A new DLC has been launched recently… I can’t stop playing it
Now it’s easier to move between asteroids…
@mcury
Or use VM with that M$ garbage for work…
Support? You running Arch btw, what kind of support can you possibly need?!
A DLC? For a PS2 game? what?
Perhaps - this youtuber is anyway. He goes on about the dangers of opening the hood on an ICE car as justifying his stance on electric cars - but the cases are far different. For one thing, if you don’t know what you’re doing under the hood of any motor vehicle, you can get hurt… with the electric vehicle you can get killed!
That said - there should only be a warning that says so, not a prohibition. Not that it can’t be gotten around, of course - but in case of insurance claims - the ‘not permitted’ I suppose protects the manufacturer a bit more!
Beyond his poor choice of comparables, he does have a point or 2!
Unfortunately they don’t provide me anything, not even a pencil heheheh
But I won’t complain, you see, I have to drive 70km to go to work… And sometimes I need to do it, when my Internet is down or having power outages…
So, if I can do it from home, I’ll do it…
That is true… But RDP from Linux to a Windows PC, use forticlient, use apps from other vendors, update clients firewalls, if something goes wrong and the client faces downtime, it’s on me…
So, I just use Windows for that…
ahh.
Ok, that isnt that Oni what i know
I know this:
It’s also PC btw, but surely no DLC
Im not happy about Pluton, but Ryzen 6000 Mobile CPUs look REALLY nice otherwise. the 12 CUs on the iGPU buts it at 768 shader cores along with DDR5 memory is around RX460 or higher levels of performance on an iGPU which is damn impressive.
Ill wait to see the pluton situation but this might finally be good enough for me to swap out my 10yr old Dell Precision.
Its been forever and a day since ive seen this game. lol
EDIT: I remember watching GiTS back in the day and noticing the influence it had on this game.
“Microsoft Pluton, a remotely accessible TPM and platform security block that is not user accessible. The idea is that Microsoft can update your firmware, validate your platform, encrypt/decrypt anything, push or remove keys, and much more, all silently without your permission, knowledge, or ability to block. This block literally allows them to do anything they want to your PC remotely and there isn’t a damn thing you can do about it. You won’t even know they are doing something if they don’t decide to notify you. It is malware in hardware and is quite literally too dangerous to deploy.” (source)
Yes, that is exactly what it is. Malware baked into hardware.
If all computers become like that in the next few years, I’ll just stop using a computer, damn it.
Harhar. Then start to buy Microwave’s, Oven’s, Toaster, Washingmachine’s and other Appliances. Because someitme in the Future, EVERYTHING have something like that build in even the cheapest one
Most certainly they will, unless something major positive will change course of
which is highly unlikely…
Therefore either hoard best hardware of current and previous generations, or…damn it
Haha. And if this happens, i already exactly know how @Kresimir would look:
I’ll just go live in the swamp with my amphibian friends1. I’ll miss you guys!
1 At least until I get bitten by a mosquito and die of malaria. Oh well, better that than M$-Pluton…
or…
I wonder - can I possibly block this microsoft attact vector update at LAN’s firewall?
I just sent an enquiry to AMD regarding this Pluton chip. See what and or if they respond to me.
Edit: I’m not holding my breath!
I don’t think so…
I suppose that your computer will call Microsoft and not the other way around.
So it’s going to be an outbound connection, in which the traffic will be encrypted.
Usually, we have an allow all outbound rule, and a block all inbound rule, which is implicit most of the times.
So, to block this, you would need to block outbound connections to Microsoft… But they could be using other servers that are not in their ASN, like Amazon for instance…
If these servers are known to all of us, yes, you would be able to block it at the firewall level.
There are other options like IDS/IPS that could do the trick too, but at this time, as we have very few information, it’s hard to tell…