My user is, yes. But there has to be an exploit in sudo for the program to elevate itself using it without the user knowing, no? It’s possible for sure but I’m seeing this type of a precaution on a torrent client for the first time.
My user is, yes. But there has to be an exploit in sudo for the program to elevate itself using it without the user knowing, no? It’s possible for sure but I’m seeing this type of a precaution on a torrent client for the first time.
Has there ever been such an exploit? Given all other torrent clients I’ve seen just run as your user by default, is there something different in transmission over others that make it more vulnerable?
Isn’t that a risk for anything downloaded, assuming I run transmission as my user, not root?
Did UMU get a launcher? Isn’t a Proton “distribution” any launcher can use?
Isn’t that the globbing operator?
I’m asking global override vs application manifest (not application override). So the app asks for access to home/some-dir
but I have a global override that blocks access to home entirely.
So I need to go look at what filesystem each app is requesting and manually disable that on top of disabling home access entirely? What’s the point of being able to do filesystem=!home
in the global config?
I mean, assuming you’re telling the truth about there being a competent group seriously attempting this, it’s still “trust us bro” to conclusively claim it can’t be achieved without providing a shred of evidence. This makes your original comment irrelevant and worthless.
I’ve decided to use Docker