I believe the idea is that even if the machine is running Windows, an attacker could just boot an affected grub version from a USB to perform the exploit
Android is fine because you're able to use a web browser to get an auth key. You have to register devices where you can't do that, and it seems to be impossible in the case of the pixel watch
Edit: Also, they're not concerned about privacy. They want to know who every device belongs to
The Pixel watch has this problem too. However, it randomizes the MAC per network, so that strategy won't even work. I've tried to get it from the debug log but failed I've resigned that it won't be getting connected to the school network
If they're using md5 (which would be in line with their security practices), the block size is 512 bits. That means that everything less than 64 characters is the same cost
I'm glad he's still running. If a Republican is going in office, I want it to be Trump. I want project 2025 handled by trump, as he's the moron who's most likely to fuck it up
At least with AMD on Wayland, gpu offloading works seamlessly. But I'm not sure if the GPU is actually powered off when I'm not using it; my use case is an egpu rather than a dual GPU laptop so I don't notice battery from it. I don't know what the situation is with Nvidia or xorg
I think they're referring to the fact that bash is GPL while ZSH is licensed permissively