

Im guessing though. I remember seeing it on 4chan as a teenager so thats between 2006 and 2010 or aomething :p
The real deal y0
Im guessing though. I remember seeing it on 4chan as a teenager so thats between 2006 and 2010 or aomething :p
In 2008? More than you’d think.
It is not, its been a thing since circa 2008
The problem is they are using ubuntu 24.04 which runs on an older kernel by default. Im a mainline user so unsure which kernel ubuntu uses now but i think its 6.4 which lacks a lot of intel driver fixes and support for battlemage. I cant blame them for not knowing or specifying, the only person knowledgeable for this is wendel and his team (level1techs).
Outside of mainline, ubuntu has a 6.14 kernel build they support but you have to actively look for it in the ui.
It is however, a sign for me that ltt is not suited for this and should have waited and investigated more before posting. Or maybe asked external help to verify stuff idk
Wanna bet its ai scrappers? Im part of multiple communities who have all been under serious ai scrapper bot ‘attacks’. We are talking millions and millions of requests in minutes by the bots. Its complete bonkers what those fucking bots are doing
Sure hope so. Ive been waiting for cinnamon on wayland to because stable for while now. Really want to try wayland without cursing all over the place
( and yes, i know i could just try another DE and use that with wayland, thats not the point )
Was all rendering issues, not multiplayer issues when i was playing, hence i was curious hehe
Wdym? Its a solid multiplayer experience like any mh game before it, no?
Yup!
And now we are facing the problems many sys admins face every day all over the world: certificate expirations!
Though instead of https(ssl) certificate of a server expiring, its the certificate used to validate what secure boot boots.
Thats what the article is about
A yes, the fun times of a baby haha. Enjoy! :p
Anyway, Secure boot itself was designed by the eufi consortium, which is a group of pc tech companies, to help make sure devices only boot what it can trust. Good on paper and in practice but…
back in circa 2011 microsoft had enforced any pc that wanted to be windows 8 certified ( and get the sticker ) to require secure boot to be enabled together with fastboot. All motherboards needed to have a tpm module with only the microsoft certificate in it. This meant that booting from a usb or cd was completely off the table and you could just not install linux, period.
And even if you did, the kernels or bootloaders were not signed so they would be refused by the bios/eufi.
This was a big thing back then, and canonical and redhat tried and found a few ways around it, and so did some individuals.
But afaik the linux foundation ( which microsoft is part of, funnily enough ) made some binaries that were signed and allowed linux to boot under secure boot, including usb/cd.
Iirc, during the linux installation the distro will add its certificate to the tpm so that kernels signed by the distro boot fine.
To this day, without those binaries from the foundation, it would be impossible to boot linux with secure boot and can still cause issues when dual booting and having bitlocker enabled for example. Bitlocker detects a changed boot state (by grub) and says fuck that, give me the recovery key or i aint decrypting this.
Here is a google search if you want dig deeper, it should all be from circa 2011-2012 :
https://www.google.com/?q=windows+8+oem+to+disable+linux
A quick way to know is if youre running custom build kernel, or use mainline on ubuntu based systems, youre not using secure boot.
Those kernels are generally not signed and the cert is not added to the tpm to allow it. Youd have to have gone out of your way to do it, in which youd know secure boot was enabled :p
With? How it could effect us?
It might. It depends on a lot of stuff.
Microsoft was heavily involved in the making of uefi and secure boot but had heavy resistance from canonical as the early drafts of secure boot would not allow os’ to add signing keys to the tpm so a machine would only be able to boot windows.
Thankfully canonical won that debate :')
Thats bullshit. The switch 1 also had all of this functionality and nobody complained…
Physical media ftw btw
First lookup what youre saying, seriously. None of what you said is true. If it was, a system that had no internet could not start any downloaded content, which it can…
Backwards comparability obviously might not work because it needs the title update to get possible fixes if not big part of the gpu shaders that were recompiled for switch 2 ( which is needed because the switch 1 and switch 2 gpu’s are not compatible ). Iirc from my sources within the switch homebrew community it tries to trans compile them but might not always work, hence title updates.
And if you got the console banned, you did some serious bad shit haha
Those games had a publisher telling him no to features and needing to finish existing stuff and not have scope creep to begin with. I said unchained peter for a reason :p
Pretty sure its the unchained peter molyneux that was the birth and death of star citizen’s development :p
What is defined as copy here? Cartridge data (game data, not firmware etc) is encrypted and can only be accessed by a protocol that is like spi, but is proprietary, by a specific chip running nintendo code. Or is a copy a full backup of everything on the chip?
Is the copy a raw copy? Has the data been modified/decrypted/or any algorithm processed it?
These things define wether a copy falls under this or not. Check what the fineprint or laws defines what ’ a copy’ is exactly in this case.
If it doesnt, what i mentioned are important to see if what you said apply here or not.
Like @[email protected] said, its only legal if nothing is done with the data. Any decryption using a nintendo key is infact, illegal, and falls under piracy.
This is why dolphin was removed from steam, because they do exactly that. Decrypt the data to use it.
If the process of dumping does any encryption or decryption, you also get in trouble in what they said.
These are the laws, and the lawyer you asked this too must not have been specialised in ip law, copyright and games, or doesnt know the technical details to decide on this.
The mig chip uses a proprietary protocol to send data of a partly, semi decrypted, game image. That will not go well in court, no matter if the rom was obtained legally.
Even if that is legal (it isnt), but it will be circumvention of encryption at worst and recreation of protected algorithms, code and keys in a non-nintendo product at best ( and thats before talking about game cartridge content ).
Last i checked that is still illegal hehe
True, it was always bad :p
He was so close to the truth, yet so damn far