are being forced by the regime. And it is hard to overthrow when the dictator is known to kill political competition.
Congrats! : D
If you have time, maybe share the solution so future people can check and fix it themselves.
That sounds awesome. I never understood how a TPM can figure out if an attacker can get the keys if the tpm is on the same machine. Does it check independently the signature of the application that asked for the keys?