AGH · Open Operating Systems · Class 1

Open vs Closed Software

Łukasz Gołek · WIMiC AGH · 2025/26
01 / 33 Title

Open Operating Systems

Łukasz Gołek · WIMiC AGH

Presenter Notes
Hello everyone! I warmly welcome you to what I hope will be an exciting journey of getting acquainted with Linux systems.
02 / 33 Open Source Software

What is open source software?

Human-readable (source code):

#include <iostream>

int main() {{
    std::cout << "Hello, World!" << std::endl;
    return 0;
}}

Computer-readable (compiled binary):

00000000  7f 45 4c 46 02 01 01 00  |.ELF....|
00000010  02 00 3e 00 01 00 00 00  |..>.....|
00000020  00 00 00 00 00 00 00 00  |........|
...
With open source, thousands of programmers around the world can inspect the source code, search for bugs and malicious parts. Software becomes secure as a result. Compilation is a one-way process — binary code cannot be reverse-engineered back into readable source code.
Presenter Notes
In short, people write programs in programming languages like C, C++, or others. This code is understandable to humans and is called source code, but computers operate on ones and zeros, so the program must be compiled by a compiler, and this process cannot be reversed. It is not possible to write source code from compiled binary code. With this approach, thousands of programmers around the world can look into the source code, search for bugs or malicious parts of the code. The software becomes secure as a result.
03 / 33 Closed Software

What is closed software?

With closed software, you only ever receive the compiled binary — the source code is never shared:

00000000  7f 45 4c 46 02 01 01 00  |.ELF....|
00000010  02 00 3e 00 01 00 00 00  |..>.....|
00000020  00 00 00 00 00 00 00 00  |........|
...
You have no idea what the software is actually doing. Corporations like Microsoft, Google, Apple, and many others use this fact against you — mainly to collect your data and waste your time.
Presenter Notes
In the closed version of the software, we cannot see the source code, so we have no idea what the software is actually doing. Corporations like Microsoft, Google, Apple, and many others use this fact against you, mainly to steal your data and your time.
04 / 33 Consequences of Closed Software (1–4)

Consequences of Closed Software

1. Lack of Control Over the Software

The user does not have access to the source code, meaning they cannot verify how the software works or what operations it performs. Bugs cannot be fixed independently, nor can the software be customized to meet specific needs.

2. Dependence on the Vendor

The vendor decides on the development direction, updates, and end of support. If the company discontinues support, the user may be forced to purchase new software.

3. Risk of Undesired Features and Tracking

Closed-source software often collects user data without full transparency. It may include DRM (Digital Rights Management) mechanisms that restrict the use of purchased products.

4. Higher Costs

The user must pay for licenses, subscriptions, and updates. Vendor lock-in can occur, making switching to another provider expensive and difficult.

Presenter Notes
Closed software limits users' freedom because they can't see or modify the source code, leaving them dependent on the vendor for updates, fixes, and new features. This dependence is always costly — not only financially but also in terms of control, as companies can introduce unwanted changes, discontinue support, or enforce restrictive policies. Additionally, privacy concerns arise since users often have no insight into what data the software collects or how it's being used.
05 / 33 Consequences of Closed Software (5–8)

5. Lack of Independent Security Audits

The user cannot verify the software's security independently or through third-party experts. If a vulnerability is discovered and not patched by the vendor, users remain exposed to potential attacks.

6. Limited Repair and Customization Options

In case of issues, the user relies entirely on the vendor's technical support. New features cannot be added, nor can existing ones be modified, even if necessary.

7. Risk of Losing Access to Personal Data

Proprietary file formats may prevent easy migration to other systems. Vendors can enforce policies that block access to data (e.g., Adobe blocking user accounts in certain countries).

8. Compatibility Issues

Vendors may deliberately restrict interoperability with competing software. Updates can break compatibility with older versions, forcing users to upgrade or switch systems.

