

It won’t. They’ll take whatever they can get and act on it, no need for accuracy.
It won’t. They’ll take whatever they can get and act on it, no need for accuracy.
You would be better served by asking questions in the existing post, instead of starting multiple new ones. Besides, these questions were already answered.
Although it’s a bit dated, so I don’t think it supports luks in the GUI. You might have to use it as a visual reference and do it via the command line.
Governments are people, and people are stupid.
Sure, but this isn’t going to do that, and it’s going to harm–no, scratch that, continue harming–a bunch of people in the process.
I think you should seek someone with experience, a mentor. Otherwise it’s the blind leading the blind.
What do you plan to do instead?
Labeling everything violence lessens the impact of actual violence.
What is legal and what is ethical are not always the same.
What will the ass-shoving accomplish?
You have a link to this hard evidence for us to read then?
As an American, I do not claim him.
Fun fact, you probably download the file anyway because it’s smaller than one of the torrent blocks. That block contains info from a file you do want, so you download the whole block. Your torrent client just puts that file in a different place.
So ultimately it doesn’t make a difference, except to show you the file. If you don’t actually look at the files that often, I’d leave that file checked just to make it less complicated.
It is not going to matter. If the malware can escape the VM, it’s going to do that regardless of host network access.
Sure. Put whatever file into an iso and mount it.
If the identity and privacy of the person being searched can be protected, I think there should be video, to help prevent abuse by the person doing the searching.
“They’re taking our jobs!”
“Ok. Since you’re unemployed you have been assigned to pick strawberries”
“Wait, not like that”
Didn’t need to, our developers work on Linux because that’s what their tooling uses.
Granted it’s either Ubuntu LTS or RHEL because of compliance, but they make it work. Unfortunately Linux is a second-class citizen to central IT, so when they make changes, they don’t really consider Linux users, they’re on their own.
A lot of enterprise security software has a Linux version, because a lot of servers run Linux, and they need to have the software for compliance. There is no shortage in that space.
I don’t think you want two VPN services, I think you want one VPN service and plain network routing. Use the VPN server as the local gateway, and the VPN server routes that traffic up the tunnel.