I have heard about a TamperMonkey userscript called EMELogger that logs some information about EME, in the web tools console making it easier to get the PSSH. I haven’t tried it though.
Also, I don’t think you will find guides on paid content as this is considered highly illegal (I think).
I just bought Portal and Portal 2 and finished them both. Very good games, with great puzzles and story.
I am planning to buy more from Valve in the future.
P.S: This was a triumph
Oh thanks, I didn’t know about this!
I didn’t understand. Can someone explain?
I managed to fix this problem by pointing my domain name to my private IP address (with pihole’s local DNS entries), so I could access it. Then, I just got certs for the domain and applied them with nginx.
I know, but for some reason my router does not let me access my domain (with duckdns) when connected to my network. So even if I get certs for the domain, I will not be able to access it. I have set up local DNS entries (with Pi-Hole) to point to my srrver, but I don’t know if it possible to get certs for that, since it is not a real domain.
EDIT: Fixed it. (See reply for fix)
I installed Void Linux on my Raspberry Pi without looking at the details, and I was surprised that it had no systemd! It was the first non-systemd distro that I had encountered and also pretty fast.
Sad it does not support Invidious. Else I would be using it.
Why doesn’t this post mention the price? It is an extremely important factor.
make 8 million computers crash
other companies say you’re trash
blame others
cry
Yes, basically on internal LAN I put admin admin to everything.
I wish I could like a comment twice on Lemmy.
Why though? This just means that Windows 11 will run on more devices? Why is so important for your device to have a TPM and Secure Boot enabled, and a supported processor? If I were Microsoft, I would put the requirements even lower or even removed them.
I signed up at feddit.nl and I am not even from Netherlands.
I don’t dual boot, I just have some other Windows machines that I use rarely for Windows-only software that require an external connection, like Odin for Samsung devices.
ext4 on everything except external drives where I put NTFS.
I just use ext4 on everything. It works pretty nicely.
I think you can encrypt drives by using a key stored in the TPM, if you have one. See the Arch wiki for info.
Though I have heard the TPM is not as secure..
Oh, I missed the L1 in the title. Basically, all the decryption at L1 is happening inside a Trusted Execution Environment. This is a dedicated chip that does all encryption-decryption (among other things). This is why it is so difficult to extract the keys, because they don’t enter the CPU or are stored in RAM, because the dedicated chip handles all of these.
So I don’t think you can find a guide about this, because if anyone has found even one exploit, they would be keeping it to ourselves, so that it doesn’t get patched.
Although it is very difficult, I think the only real solution is to reverse engineer a TEE and find an exploit yourself.
If you manage to do this, please let me know! I am happy to get updates about progress in this topic.