Presenter Notes
Closed-source software not only limits control but also poses security risks, as users can't independently verify its safety and must trust the vendor to fix mistakes. Lock-in with closed formats and compatibility restrictions can make it difficult — or even impossible — to switch to alternative solutions without losing access to important data. Ultimately, relying on a single vendor for support, updates, and security means users sacrifice flexibility, customization, and long-term control over their own digital environment.
06 / 33 Real-World Examples (Control & Dependence)

Consequences in Practice

Issue Microsoft Google Apple Other
Lack of Control Windows 11 forces automatic updates, sometimes breaking compatibility with older hardware and software. Google restricts Android users from easily installing apps outside the Play Store, making sideloading harder with security warnings. iOS does not allow users to install apps from outside the App Store unless they jailbreak their devices. Meta (Facebook) frequently changes its algorithms, affecting content visibility without user control.
Vendor Dependence Microsoft discontinued Windows 7 and older Office versions, forcing users to upgrade or lose security updates. Google stops updating Pixel phones after a few years, even if the hardware still works fine. Apple stops supporting older macOS versions, making older Macs obsolete even if they still function well. Adobe moved to a subscription-only model, preventing users from purchasing perpetual licenses.
Presenter Notes
Closed software limits user control, forcing automatic updates, restricting app installations, and frequently changing algorithms without transparency. Dependence on vendors means that when companies discontinue support or enforce new policies, users are left with outdated, insecure, or unusable software. These practices lead to higher costs, forced upgrades, and potential loss of access to personal data, making users reliant on corporate decisions rather than their own needs.
07 / 33 Real-World Examples (Tracking & Costs)
Issue Microsoft Google Apple Other
Tracking & Undesired Features Windows 10 and 11 collect extensive telemetry data, even if users try to disable tracking. Google tracks users' location even when location services are turned off. Apple collects analytics data from iPhones, even if users opt out of tracking (as revealed in lawsuits). Meta (Facebook) tracks users across the web using invisible trackers, even when logged out.
Higher Costs Microsoft 365 requires a subscription, replacing the one-time purchase model of Office. Google takes a 30% cut from Play Store transactions and enforces its in-app payment system. Apple forces all iOS developers to use its in-app payment system, taking a 15–30% commission. Adobe Creative Cloud forces users to pay monthly, making them lose access to their work if they stop paying.
Presenter Notes
Many tech companies collect vast amounts of user data, often without full transparency or a way to completely disable tracking. The subscription model and app store commissions force users and developers into continuous payments, increasing the cost of using software. The lack of control over personal data and the need to pay for access to essential tools, even after years of use, highlight how dependent users are on corporate decisions.
08 / 33 Real-World Examples (Security & Repair)
Issue Microsoft Google Apple Other
No Independent Security Audits Windows is closed-source, so security experts cannot fully audit it for vulnerabilities. Android's core is open-source, but Google Play Services is closed-source, preventing full security audits. iOS is entirely closed-source, making it difficult for independent experts to verify its security. WhatsApp's encryption is controlled by Meta, meaning users must trust that it isn't compromised.
Limited Repair & Customization Microsoft locks down Surface devices, making them difficult to repair. Google makes unlocking bootloaders difficult on some Android devices, voiding warranties if modified. Apple enforces strict "Right to Repair" restrictions, disabling features if unofficial parts are used. John Deere prevents farmers from repairing their own tractors by locking software behind DRM.
Presenter Notes
Many major tech companies restrict independent security audits by keeping their software closed-source, limiting transparency and trust. Users and professionals face increasing difficulties in repairing and modifying their devices due to strict company policies and digital restrictions. The lack of repairability and security transparency highlights how corporations maintain control over their products long after purchase.
09 / 33 Real-World Examples (Data & Compatibility)
Issue Microsoft Google Apple Other
Risk of Losing Personal Data Microsoft OneDrive users have been locked out of their files due to policy violations or account issues. Google can suspend accounts without warning, cutting users off from Gmail, Drive, and Photos. Apple has locked users out of their iCloud accounts for violating terms, sometimes without clear reasons. Adobe has banned users from accessing their purchased software in sanctioned countries.
Compatibility Issues Microsoft makes older versions of Office incompatible with newer Windows versions to push upgrades. Google's proprietary services (like YouTube and Gmail) work poorly on non-Chrome browsers. Apple prevents iMessage from working on Android, deliberately creating incompatibility. Tesla cars use proprietary software, making third-party repairs and upgrades difficult.
10 / 33 Google's Remote Control Over Android

How Can Google Execute Code on Your Phone?

Google Play Protect & Play Services

Google Play Services — a closed-source component of Android — has extensive permissions on your device. It can silently install, remove, or update apps in the background, even without your consent. Play Protect can remotely uninstall apps from your phone if it deems them harmful, sometimes without notifying the user.

