I very briefly worked for one of their competitors a few years back. These devices are pretty much limited to whatever you can do with root on android or jailbreaking iOS. If a person has a modern phone and a good sense of op-sec, chances are they can't get much. These things basically work by doing backups then analyzing those backups offline, searching in known locations for non-encrypted databases and images. On android they can also do things through adb, like automated screenshots.
If you hand the cops a powered off non-rooted,locked bootloader, non-jailbroken phone and use e.g. signal, there's not much they'll be able to see. Of course, there seem to be other firms that operate at a higher level, and have some encryption breaking capabilities, but that's not going to be accessible to your average cop.
I haven't tried this Switch port, but the new engine that launched with this update really improved the frame rate, especially at the end of a run. I went from barely double digit fps to a mostly steady 60 on my Steam Deck.
I agree 1,000%. I have been remote for the last five-ish years; I can count the amount of times I've actually needed to go into an office on one hand. At home I have: a giant ultrawide monitor; a quiet, private, office; gigabit internet; dog. How would I be more productive commuting to an office to listen to sales people banging gongs and ringing bells all day while I work in a cubicle on a single 19" monitor? All my teammates are in other cities and states, my code is checked into GitHub and mostly deployed to IaaS - and even our "on-prem" infrastructure is in another state.
Yeah, I'd rather have a healthy backlog of triaged bugs than the alternative. Which is just having no clue what bugs are in your code because absolutely no software ships bug free.
There was a rumor that Nintendo was developing a Switch Pro that was intended to release in 2020, but due to the chip shortage they had to scrap the chipset upgrade and that became the Switch OLED. I love my Steam Deck but I'm pretty sure this has been in the works for a while.
I very briefly worked for one of their competitors a few years back. These devices are pretty much limited to whatever you can do with root on android or jailbreaking iOS. If a person has a modern phone and a good sense of op-sec, chances are they can't get much. These things basically work by doing backups then analyzing those backups offline, searching in known locations for non-encrypted databases and images. On android they can also do things through adb, like automated screenshots.
If you hand the cops a powered off non-rooted,locked bootloader, non-jailbroken phone and use e.g. signal, there's not much they'll be able to see. Of course, there seem to be other firms that operate at a higher level, and have some encryption breaking capabilities, but that's not going to be accessible to your average cop.