"Login with X" is OAuth, not 2FA.
2FA is a great addition on top of a password per site. Neither a FIDO device nor an Authenticator app provides the site with any extra PI.
Edit: SMS would give them your phone number, but SMS is a really bad 2FA and should not be used
Tuxedo gives you the option to order their laptops with either the Tuxedo logo, a custom logo, or no logo.
I ordered the InfinityBook Pro 14 Gen7 without any logo and it looks really clean.
We had SunRay at a municipality here in Sweden where I worked at the IT department. I tought it was really cool and I had built our own "session routing" script that could connect terminals to different servers based on the smartcard ID.
Terminals in the schools connected to a school server where students could login without smartcards, but if a teacher inserted their card it would connect them to the "admin" server or to a windows VM.
I had my own server in the DC that I could then connect to from my desk using a multi-monitor SunRay terminal. At home I had a SunRay connecting in to the office with VPN. I could move between terminals by just inserting my smartcard in whichever terminal I was at.
There was even a company creating a SunRay laptop called Gobi that I tried using , but a regular laptop with the software client was a much better experience.
I use Frigate (https://frigate.video/) on a rPI for recording and doing person detection for 3 Reolink cameras. Connecting that to HomeAssistant for dashboard and notifications.
It works great!
I boot the rPI (model 4 with 8gb RAM) from a USB-SSD to not worry about SD-cards. I connected a Coral USB device for the person detection since the rPI itself can only manage about 2 frames/s.
I had a 75GB "Deathstar" at the time and was really worried that it would fail. I was a teenager and couldn't really afford replacing it, nor have good backup solutions.
I accidentally pulled a power pin while removing the molex connector and had to solder on a modified power extension cable.
The drive kept on living for many years and IIRC it never failed while in active use.
You can address image layers by sha256 hash.
Do a docker pull of the image and the log will tell you the hash. Then you can do docker pull myimage@sha256:abc123def456......
I usually use these in my deployments since they can't be modified, it will require a new deploy.