Silent App Installation / Remote Control

Google can force updates on apps, even if you have disabled them.
2020: Google quietly pushed the "COVID-19 Exposure Notification" app to millions of devices without user consent.
2019: A hidden security update was pushed to Google Play Services, which users couldn't opt out of.

Remote App Removal

Google can remotely remove apps from your device if they are flagged as malicious or violating their terms. This has happened with VPNs or emulators not approved by Google.

Android Enterprise / Device Owner Mode

In managed mode (typically used for work phones), Google can execute commands on the device, such as pushing apps, changing settings, or locking the user out.

Presenter Notes
Here you see some real examples: Google Play Services and Play Protect have extensive control over Android devices, allowing silent app installations, removals, and updates without user consent. Google also previously pushed updates remotely, such as the COVID-19 Exposure Notification system in 2020, without explicit user approval. In managed environments, Google can enforce remote commands, install apps, and even lock users out of their own devices.
11 / 33 Firmware Backdoors

Firmware Backdoors & Hidden APIs

Manufacturer Backdoors

Some Android devices — particularly from Chinese manufacturers — may have hidden mechanisms that allow the manufacturer or carrier to remotely modify the system.

Can Google execute code like the NSA?
Google does not have root access to your device, but Play Services and hidden APIs allow it to exercise significant control over your phone. If you have a device with pre-installed Google apps (which most standard Android phones do), Google can technically execute code, push updates, and remove or install apps — often without your explicit consent.
Presenter Notes
Some Android manufacturers, especially Chinese brands, may include hidden firmware backdoors that allow remote system modifications. While Google doesn't have root access, Play Services and hidden APIs give it significant control over Android devices. With pre-installed Google apps, the company can silently execute code, push updates, and install or remove apps without user consent.
12 / 33 Microsoft & Apple Remote Control

How About Microsoft and Apple?

Microsoft

Windows Update

Microsoft can push security updates or system updates that modify system behavior, install new features, or remove vulnerable programs. Windows 10 and 11 also send telemetry data to Microsoft, often without clear user consent.

Remote Control via Intune

For enterprise devices, Microsoft can manage and push updates or install apps remotely using Intune, which could include running or modifying code.

UWP Platform Lock

Microsoft enforces a platform where apps must pass through its store, limiting the ability of users to run arbitrary code.

Apple

App Store Control

Apple enforces strict control over the iOS ecosystem by requiring all apps to be downloaded via the App Store.

Remote OS Updates

While iOS is closed-source, Apple can update the OS remotely through the App Store or system updates.

Apple Device Management (ADM)

Apple can push updates, remove apps, or manage settings on devices. Technically, Apple has the ability to execute code remotely on an iPhone.

Presenter Notes
Unfortunately, Google is not the worst ;) Both Microsoft and Apple exert significant control over their operating systems and devices. Microsoft, through Windows Update, automatically pushes updates that can modify system behavior. Windows 10 and 11 collect a huge amount of telemetry data, which raises privacy concerns because this data is sent to Microsoft without clear user consent. Apple enforces strict control over its ecosystem by requiring all apps to be downloaded from the App Store. iOS is a closed-source system, but Apple regularly updates it remotely. In enterprise settings, tools like Apple Device Management (ADM) are used to push updates, remove applications, and manage device settings.
13 / 33 What Can You Do?

Why Does This Matter & What Can You Do?

While these actions are usually intended for security, updates, and remote management, they raise serious questions about the level of control these companies have over users' devices.

If you want to avoid this level of control:

  • Use custom ROMs without Google Play Services (e.g., GrapheneOS, LineageOS)
  • Block internet access for Google Play Services and limit permissions
  • Use alternative app stores like F-Droid for more control
  • For Apple, consider jailbreaking your device — although this introduces other risks
Presenter Notes
This matters because, while actions like updates and remote management are typically implemented for security and functionality, they also raise concerns about the amount of control companies like Microsoft, Apple, and Google have over user devices. For users who prioritize privacy and autonomy, it's important to understand the trade-offs between convenience and control.
Encryption & Privacy
14 / 33 Encryption Reality

Real-life consequences of encryption keys in corporate hands

WARNING: Microsoft keeps backup of your encryption key on its servers
Disk encryption by corporations has no real purpose — because they hold the decryption keys, they can access your data at any time.
Presenter Notes
Encryption of devices by corporations doesn't ensure full privacy because they hold the decryption keys, which means they can access user data. Even if the device is encrypted, the user doesn't have complete control over their data, and in case of access issues, they often have to pay to recover it. In such cases, the encryption becomes a tool of control, leaving the user dependent on the corporation instead of enhancing security.
15 / 33 Corporate Encryption Keys

Consequences of Apple, Google & Microsoft Holding Disk Encryption Keys

Loss of User Privacy

If a company possesses the disk encryption key, it theoretically has the ability to decrypt a user's data — without the user's consent.

