The problem is that breaking it will also break a lot of Apple devices.
No, but you could always bridge it to Matrix.
Be extremely careful. Plenty of people are really smart and malicious, so you need to isolate it from everything on your network. You’re giving random people remote code execution on your local network, which is like the worst case scenario for security.
That’s not really possible. With such a wide-ranging standard as USB-C, the cable needs to report what it can support. Without E-marker chips, for example, there would be three possible results: no cable can charge quickly, every cable is thick, short, and expensive, or cables catch on fire frequently. Cheap cables that don’t support all of the extra features are just cables, but the good ones need to let the computer know what they are capable of.
iPhones.
So they figured out that a $130 Thunderbolt 4 100W E-marker cable is better designed than a $10 USB 2 60W cable? I think they should have looked at a cheaper high-end cable, like a 240W Thunderbolt 4 cable, to see how a comparable one compares.
In my opinion, phone cameras are usually used to capture a memory, not a moment. Memories are idealistic and inaccurate, so I don’t think it’s a problem that a way of “storing memories” is also inaccurate.
Behavior-based antivirus is extremely difficult, failure-prone, and almost entirely unnecessary because of how secure Linux is, so they don’t exist to my knowledge. Signature-based antivirus is basically useless because any security holes exploited by a virus are patched upstream rather than waiting for an antivirus to block it. ClamAV focuses on Windows viruses, not Linux ones, so it can be a signature-based antivirus, but not many people run an email server accessed by Windows devices or other similar services that require ClamAV, so not many people use it, and nobody made any alternatives.
If you’re worried about security, focus on hardening and updates, not antiviruses.
A .ovh domain is more like $3 a year. That’s what I’m using.
Shouldn’t long-pressing a key type the key repeatedly?
Linux has a “compose key,” which lets you press the compose key, O, then /, which makes that character (Ø and ø, to show it working, as well as ∞, ™, °, ², ß, ä, →, and many more). There’s a port for Windows called WinCompose.
This may not fit your needs, but matrix-docker-ansible-deploy is really good, and it uses Docker and Traefik by default.
Correct. What you’d need in that case is a reverse proxy like ngrok, which is a bit more difficult to set up.
I have almost the same experience. I live in a small town in the Midwest, and the only ISP that goes to my house is Comcast/Xfinity. There’s a 1.2TB cap no matter what level you pay for, though they give you the option of paying an extra $30/month for unlimited. I’m really growing to appreciate our local ISP, which provides symmetrical FTTH, unlimited data, a static (or at least rarely changing) IP, and generally non-predatory business practices, all for a lower price than Xfinity. Unfortunately, my house is on the fringe of the town, so they don’t reach all the way here and I’m stuck with Xfinity.
True, but that’s also a well-known machine learning technique called adversarial training, often used in Generative Adversarial Networks (GANs) or when teaching a model to play games like chess or Go.
The issue is that it’s designed to be disposable. The subscription is to get you a new one of them frequently.
.ovh domains are like $2/year, if that helps.