Ah right, thank you, I missed that somehow
Ah right, thank you, I missed that somehow
I wonder how much this will affect the power usage during boot on my laptop with its integrated AMDGPU. Granted, boot time is fairly short so hopefully this won’t really matter.
However it should be noted that the remote development connection is via their servers, which makes it somewhat less useful
Ah ok, the name implies it’s a security guard
I love that you’re thinking about how to secure sensitive parts of JS applications, however I wonder what threat this is guarding against. Can you give an example? Surely if an attacker can modify the source to call the sensitive functions, then they could modify the allow list
Oh wow, this is amazing info. Thanks!
Nice article! I’m a fan of the “don’t optimise early” mantra, which seems particularly relevant here regarding clone
Yeah, I’d say Kitty and Alacritty work pretty well on Linux. Makes this comparison table seem like bs