Apple

While Apple claims to follow "zero-knowledge" principles, it may provide access to data at law enforcement request. Apple also has access to encrypted backup data in iCloud.

Google

Google stores encryption keys for data in Google Drive and other cloud services. Google can decrypt and provide access if required by an investigation or in accordance with its privacy policy.

Microsoft

Windows 10/11 and OneDrive use data encryption, but Microsoft — as the owner of these services — has access to encryption keys and can access user data if required by law or for other reasons.

Presenter Notes
The possession of encryption keys by Apple, Google, and Microsoft introduces serious concerns regarding user privacy. These companies can decrypt user data stored on their devices or in their cloud services, which compromises the user's control over their privacy. Despite claims of following "zero-knowledge" principles, all three corporations retain the ability to decrypt user data under certain conditions, such as law enforcement requests or in line with their privacy policy.
16 / 33 Further Encryption Risks

Potential Access by Authorities

If a company holds the encryption key, it may provide access to encrypted data upon a court order or law enforcement request — even without user consent. Apple, despite defending user privacy, has been forced to provide data access in terrorism-related investigations. Both Google and Microsoft can be required to hand over user data upon request from law enforcement.

Risk of Data Loss in Case of Company Hack

If the company's key management infrastructure is compromised, all user data encrypted with those keys could be exposed at once — affecting millions of users simultaneously.

Potential Misuse of Keys by the Company

There is no technical guarantee that a company will not misuse the encryption keys it holds. Users must trust the company's policies — without any means of independent verification.

Lack of Trust in Cloud Encryption Solutions

When the entity providing encryption is the same entity that could be compelled to decrypt, the entire security model collapses. True encryption requires that only you hold the key.

Presenter Notes
The control of encryption keys by companies like Apple, Google, and Microsoft raises concerns about user privacy, as they can be compelled to provide data to authorities, risk of data loss in the event of a hack, and potentially misuse the keys, undermining trust in cloud encryption solutions.
17 / 33 The Right Approach to Encryption
If you're not concerned about the physical theft of your computer, disk encryption on your devices doesn't make much sense — because data theft occurs elsewhere: in the operating system.

Corporate encryption is theatre

Corporations already have the decryption keys, so their encryption loses any real purpose. You are not protected from the very entity that could breach your privacy.

Securing the BIOS matters more

It's far more important to secure the BIOS with a password than to rely on system-level encryption services like BitLocker.

LUKS — the right tool

There are tools that do this really well and for free, such as LUKS (Linux Unified Key Setup), where you alone hold the encryption keys or password. No corporation, no government agency — only you.

Presenter Notes
If you're not worried about your computer or phone being stolen, disk encryption doesn't offer any protection, because data theft typically happens at the operating system level. When corporations already possess the decryption keys, encryption loses its purpose. Securing your BIOS with a password is far more crucial than relying on system-level encryption like BitLocker. Open tools like LUKS allow you to control the encryption keys, providing better security for free.
Why Open Source?
18 / 33 Why Open Source?

Why should you use open source software and open operating systems at all?

The owners of the largest data-collecting corporations, following the recent elections in the USA — the global military and economic superpower — have become lawmakers.

For users of modern communication technology, nothing worse could have happened.

The concentration of power — over infrastructure, data, and legislation — in the hands of a few corporations represents a fundamental threat to personal freedom and privacy.

Presenter Notes
Using open-source software and open operating systems is crucial because it allows transparency, accountability, and control over your data. As the owners of large data-collecting corporations have increasingly become lawmakers, especially following the recent elections in the USA, they now have significant influence over policies that affect personal privacy and security. For users of modern communication technology, this concentration of power represents a major risk to freedom and privacy, making open-source alternatives essential for maintaining autonomy.
19 / 33 Open Source Alternatives

Why should you use open source software?

Signal

Private, open-source communicator. End-to-end encrypted by default. No data collection, no ads, no corporate surveillance.

