I have a question, what are the limitations of Shadow? What things cannot/shouldn't be ran on the device (outside of malicious software of course). For example, could I use it as a programming environment?
Login to the community
Social LoginLogin with OpenIdConnect
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.