The Tunnel daemon creates an encrypted tunnel between your origin web server and Cloudflare’s nearest data center, all without opening any public inbound ports.
The Tunnel daemon creates an encrypted tunnel between your origin web server and Cloudflare’s nearest data center, all without opening any public inbound ports.
The good news is that in order to exploit the new vulnerability, the attacker first has to obtain kernel level access to the system somehow - by exploiting some other vulnerabilities perhaps.
The bad news is once Sinkclose attack is performed, it can be hard to detect and mitigate: it can even survive an OS reinstall.
Release blog post by the infamous “please remove my packages from NixOS” developer: https://community.home-assistant.io/t/consider-to-avoid-adding-library-dependencies-from-frenck/315185/20
That makes some sense I suppose. What was it about DragonFlyBSD and macOS kernel?
Faster in what sense? Would you kindly point me to the benchmarks used? It’s easy to find the opposite results so I’m curious.
You’re right - I misunderstood the question and thought you meant the distribution images
At least Kali and Arch do
Cloudflare tunnel is an option, you can even scrap your own nginx
I’m a nix noob but I think this is a release of the nix package manager and therefore it’s unrelated to the version of the nix channel with nix packages.
Sounds like you have a pretty okay experience but some specific things don’t work - please take some time to report bugs if you haven’t yet!
QR code issue is most likely due to LibreWolf silently denying Canvas access, you can enable it per-site: https://librewolf.net/docs/faq/#should-i-allow-canvas-access-how-do-i-do-it
Not sure about video conferencing.