LibreWolf

Privacy-hardened web browser based on Firefox. Tracking protection on by default, no telemetry, no fingerprinting.

K-9 Mail / FairEmail

Private mail clients. Note: every email on Gmail is read and analyzed by Google — even if it feels private.

DuckDuckGo

Privacy-respecting search engine and browser. Does not build profiles or track search history.

Linux

Private, open operating system. Full source code available for inspection. No forced telemetry, no hidden keys, no corporate backdoors.

Presenter Notes
They have every email you send, every photo you take, every SMS, every conversation, every call, your GPS data, health data — they know everything about you. If you want to change something, use a phone with an open system, a computer with an open system. Use Signal as your messenger, use LibreWolf as your browser, and use Linux as your operating system. Unfortunately, that's the only way nowadays.
20 / 33 The Real Cost

There is nothing free in our world…

  1. If you get something for free — an OS, an app, or a service — it means you're paying with your data, which is sold for big money.
  2. Instead of spending ~500 PLN on Windows, invest that money in learning Linux and gain full control over your system.
  3. Linux isn't completely free — it costs time to learn. But it's worth it, especially when you can gain knowledge at no extra monetary cost.
Remember: if you use Google, Facebook, YouTube, Instagram, TikTok, or Twitter for free — you are the product. Your data is collected, profiled, and sold.
Presenter Notes
If someone gives you something for free — an operating system, an application, or access to a service — it means you're selling yourself for convenience or the desire to be seen, while they collect your private data and sell it for big money. Additionally, with Windows, you even have to pay for the privilege of being exploited. So, instead of spending 500 PLN on Windows, take that money and invest in a solid Linux course. Because Linux isn't free either. Of course you can have it and use it for free, but the real cost is the time spent on learning how to use it. But I assure you, this cost is worth every minute spent on learning.
Linux Distributions
21 / 33 Linux Distributions

Linux

There are hundreds of Linux distributions — here are some of the most well-known ones:

UbuntuUbuntu
Arch LinuxArch Linux
DebianDebian
DeepinDeepin
elementary OSelementary OS
FedoraFedora
GentooGentoo
KaOSKaOS
KubuntuKubuntu
Linux (Tux)Linux (Tux)
LubuntuLubuntu
ManjaroManjaro
Linux MintLinux Mint
KDE NeonKDE Neon
Peppermint OSPeppermint OS
Pop!_OSPop!_OS
Puppy LinuxPuppy Linux
Raspberry Pi OSRaspberry Pi OS
Red HatRed Hat
SlackwareSlackware
openSUSEopenSUSE
Zorin OSZorin OS

…and hundreds more. Each distribution is a different combination of kernel, package manager, default desktop environment, and philosophy.

Presenter Notes
First of all, new users ask which distribution to choose... Which is the best?
22 / 33 Distribution Timeline

Linux Distribution Timeline

The complete family tree of Linux distributions — from 1991 to today — is best viewed interactively on Wikipedia:

23 / 33 Distribution Differences

What is the difference between them?

Release Model

Rolling Release

The system is constantly updated — there are no classic version releases. You always run the latest packages.

e.g. Arch, Gentoo, Void Linux
Fixed Release

New versions of the system are released periodically and require a migration between major versions.

e.g. Debian, Ubuntu, Fedora
Semi-Rolling

The system is based on stable releases, but some components are updated more frequently.

e.g. openSUSE Tumbleweed, Manjaro

Package Manager

pacman

Arch Linux and derivatives. Fast and simple.

apt

Debian, Ubuntu. Easy to use, large repositories.

dnf

Fedora, RHEL, CentOS. Better dependency support.

zypper

openSUSE. Advanced features, system snapshots.

portage

Gentoo. Source-based, compile-from-source system.

Presenter Notes
Linux distributions mainly differ in release models (rolling, fixed, semi-rolling) and in package managers (pacman, apt, dnf, zypper, portage), each offering distinct features tailored to specific user needs.
24 / 33 Which distro is the best?
Which distro is the best?
Presenter Notes
So... Which distro is the best? Actually I don't really know and I don't really care...
25 / 33 The Worst Ones
I have no idea, but I know which ones are the worst 😉
Automated Linux Distributions

These are distributions that automate so much that the user doesn't really know what is going on in their system.

