how do they do regular updates? how do they do major version upgrades?
I think both of these is a big pain point.
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
how do they do regular updates? how do they do major version upgrades?
I think both of these is a big pain point.
we’re doomed then
I have been using the same CPU for half a decade. Not everyone is an impulse buyer.
So I don’t understand why people are taking issue with them cooperating with LE
some believe they (proton) are invincible and can do whatever they want. maybe because they think that’s what swiss privacy and swiss laws mean
the issue is that they can’t defy the law without shutting down and going into jail. proton has given the tool the activist would have needed to protect themselves: the service has an official onion site, which would have made IP collection impossible, and they could have just said they can’t know it
why?
to respond to the title, I’m not sure about that. your problems are with the samsung system, not with all the custom roms. I think it’s not only graphene that’s the solution. It’s even only available for a little subset of the phones.
I disagree that users won’t do stuff on their own. They will, but they will allocate very little time to it, on average, especially when compared to a tech savy person. And that’s just because their computer is a tool.And if they cannot make their tool work for what they want to do, they’ll find another way. Or deem it impossible.
also don’t forget that many don’t even have the time and energy
and start off from a fundamentally wrong premise: that people are willing (let alone wanting) to manage their own operating systems.
people shouldn’t need to manage their own operating systems, to begin with
not the IDE, its the compiler. this is also not some AI shit, in many cases (not all) the compiler can actually figure out how to do this, because it’s not hard, it would just be a lot of boilerplate if written manually.
You can do that without this software too. Create separate windows accounts for every member of the family, preferably offline accounts (which are not attached to a Microsoft account and an email address), and put a password or a pin code on yours.
I imagine it would be worse to simply decrypt these and leave them in a random folder somewhere on users’ phones in plain sight, available to any app that would read them.
Why, did it encrypt and then delete the files that it detected as important when it scanned the device? That’s just even worse.
I think it’s just dumb to not make a backup before large updates. There’s so many things happening, a lot can go wrong, especially if you have added 3rd party repos and have customized core parts of the system, not just through config files but let’s say you switched to latest kde plasma from the one your distro ships.
And what happens if you have to restore the backup?
You can look up what’s the solution to your problem in peace while everything is still working. If it was a server, all the services are still available, if it was your desktop you don’t have to use a live linux usb that’s without all your configs to find the solution
If you want something easy to use and you don’t have to learn buy a Mac, you want great software compatibility buy a windows pc.
That is very bad advice, as that may well not be a solution. There are people who want to use their computers without the ads, data mining and forced program defaults windows is doing.
That’s true that if people switch OS, they’ll need to learn a lot of new things. But don’t forget that not only sysadmins and adventurous people use Linux.
That being said, there are distros that give you a decent GUI frontend to the package manager, for example openSUSE
Maybe this is the solution. If they can’t be trusted to behave, they’ll be able to see the pictures at the next family gathering.
Containers have to run somewhere too…
No, I don’t have any suggestion for how should Apple circumvent laws. But if they can’t improve on it, they shouldn’t lie that they did so.
It’s not bad design, it’s definitely intentional, however I agree that it’s probably not for having backdoors, but for convenience. Average people forget their passwords all the time, and with encryption that level of carelessness is fatal to your data if they have not saved it somewhere, which they probably didn’t do.
Very few devices are rooted and usually you cannot get root without fully wiping your device in process.
I’m pretty sure the system is not flawless. Probably it’s harder to find an exploit in the OS than it was years ago, but I would be surprised if it would be really rare. Also, I think a considerable amount of people use the cheapest phones of no name brands (even if not in your country), or even just tablets that haven’t received updates for years and are slow but “good for use at home”. I have one at home that I rarely use. Bootloader cannot be unlocked, but there’s a couple of exploits available for one off commands and such.
Not lying that they are improving the privacy of users would be a good start
I don’t understand, sorry. what I meant is the way you as the user do upgrades. you grab a terminal, elevate and run the system update command (zypper refresh, zypper update). major version upgrades are more complicated.
I can do this sure. But this is not noob friendly the slightest. and the YaST graphical tools don’t make it much better either.
I won’t say that the update system of windows is good because why the fuck does searching for updates minutes, and other reasons. but the UI of it is much better. it tells you what will it update, it has a button for starting the process, an automatism for it too. there’s also a menu for the update history.