Sweet! This taught me some about those modes. Do they perhaps also reside on their very own eeproms or similar chips so that they are not easily erasable?
emotional_soup_88
Is it? I just assumed it was Samsung, since the download mode was displaying an error saying something like "failed to verify Samsung recovery checksum" as if it was expecting a Samsung image.
Personally, I don't hate this book:
https://tldp.org/LDP/intro-linux/intro-linux.pdf
It's somewhat outdated, for instance, it still assumes that your first process is init while most of us have transitioned to systemd, but I still find to book very educational in terms of... "Linux mentality"? Give it a try! :)
UPDATE! Got an email from my ISP saying "the fiber owner has resolved your issue, we are closing the ticket." I immediately called my ISP out of curiosity, since they earlier had told me that they need to change my ONT for me to get my full speed. Well, it turns out, the fiber owner (don't know the English word for them) can manage speed per port on the ONT. Sic. So for some reason, they had limited the speed to 100 Mbps.
Yep, that is my conclusion as it stands. For switching between devices, you need MAC addressss. For routing you need IP addresses (and MAC addresses?). For inter process communication, you need port numbers. Although, I do have to read up on where and how the VPN draws the line between what to encrypt and what not to encrypt in a packet.
No judgment at all. I mean, I work for a government agency and - while resisting unlawful or immoral directives maybe somewhat harder for me (?) - I do try to stay humane and at times blatantly go against policies or orders that violate certain human rights.
Then, if I understand it correctly, the data portion of the packet is encrypted but there are unencrypted headers or whatevers necessary for inter device communication? MAC to MAC, IP to IP, port to port, etc., that stay unencrypted even when they go through the VPN interface? Which in turn is how the VPN interface or software or protocol is programmed?
I see. Well, now I understand why I see vendor names of connected hosts in my AP's GUI. The vendor name of my robot vacuum, I will never be able to pronounce... (Something Chinese.)
While I do - genuinely - appreciate the effort and the post, I disagree with its general implications. I may be too much of a sad libertarian, but I believe that education is the way to go, directed at both kids at risk and at the general population who are all potential perpetrators. Control is not the way to go. Thanks again for taking your time!
https://www.youtube.com/watch?v=3MwJbRq3-rM
Also, there is nothing noobie about Linux Mint. Everything that you can do on, say, Arch Linux, you can do on Linux Mint, with some minor adjustments. That's what's Linux is all about. :D
Amazing! I had no idea that you can grab the vendor off of the first three octets. I shall try to refrain from - for academic purposes, of course - identifying devices and their vendors around me next time I'm at the coffee shop...
Thank you for such a detailed answer! I learned a lot! :D this inspired me to do some research on the capabilities of the new ONT that they are providing soon. Assuming that those probing capabilities that you spoke of are built into the ONT and not some peripheral add-on equipment?
Good to know that I can mess up other devices than Samsung's too xD