Presenter Notes
But I know for sure which distributions I will never use. These are distributions that automation makes the user not really know what is going on in their system due to automation process.
26 / 33 Automation Risk
If you don't know what's going on under the hood, you can be sure nothing good is happening.
Automatic means potentially dangerous!
Nowadays, everyone wants your data: passwords, money, computing power, or something else. If I configure the system from start to finish by myself, I don't have to trust that someone else did it right.
Presenter Notes
Nowadays, everyone wants to steal your data. Passwords, money, computing power or something else... And to be clear, I'm not saying that automatic means automatically bad. But I don't have the time to check if they're really good — and I don't have to waste time checking it if I configure the system from start to finish by myself.
27 / 33 Automated Distros — User-Friendly

Automated Linux Distributions

User-friendly distros with lots of automation — these distros often do a lot of things in the background without giving the user full control:

Ubuntu

Collects anonymous telemetry data by default (can be disabled, but users rarely do this).

Pop!_OS

Automatic driver and update installation, which simplifies use but can be questionable.

Zorin OS

Integrated analytics and automatic downloads of some apps.

EndeavourOS (and Manjaro)

Automatic mirror and update management, which could impact security.

Presenter Notes
User-friendly Automated Linux Distributions. Unfortunately, among others, very popular Ubuntu.
28 / 33 Automated Distros — Dark Side

Automated Linux Distributions — Dark Side

Some distributions are heavily automated, and it is unclear what exactly they do:

Deepin Linux

A beautiful but controversial Chinese distribution. It was suspected of transmitting telemetry data to servers in China.

Kylin OS

A Chinese government-sponsored distribution, fully automated, but it is not entirely clear what processes are running in the background.

Windowsfx

Looks like Windows 11, but runs on Ubuntu. It is unclear what changes it introduces to the base system.

29 / 33 Automated Distros — "Lazy"

Automated Linux Distributions — "Lazy" Ones

Distros that hide too much from the user:

Linux Mint

While generally secure, automates a lot of things — for example, it hides kernel updates, which can be a security risk.

elementary OS

Very limited user control over the system and updates.

Garuda Linux

Based on Arch, but automates so many things that the user may not be aware of changes to the system.

30 / 33 Safe Distributions
If you want full control over your system, stick with a distro where everything is open and configurable from the start.
Arch

Rolling release, you build it yourself

Gentoo

Compile everything from source

Void

Independent, runit init, musl libc

Debian

Rock stable, 30+ years of reliability

Slackware

Oldest surviving distro, minimal automation

Presenter Notes
But I know for sure that those distributions are safe just after installation.
31 / 33 Course Announcement
We will learn Arch and Gentoo
Arch

Phase 1 — Installation & system fundamentals

Gentoo

Phase 2 — Compile-from-source, USE flags, kernel

Presenter Notes
Due to our course we will learn those two distributions and we will start from Arch and then Gentoo.
32 / 33 Why Arch or Gentoo?

Why Arch or Gentoo?

gentoo.org  ·  wiki.gentoo.org

1. Flexibility and Customization

Gentoo allows users to precisely tailor the system to their hardware and individual needs. With the Portage tree and the ability to compile source code, users have full control over configuring their system.

2. Performance and Speed

By compiling from source, users can optimize the system for their specific hardware, resulting in a faster and more efficient system.

3. Security

Gentoo is designed to be secure by default, with a strong emphasis on user security and privacy. You know exactly what is installed and why.

4. Community and Support

Gentoo has a strong and active community known for its expertise and willingness to help. Detailed documentation in the Gentoo Handbook covers everything.

5. Innovative Features

The Portage system allows users to easily manage and update their system with fine-grained control over USE flags, compile-time options, and system composition.

Presenter Notes
So why Gentoo? Gentoo is seen as one of the most challenging distributions to install, so if you navigate through the installation of this distribution and understand its system structure, you can be sure that you will handle any other Linux distribution. Gentoo is not a typical distribution. It allows you to precisely tailor the system to the hardware you have and to individual needs. Thanks to the Portage tree and the ability to compile source code, users have full control over configuring their system.
33 / 33 End
Thank you
Note from the lecturer: Please keep an eye on Teams. There are a few more things I wanted to share with you, but I had to step in for a committee member who fell ill for today's PhD defence, so I didn't have time to prepare everything. I'm very sorry — it all happened at the last minute. I don't want you to miss out, so I'll prepare some materials on MS Teams or perhaps record a video for YouTube.