Looks like the 5.6.1-2 release on Arch moved from using the published GitHub releases to just using the git repository directly, which as I understand avoids the exploit (because the obfuscated script to inject the exploit is only present in the packaged tarballs and not the git repo itself)
Anyone that still wants a supported version of win 10, look into Windows 10 IoT Enterprise LTSC (2021) - supported until 2032 and can be activated by MAS with HWID
WTF are you referring to here? I mean I'm guessing that you're referring to a historical event, rather than making shit up?