Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Good for you. You are not everyone.


There are far more likely accidents that the superuser can perpetrate, that we do not compensate for with silly logic in applications.

Superuser could download some malware and put it into the system PATH. OK, so let's not execute anything in the PATH, unless it is owned by us.

/bin/ls? Not owned by me, don't trust it.


Okay.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: