byte1000
IMHO that’s a highly requested feature.
The update seems to be bugged. I tried to upgrade version 0.0.57 to 0.0.58, and it seems like nothing have changed. I’m still on 0.0.57 after a “successful” install.
Relatively high number of RCE vulnerabilities.
You mean Pixel 5.
The instance has too many people registered. It has ~27% of all Mastodon’s monthly active users.
A huge part of the network was down. People should be encouraged to migrate to smaller instances, so we can have better decentralization.
If an app on one device connects to an app on another via Veilid, it shouldn’t be possible for either client to know the other’s IP address or location from that connectivity, which is good for privacy, for instance. The app makers can’t get that info, either.
Is that considered a new thing? I don’t think I’ve ever encountered a P2P service/protocol that also masks IP addresses.
All internet connections into and out of your Linux device will now be blocked unless a VPN connection to a Proton VPN server is active.
If I understand correctly, before version 4.2.0 (that includes the Advanced setting), the kill switch wasn’t active until you opened the ProtonVPN program. So if you restarted you PC, it was connecting to the internet without going through the VPN tunnel, so your traffic was somewhat exposed.
Now, with the new permanent kill switch, there’s no internet access without running ProtonVPN.