I don’t think that’s the right issue. The behavior I see is a network error toast message that says check the notification for details (with no notification). This issue says the behavior is the “content unavailable” screen, which I don’t see.
I don’t think that’s the right issue. The behavior I see is a network error toast message that says check the notification for details (with no notification). This issue says the behavior is the “content unavailable” screen, which I don’t see.
Do you have a link to the main tracking issue with NewPipe? I tried to look through their GitHub repo, but most of the issues I saw were about the 59-second bug, or they had been closed as duplicate without linking to the duplicate issue.
I have a 1.5 hour commute, and watching downloaded videos on NewPipe is a major part of my strategy for getting through it.
I think it was pine, actually, but it was over 10 years ago so I can’t say for sure.
Not only did my math master’s thesis adviser use Linux, he read his email from a command line program and wrote his papers in plain TeX, considering LaTeX a new fangled tool he didn’t need.
The attack vector described in the article uses the VPN client machine’s host network, i.e. the local network the device is attached to. They don’t discuss the DHCP server of the VPN provider.
That strongly depends on the job. If the company has to follow regulations to meet some security posture, wiping the OS (and all the security tools and configuration set up by IT) to put your own favored OS without matching the security requirements could wind up with you getting fired.