Your links are all broken (because of "..." elision)
monnier
Can someone point me at technical info about the risks of having an unlocked bootloader? From where I stand, the risks seem completely irrelevant (to take advantage of an unlocked bootloader, the attacker would need to have full access to your OS already). AFAIK, locking of bootloaders was never designed to protect the user, but only to let cell-phone providers restrict what phone users can do.
#OffByOne
I don't know of any mirrors that are "official", but I do know some people maintain mirrors via rsync
(rsync
service on elpa.gnu.org
was added specifically in response to such requests, IIRC to maintain a mirror on the other side of China's firewall).
As for validation, (Non)GNU ELPA signs all the packages and the archive-contents
file (with a key distributed alongside Emacs), so it should "just work".
The question is: are they going to do something about it?
Time to reindent lines is something that tends to increase, as indentation quality is improved over the years (and as the need increases to support ever more syntactic features of the indented language).
But it really depends more on the text being indented and the mode in use than on the version of Emacs, IME.
You make it sound like optical mouses were a no-brainer, but they were very much non trivial: it required both ingenuity and fairly sophisticated tech to make them work well.
[ The problem I have which which-key is that it applies only after a prefix. ]
Mutating a keymap with setc[ad]r
is evil!
Since you bind that map to a prefix, why not use (menu-item "dummy" KEYMAP :filter FUNCTION)
instead?
[ The problem with this trick is that it can be used only after a prefix. 🙃 ]
What do people mean by "Raspberry pi level CPU"? That of the Pi 1, 2, 3, 4, or 5?
I don't they'll ever "be there" unless people like you start using them!
Is Searx(ng) really an alternative? Last I checked it's more like a front end to other search engines.
Sorry, but that page does not seem to say what you wrote. E.g. I can't see how a remote attacker (such as a malign webpage, email, application, ...) could take advantage of an unlocked bootloader without being able to see (and modify) all the data on your phone. IOW I think what you write applies only to an attacker who has physically taken your phone (temporarily).