This is what Iβve been looking atβ¦
#[3]
This is what Iβve been looking atβ¦
#[3]
Yes! One thing, excuse my ignorance, but how would I know there wasn't any mal/other bad -ware in there if I couldn't check the code myself?
I am aware that I use stuff all the time that I can't check, but if I was to buy this for the purpose of Knowing it was safer, how could I know? Thanks for entertaining my kindergarten status on these things π€
You plug the USB in, turn the machine on and it will prompt for a URL.
You can enter any URL that hosts a bootable image and the USB will provision the machine with that image.
β¦ you can boot 3rd party images. π
β¦ you can boot any images I provide. π€
β¦ you can boot your own back ups! π€©
You can do this from a USB that has just 4mb on it, so no need to physically carry your data / image with you as you travel.
None of your data touches the host machine drives, everything is contained on the USB flash which could be as fast as 40GB/s with USB4, and the USB is wiped clean on shut down.
You leave no trace. You hijack the host IP.
You tunnel to secure connections.
There are lots of thing that can be done with this.