I have a similar device Intel atom, 1gb RAM. I installed arch and use it as a headless computer (without DE/WM). If I need WM I use sway. Use a minimal browser like Qutebrowser. Although it would also run like shit but better than chrome/firefox.
I have a similar device Intel atom, 1gb RAM. I installed arch and use it as a headless computer (without DE/WM). If I need WM I use sway. Use a minimal browser like Qutebrowser. Although it would also run like shit but better than chrome/firefox.
The argument still holds. If they have remote execution access, they already have your data. Encryption can’t protect your data here because encrypted data will automatically become unencrypted once the user logs into the computer. If the attacker has remote access they can log into your account and the data will be unencrypted.
Yeah, I know about this. That’s why backups are so important.
I understand Signal’s stance on this. For this vulnerability, the attacker needs physical access to computer. If the attacker has already gained physical access, the attacker can already access your messages, crypto wallets, password managers.
Many password managers also have this flaw. For example, Someone can change Keepass master password if the user is already logged in to the session, if they have physical access to the PC and lock you out of all your accounts.
It is merged in 6.10 which is about to be released on Sunday (14 July)
Probably Yes
Probably ethernet/WiFi driver missing or NameServer not set up correctly.
Try pinging 8.8.8.8, if it works then it is a nameserver problem.