Honestly - lack of large trackpads aside (it does have a tiny one on the right side) - the Legion Go S looks like a good deal. Price should be equal to the OLED Deck for the 512 GB variant, for that you get a device with a more modern CPU architecture and 50% more GPU cores. The display is quite a bit larger (8.1" vs 7.4", which is a larger difference than it might seem), it's higher resolution 120 Hz and - most importantly - it has VRR, which the Steam Deck OLED lacks. Sure, it's not OLED and some people are seemingly allergic to higher resolution displays ("think about the battery life!!!" or "not powerful enough to play games at this res" (upscaling exists)), but 2D games like Hollow Knight or Cuphead should look amazing on this display and font rendering should be a lot better.
Also, Lenovo might sell this in countries where the Steam Deck isn't officially available.
The user still has to login to their user account. The assumption is that the Windows login is secure so BitLocker can decrypt using TPM and an attacker still won't have access to the data without being able to log in.
This article obviously shows a method how an attacker can potentially still get access to the data without logging in.
A lot of BitLocker setups unlock using just TPM though, which was my point. No password/PIN needs to be entered at boot time to unlock it, it uses the TPM to unlock. This is the default setup that many companies use. Password/PIN unlock is completely optional.
It doesn't already have to be running. BitLocker retrieves its keys from TPM by default, so just booting a device will place the keys in memory.
To minimize downtime, abruptly restart the target system during the Windows boot process, specifically before the login screen appears, as this approach has proven effective in scenarios involving the retrieval of Full Volume Encryption Keys (FVEKs).
By kernel-level debugging with WinDbg, the researcher observed BitLocker operations during the Windows boot process, which revealed that while Microsoft attempts to erase encryption keys using functions like SymCryptSessionDestroy, some keys persist on the heap, potentially due to incomplete key destruction mechanisms.
Is this really a BitLocker issue or more an issue inherent in the hardware design?
EDIT: Okay, looks like Microsoft could do better:
By kernel-level debugging with WinDbg, the researcher observed BitLocker operations during the Windows boot process, which revealed that while Microsoft attempts to erase encryption keys using functions like SymCryptSessionDestroy, some keys persist on the heap, potentially due to incomplete key destruction mechanisms.
But maybe the hardware/UEFI should immediately wipe memory upon restarting anyway..?
We played "Project Eden" on a (small) LAN yesterday. It supports up to 4 player coop, you play a group of "agents" (?) and it's basically a third person puzzle-solving + shooting game.
What does the go.mod file look like? Go 1.23.4 is relatively new so maybe binaries for your platform aren't available yet? What does go version output?
I agree, unless it's straight up paid software which I usually don't mind paying for if it's good and I need it. Although arguably uBlock Origin is so close to perfection that I can't imagine how a paid ad blocker would hold up.
Input latency for one, because the next frame is delayed where the interpolated frame is inserted.
And image quality. The generated frame is, as I said, interpolated. Whether that's just using an algorithm or machine learning, it's not even close to being accurate (at this point in time).
Flatpaks also just come with a set of default permissions at install time, so running in a sandbox only really protects against flaws in the software, but not against malicious intentions by its creator. Flatpak doesn't have an "ask for permission" system afaik, at least not standardized. What you do is you add or subtract from the default the app itself specifies.
Pretty much every Secure Boot device trusts Microsoft by default, which is why I think it's pretty much useless (in its default state anyway).