Operating systems block unauthorized package installations by default to prevent system changes. Navigate to the system menu.
Open the app's properties via system settings, clear the cached data storage, and check the permission settings. Security Best Practices for Independent File Sources
Point releases like version 1.2.8 usually target system performance, minor interface adjustments, and fundamental background stability.