this post was submitted on 15 Dec 2025
35 points (87.2% liked)
Linux
10653 readers
361 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
On one hand, I thought of policies as the correct way to do stuff, since the user (root) then gets to decide who gets what.
But considering the lack of good enough defaults and that most users won't even know where to look at, I guess we do need additional security features in this case.
For once, it would be good to find a way to reliably let a process (providing said endpoint) know which other process is trying to access said endpoint. This, combined with the root locations (like /bin, /usr/bin etc.) not being writeable without root privileges, should make it possible to have adequate security options in the program itself.