Sounds like a system crash of some sort. I’ve had similar things happen with really bad crashes. Android recovers with a reboot in these cases.
Sounds like a system crash of some sort. I’ve had similar things happen with really bad crashes. Android recovers with a reboot in these cases.
I’m not sure about the office, but I’ve slept in my car on road trips and during evacuations. It’s super uncomfortable, so maybe that’s the demographic that they’re trying to reach?
It’s decent, with the deepseek model anyway. It’s not as fast and has a lower parameter count though. You might just need to try it and see if it fits your needs or not.
I’m talking about you. You’re the one with negative awareness. That has nothing to do with your gender.
I’m a bigot for saying you have negative awareness?
I think that was pretty obvious, no?
Ah, so yes, you do have negative awareness. Thanks for confirming.
That’s fair, but I think I’d rather self host an Ollama server and connect to it with an Android client in that case. Much better performance.
There are many men in progressive political spaces. What?
Holy shit, do you have negative awareness?
Why would I use this over Ollama?
Have you never seen a discrete GPU as an IT guy? A monitor? I kind of doubt you’re in IT if not.
In regard to Linux users being left out in the cold… how so? Do you think that distros are going to start enforcing attestation? I doubt that it will be a hard requirement for most, even in the next decade or two. It’s an option, yes, but mandatory?
FWIW, all of my banking apps work just fine with compatibility mode enabled on Graphene. Also, I’m not sure saying it’s inevitable is the right way to go, it certainly won’t make others care about their privacy and security.
Oh my god, not you again. Give the slop a rest. Your last (now-deleted) post said you had “no marketing”, but here you are again.
From the article:
The only way for router users to determine whether their devices are infected is by checking the SSH settings in the configuration panel. Infected routers will show that the device can be logged into by SSH over port 53282 using a digital certificate with a truncated key of
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ…
To remove the backdoor, infected users should remove the key and the port setting.
People can also determine if they’ve been targeted if system logs indicate that they have been accessed through the IP addresses 101.99.91[.]151, 101.99.94[.]173, 79.141.163[.]179, or 111.90.146[.]237.
It’s a structured low tech kit solution that uses Legos and hammers to hit them when the data tells it to with no guidance or tutorials which makes you money when you (a solo builder) are going broke.
What’s so hard to understand about that?
It’s clear that we don’t get guidance - you don’t even seem to know what your “platform” does.
“no marketing”, meanwhile you’ve created an account with your platform’s name? what would you call what you’re doing right now then? “Sharing” doesn’t count unless it’s open source and free, btw. So, it’s not that.
Try again, not using the word “kits”. Why would a “solo builder” need this (which you haven’t been able to coherently explain yet) when they could use real software to do so?
You can actually get up to (basically) 100% deet.