The Tunnel daemon creates an encrypted tunnel between your origin web server and Cloudflare’s nearest data center, all without opening any public inbound ports.
The Tunnel daemon creates an encrypted tunnel between your origin web server and Cloudflare’s nearest data center, all without opening any public inbound ports.
The good news is that in order to exploit the new vulnerability, the attacker first has to obtain kernel level access to the system somehow - by exploiting some other vulnerabilities perhaps.
The bad news is once Sinkclose attack is performed, it can be hard to detect and mitigate: it can even survive an OS reinstall.
That makes some sense I suppose. What was it about DragonFlyBSD and macOS kernel?
Faster in what sense? Would you kindly point me to the benchmarks used? It’s easy to find the opposite results so I’m curious.
You’re right - I misunderstood the question and thought you meant the distribution images
At least Kali and Arch do
Cloudflare tunnel is an option, you can even scrap your own nginx
Sounds like you have a pretty okay experience but some specific things don’t work - please take some time to report bugs if you haven’t yet!
QR code issue is most likely due to LibreWolf silently denying Canvas access, you can enable it per-site: https://librewolf.net/docs/faq/#should-i-allow-canvas-access-how-do-i-do-it
Not sure about video conferencing.