I hope you’re right and this isn’t about them getting ready to DRM brush handles to brush heads. Sonicare brush heads are ridiculously overpriced compared to the knock offs
I hope you’re right and this isn’t about them getting ready to DRM brush handles to brush heads. Sonicare brush heads are ridiculously overpriced compared to the knock offs
This is a feature of SATA devices too. Use UUIDs in your fstab unless you enjoy playing musical chairs with your mount points
A bit late to your comment but they simply don’t want you to talk to a human. It’s that easy. Talking to a human results in empathy, which results in giving away of deals the management doesn’t really want you to give out.
They’d rather you get frustrated at being able to not reach a human and then you just give up and be a good sheep and pay what you’re expected to.
Oh, unless you want to cancel, in which case it will take no less than 10 different humans bouncing you off various departments and scripts because making it easy to cancel also results in bad metrics
The malicious code is only thought to have affected deb/rpm packaging (i.e the backdoor only included itself with those packaging methods). Additionally, arch doesn’t link ssh against liblzma which means this specific vulnerability wasn’t applicable to arch. Arch may have still been vulnerable in other ways, but this specific vulnerability targeted deb/rpm distros