Sorry, I was trying to find parts for my daughter's machine while doing this (cheap Minecraft build). I corrected my comment.
Mordikan
If its compression related, have you checked your caching on that system?
You might try (as root - not sudo) to toggle swap off/on: swapoff -a && swapon -a
Then just before running the installer (again as root - not sudo): echo 3 > /proc/sys/vm/drop_caches
I've used smollm2:135m for projects in DBeaver building larger queries. The box it runs on is Intel HD 530 graphics with an old i5-6500T processor. Doesn't seem to really stress the CPU.
UPDATE: I apologize to the downvoter for not masochistically wanting to build a 1000 line bulk insert statement by hand.
Tailscale has the funnel command which exposes services like how you describe, but that's off the table.
Not quite sure I understand your layout, but if these are separate VPNs, you could run one from the server with a port forward (guessing that's not through Mullvad as they don't offer forwards any longer - to my knowledge) and then setup the general VPN on your router perhaps so you don't have to change ip routes for the whole network. You would still probably need to setup an ip route specific to the server VPN traffic on the router at that point, but that would probably be less work.
If this all being done from the same device then you would need to separate them out by IP routes.
I don't think you'll get all of these points with the same tool. You can login to your account and use recommendations with Revanced YT Music, but not download. Freetube can't do #1 but can import your sub list and download. yt-dlp can't do #1 but can download (mpv could be used as the player technically). Invidious can't do #1 but can the others, but Youtube updated their API recently which largely breaks Invidious. Terminal players like youtube-viewer, ytfzf, yewtube, etc can't do #1 but usually the others.
Checking Mangajikan website... Redirecting to a .cc domain... And... its back lol
Ok, this is your summarized argument: Accel is going to gut the company and run it into the ground because that's what they do, but they haven't ever done that, but they could, so they will, so that's the same as doing it, although they haven't, but it will happen in the end because that's what they do, but they don't.
Its not a strawman if what you say is in fact a weakly constructed idea. Its just a weakly constructed idea then. Its nothing but vague generalizations and "what ifs" you posted. Let me just put it this way: evidence or stfu.
ME: So, even if Accel doesn't do that, which they haven't done that, they are still guilty of doing that.
YOU: Not what I said.
YOU: What you’re apparently not getting is that even if it’s not happening right now, it will in the end.
So.. even if Accel doesn't do that, which they haven't done that, they are still guilty of doing that. You have no argument, just strong feelings.
Is there an actual example you can provide of Accel doing that
So... if all VC money does, then you can provide an example of Accel doing this... right? So, go ahead and do that now.
So, even if Accel doesn't do that, which they haven't done that, they are still guilty of doing that. Ok, yeah. That's some solid irrefutable logic you got going there. I think I'll go back to arguing this with commenters who are a little less emotional and more grounded in real world points about the topic.
So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.
To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone's house. We'd also build cantennas from junk laying around. Those were interesting days.