tell me the most ass over backward shit you do to keep your system chugging?
here’s mine:
sway struggles with my dual monitors, when my screen powers off and back on it causes sway to crash.
system service ‘switch-to-tty1.service’
[Unit]
Description=Switch to tty1 on resume
After=suspend.target
[Service]
Type=simple
ExecStart=/usr/local/bin/switch-to-tty1.sh
[Install]
WantedBy=suspend.target
‘switch-to-tty1.service’ executes ‘/usr/local/bin/switch-to-tty1.sh’ and send user to tty1
#!/bin/bash
# Switch to tty1
chvt 1
.bashrc login from tty1 then kicks user to tty2 and logs out tty1.
if [[ "$(tty)" == "/dev/tty1" ]]; then
chvt 2
logout
fi
also tty2 is blocked from keyboard inputs (Alt+Ctrl+F2) so its a somewhat secure lock-screen which on sway lock-screen aren’t great.
The Pixel watch has this problem too. However, it randomizes the MAC per network, so that strategy won’t even work. I’ve tried to get it from the debug log but failed I’ve resigned that it won’t be getting connected to the school network
Open a bug report with the school network admkn. This is default anfrois behavior and a privacy issue to boot
Android is fine because you’re able to use a web browser to get an auth key. You have to register devices where you can’t do that, and it seems to be impossible in the case of the pixel watch
Edit: Also, they’re not concerned about privacy. They want to know who every device belongs to
That never works for me on Android systems. It probably needs some shitty Google service.
You have a right to privacy. Its your school. They work for you.
The iPhone does that too, but has a way to disable it on a per-network basis.
What is it with these schools and not just using WPA Enterprise? They already hand out an email to every student so it makes it dead simple to deactivate the account’s PSK upon terming the student