The issue is that you don’t want to give some random untrusted process root access.
It’s been awhile since I’ve used anything but Magisk but usually you have to set root permissions per app, or you can get Magisk notification to request access.
The issue is that you don’t want to give some random untrusted process root access.
It’s been awhile since I’ve used anything but Magisk but usually you have to set root permissions per app, or you can get Magisk notification to request access.
deleted by creator
Two Israeli officials said the Israeli war cabinet approved ten days ago the parameters of a new proposal for a hostage deal, which are different from past aspects of deals rejected by Hamas and more forward-leaning than previous Israeli proposals.
This stuff really doesn’t happen that quickly.
The push to live services, online DRM, microtransactions, DLC and other such things is because they have identified that there is more money to be made as a ‘server operator’ than a ‘game developer.’
They don’t really care about getting paid for the game, they’d rather give it away for free if they can make more money off controlling the servers.
They have sold two ‘tiers’ of kindles for awhile, the one with ads on the lock screen is discounted.
It’s not my favorite thing but iirc the lock screen is supposed to be the only place with ads.
deleted by creator
https://www.nngroup.com/articles/computer-skill-levels/
Generally people are worse with computers than you think.
A computer preinstalled with Linux is definitely more likely to confuse than you imagine
deleted by creator
It wasn’t?
FTA
The trauma experienced by hundreds of thousands of children and their parents in Gaza will also have long-term debilitating effects, psychiatrists and psychologists have warned, particularly as there are no therapeutic facilities left. Few of Gaza’s hospitals are functioning any more, even for operating on the severely injured.
With an estimated 8,000 children killed in Gaza, and many tens of thousands more injured and orphaned, the UN children’s fund has said the Gaza Strip is “the most dangerous place in the world to be a child”.
Removed by mod
It’s from the earlier days of computing/portable devices where almost nothing had the sort of inter-connectivity we take for granted.
You’d download apps or music onto your PC and then ‘sideload’ them onto your PDA or MP3 players.
Sometimes this required both proprietary cables and software. (This is why some of us still get excited by simple USB ports)
a word for such things is ‘dark patterns’
it’s not designed to be liked but to keep the player returning habitually and upping so called “retention.”
It’s mostly up to which manufacturers allow boot loader unlocking.
The pixels are somewhat a continuation of the nexus line which were more developer centric.
deleted by creator
deleted by creator
I used Signal since it was called TextSecure and I don’t think I ever successfully got another person using it.
Eventually uninstalled it because it was just largely useless, anytime I messaged a friend who seemed to be using it they were more confused than anything.
Having the right cartridge available without trying to find a shop selling them is.
One of the obstacles in this is if your printer only takes a single brand of ink.
I usually just order ink, but it’s not too hard to find ones compatible with my brother in a store if I need one immediately.
The fast start up option actually should still be under power options, though not really intuitive or easy to find.
Look for the part that says “Choose what the power buttons do” and it should be there.
I tend to just turn hibernation all off because I don’t really use it, and I’d typically rather have the space hiberfil.sys takes up.
It seemed to be just a 5 second wait.
The weird part is that changing user agent to chrome seems to avoid it.
I suppose it’s possible to build a system that would let you specifically allow a VPN IP to be green-listed on your account, but you’d probably have to allow it by signing in from a known good IP first.
I think it seems like lot of work for something that isn’t really private and is still probably vulnerable to exploit.