For basic functionality, yes.
For basic functionality, yes.
E2EE is only in-transit. They are the other end, so it can be decrypted there.
But they also say it’s zero-knowledge, so it’s more than E2EE. They take the encrypted stream and write it directly to disk. Claiming E2EE is probably not what they wanted to convey.
Yeah let me just do some AES in my head real quick
If the IP address belongs to a network in country B, that’s why it would place you there.
If they’re on your device, you’ve already lost. To protect against that, you’d have to keep an offline device, either physical or digital. Digital encrypted, physical in a made-up language and script that only you know.
Digital with strong encryption, and protect the device so that it can’t be copied while unlocked. You’re probably not so important that they’d target you.
It’s called physical-to-virtual, or p2v. Proxmox uses qemu under the hood, so you should be able to start from their docs to create the VM: https://pve.proxmox.com/wiki/Advanced_Migration_Techniques_to_Proxmox_VE
Unless your whole router tunnels over a VPN, it probably geolocated you to country B.
But geolocation databases are inaccurate, and sometimes advertisers target a large area. It might just be a guess.
That’s how it should work, yes, if Nintendo can demonstrate prior art. That’s the first-to-invent system.
The US did change to first-to-file some years ago, but from the articles like this coming out, it sounds like they’re still granting patents to the first inventor.
I would just download them. Already ripped, encoded, and compressed.
Usually they announce arrests. I’m guessing he fucked off back to China before they could pick him up.
If there’s malware on your system, when you can read it, the malware can read it.
What laptop? BIOS option?
I don’t think static linking is that difficult. But for sure it’s discouraged, because I can’t easily replace a statically-linked library, in case of vulnerabilities, for example.
You can always bundle the dynamic libs in your package and put the whole thing under /opt, if you don’t play well with others.
A full desktop with touchscreen costs money for extra hardware, and developer salary to port and test the software. Selling more specialized devices means you can use less powerful hardware, an embedded(ish) OS like Android, and only run your one program. That’s why the thing you’re looking for doesn’t exist, it just doesn’t make sense as a product outside your one very specific use case.
Okay, those devices are an entirely different category. If your goal is a full desktop environment, though, that’s completely the wrong thing to look at. They don’t have desktop input controls. The most widely supported device would probably be a Steam Deck or similar.
But, if your threat model is "being searched’, it depends on who is doing the searching. NSA? They’re going to pick you apart lest they have another Snowden. Immigration/customs? They’re going to ask you to turn it on and show it’s just a game console.
What are the crazy historical reasons? As far as I know, running six ttys and one graphical session, in that order, has been standard.
The really crazy historical way to test for crashes is num/scroll/caps lock. That’s handled by a very low-level kernel driver. If those are responsive, it’s probably just your display (gpu, X, wayland, or something) that’s locked up. If they’re unresponsive, your kernel is locked up. (If you’re lucky, it’s just gotten real busy and might catch up in a minute, but I’ve only seen that happen once.)
Anything that might interfere with sleep. Literally any attached device might have a buggy driver.
I don’t see a list of hardware in your edit.
Internet2 too