Oh yeah! That one is sick!
unlawfulbooger
Well yes, assuming that:
- you trust the hardware manufacturer
- you can install your own keys (i.e. not locked by vendor)
- you secure your bios with a secure password
- you disable usb / network boot
With this you can make your laptop very tamper resistant. It will be basically impossible to tamper with the bootloader while the laptop is off. (e.g install keylogger to get disk-encryption password).
What they can do, is wipe the bios, which will remove your custom keys and will not boot your computer with secure boot enabled.
Something like a supply-side attack is still possible however. (e.g. tricking you into installing a malicious bootloader while the PC is booted)
Always use security in multiple layers, and to think about what you are securing yourself from.
And don’t just fork it on GitHub, if the original repo gets deleted, any forks might too.
Also do a git clone
locally, or set up a mirror on another host.
You could try [0-9] instead?
awk '/\/dev\/loop[0-9]/ {print}'
If you have a larger sample of input and desired output, people can help you better.
As long as it helps you, right?
Good luck!
Ah I now get what you’re trying to do, I think?
Having some kind of sonic(?) shorthand for specific spellings right?
It’s kind of like trying to solve the Gothi problem, maybe?
Needlessly complicated, but that’s a common theme in English anyway, so it should fit right in.
And I love this line 😂
If you’re mapping a specific mouth sound to a specific character, why not use the IPA? That’s exactly what it is designed to do.
That way you don’t have to reinvent the wheel.
For a better introduction to the IPA, check this video.
If you’re not already, just erase your darlings.
Then you can preview what files are lost on reboot (see blogpost).
“Capitalism creates innovation!”
The innovation: