<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body>
<font size="2">reportbug-linux-image-6.1.0-20-amd64-20240416120723-rsdr2h84</font>
<div class="moz-forward-container">
<p><font size="2"><br>
</font></p>
<p><font size="2">Hi Daniel, Alexander, Bug Team<br>
<br>
I am very humble to reporting this same (from YOU) BUG that
has killed a new ROG16" within hours of a 1st Debian Install
(some glitches I believe already from the install Menue),</font></p>
<p><font size="2">here this also has appearently destroyed my
internal HARDWARE / BIOS graphics (Glitches now occur at boot)
on a slow lenovo.<br>
<br>
External Display is ok for now. The Laptop giving up
proportionately to its own capabilities: the ROG dies way
faster that this 4cpu 12GBram lenovo, <br>
is this issue falling within the scope of :</font></p>
<p><font size="2">BUGs that redundantly prevents the owner to read
what they type on a terminal in root mode, and end up leaving
them in the unknown with no display when a hacker could be
taking the hand remotely. <br>
</font></p>
<p><font size="2"><br>
</font></p>
<p><font size="2">I see no progress coming up on 6.2, some have
quoted progress on 6.5 (articles mentioned and links) and
fedora 38 yet they are contradicted by other in this being a
solution. <br>
</font></p>
<p><font size="2">reportbug -r
/tmp/reportbug-linux-image-6.1.0-20-amd64-20240416120723-rsdr2h84</font></p>
<p><font size="2"><br>
</font></p>
<p><font size="2">I take this opportunity to express my gratitude
for being there and reporting first what gives me hope Debian
and AMD will eventually understand the danger this poses to
the announced wave of ryzen7, 9, into the market. <br>
</font></p>
<p><font size="2">Have a lovely Day!<br>
</font></p>
<p><font size="2">file attached.<br>
</font></p>
<p><font size="2">(PS: would you update / implement PGPs?)<br>
</font></p>
<p><font size="2"><br>
</font></p>
<pre class="moz-signature" cols="72">--
Our public key is changed monthly to be found updated on : vks://keys.openpgp.org
Notre clef est publique changee mensuellement et mise a jour pour vous etre disponible depuis : vks://keys.openpgp.org</pre>
</div>
</body>
</html>