depends on the voice language
refalo
ACPI bugs are common and can typically be ignored, but...
without a GUI
how do you know it's even trying to start one? what happens if you try it yourself manually?
too much https traffic could also look suspicious, which they could then block...
Why do you think it's "amazing" that people use it?
If it's any school like mine was, where people actively look at all the traffic going through their network, it's a losing battle. And I say this as both a huge privacy advocate and a long-time network engineer.
Anything even remotely resembling a tunnel, VPN or proxy is going to make you stand out in their monitoring, because they will see constant traffic between you and the same host on the other end... traffic that practically never stops. In my day the school even force-reset SSH and RDP sessions after a while (or maybe it was actually ALL tcp sessions, not sure).
It doesn't matter what protocol or technique you use at that point because they can either block whatever IP/ports you use, every time you change it, or threaten/shut off your service.
For at least 3 years, I’ve been wanting to get an apple silicon mac to daily drive Linux on
Can you tell us why?
I struggle to call that hacking in the sense most people probably mean. Phishing is definitely a thing but they're not 'breaking' anything to access a system, they're just tricking you into giving it to them.
imagine waiting for a torrent when usenet immediately saturates your link 24/7