| ▲ | collinfunk 2 days ago | |||||||||||||||||||||||||||||||
Well the TOCTOU issues do not require you to run untrusted scripts to be exploited. Another user on your system can use a legitimate command that you may run to make changes to files they shouldn’t be able to, or further escalate privileges. | ||||||||||||||||||||||||||||||||
| ▲ | IshKebab 2 days ago | parent [-] | |||||||||||||||||||||||||||||||
Fair point. Though tbh I still think the user-isolation security for Linux is only really suited for the University/company threat model, where you generally trust users not to actually use exploits because they would get expelled/fired. If you allow a completely untrusted user onto your system I think your chances of staying secure are low. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||