If there’s malware on your system, when you can read it, the malware can read it.
If there’s malware on your system, when you can read it, the malware can read it.
What laptop? BIOS option?
I don’t think static linking is that difficult. But for sure it’s discouraged, because I can’t easily replace a statically-linked library, in case of vulnerabilities, for example.
You can always bundle the dynamic libs in your package and put the whole thing under /opt, if you don’t play well with others.
A full desktop with touchscreen costs money for extra hardware, and developer salary to port and test the software. Selling more specialized devices means you can use less powerful hardware, an embedded(ish) OS like Android, and only run your one program. That’s why the thing you’re looking for doesn’t exist, it just doesn’t make sense as a product outside your one very specific use case.
Okay, those devices are an entirely different category. If your goal is a full desktop environment, though, that’s completely the wrong thing to look at. They don’t have desktop input controls. The most widely supported device would probably be a Steam Deck or similar.
But, if your threat model is "being searched’, it depends on who is doing the searching. NSA? They’re going to pick you apart lest they have another Snowden. Immigration/customs? They’re going to ask you to turn it on and show it’s just a game console.
What are the crazy historical reasons? As far as I know, running six ttys and one graphical session, in that order, has been standard.
The really crazy historical way to test for crashes is num/scroll/caps lock. That’s handled by a very low-level kernel driver. If those are responsive, it’s probably just your display (gpu, X, wayland, or something) that’s locked up. If they’re unresponsive, your kernel is locked up. (If you’re lucky, it’s just gotten real busy and might catch up in a minute, but I’ve only seen that happen once.)
Anything that might interfere with sleep. Literally any attached device might have a buggy driver.
I don’t see a list of hardware in your edit.
Define “retro”, because no Game Boy supports Android or Linux that I know of. Nor even a DS.
Most retro handhelds do not have cellular network chips, gps, or even built it microphones or cameras
All I’m hearing here is that they’re not useful for much. Not even audio calls if there’s no microphone. I’m not sure what you’d use them for.
It depends on what you’re trying to achieve.
iPhone. Parental controls.
The goal here is to make sure they can be safe online, by telling them to watch what they say, don’t post personal info publicly or send it to strangers. Don’t try to control what they do online, because it won’t work. Banning them from using platforms like instagram when all their friends are using it is just going to make them the weird kid. I don’t know if they explicitly support account limits for kids, but there are digital wellbeing tools that let you set warnings and limits on apps.
I also wouldn’t use any tracking tools outside the family location sharing. And I wouldn’t give anyone else access to it, like their grandparents, unless there’s a need, like it’s just them and the grandparents on a trip.
Yes. And these posts should be sent there. I don’t come to the Linux community for shitposting.
It’s for work? Keep using Windows. VM or separate PC or whatever. Maybe WINE.
You could just move the dir and leave a symlink in its place. It doesn’t solve the actual problem, but it’s much easier and will keep everything working just fine.
What default?
I’m guessing one of the services makes that change on startup. Start them one by one and see. Then check its configuration.
Personally I just run them in containers. Much less mess.
That feeling when hip surgery is next month
You don’t need to connect them to a display. Give them power and network, and access them remotely via ssh (or graphical protocol if you really want to, but unless you specifically want to run interactive GUIs there’s not much point).
As for combining their power… it depends on what kind of work you want to do.
Generally, we don’t. I can count on one hand the number of times I’ve had to mess with it. Two times I had to use restorecon, and two times I had to loosen permissions for an HTTP server. Literally everything else has worked without issue.
I know some people love to bitch and moan about it, but honestly I have to ask what they’re doing, because I’ve had zero non-trivial problems.
GPL would not require that. It would only require publication of the source. There is no requirement to give back or even make your changes compatible with upstream.
Usually they announce arrests. I’m guessing he fucked off back to China before they could pick him up.