If you have any expectation of privacy, you shouldn’t use chromium based browsers. Their purpose is not privacy, and google actively makes sure it will never be.
Yes, I did. If it doesn’t work for you, you may try updating it with yt-dlp -U.
If that doesn’t help let me know, maybe one of my settings does the trick
Hmm, not sure about that, it seems to me it just stores the audio in one series of small fragments, which are just split up somehow by time.
Did you think about recording the audio with something?
Like OBS or Audacity (versions before 3). I think that may be a semi-good solution. Or, for somewhat better quality you could download the whole track (yt-dlp can handle it), and then cut it for the pieces you want to keep, in Audacity (before version 3) or something else
Do you obtain this file from the file system, or do you need to extract it from some kind of a container file, and then implant back the modified version?
SnowRunner’s asset files cannot be edited unless you unpack and repack them with winrar. Anything else (as far as I tried, windows tools at the time) and it won’t work.
I have also experienced that dangling devices break remounting it, but I think there’s a quicker solution for it: dmsetup remove insert_device_name_here.
It’s still a manual thing, though, but 2 steps better. Maybe it can be automated somehow, I haven’t looked into that yet.
Sorry for the delay. In this case they were lying that they have improved their process regarding handling such orders, implying that they will now only comply for fewer orders that they can’t (yet) deny.
It’s not bad design, it’s definitely intentional, however I agree that it’s probably not for having backdoors, but for convenience. Average people forget their passwords all the time, and with encryption that level of carelessness is fatal to your data if they have not saved it somewhere, which they probably didn’t do.
Very few devices are rooted and usually you cannot get root without fully wiping your device in process.
I’m pretty sure the system is not flawless. Probably it’s harder to find an exploit in the OS than it was years ago, but I would be surprised if it would be really rare. Also, I think a considerable amount of people use the cheapest phones of no name brands (even if not in your country), or even just tablets that haven’t received updates for years and are slow but “good for use at home”. I have one at home that I rarely use. Bootloader cannot be unlocked, but there’s a couple of exploits available for one off commands and such.
It’s not about someone, it’s about something. A lot of us aren’t (only) using Linux as a server OS, but for desktop too, and desktop usage involves running much more different kinds of software that you simply just can’t afford to audit, and at times there are programs that you can’t choose to not use, because it’s not on you but on someone on whom you depend.
Then it’s not even only that. It’s not only random shit or a game you got that can edit your bashrc and such, but if let’s say there’s a critical vulnerability in a complex software you use, like a web browser, an attacker could make use of that to take over your account with the use of a bashrc alias.
Where did they say that they were comfortable doing that? I don’t see a word or an acronym of it.
Sometimes you must do things that you are not comfortable doing, but you just can’t avoid it. Doing that for the ISP (who need to set up the cable into your home and the gateway) is not the same as doing that for e.g. netflix or facebook.