Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah I have this setup for quite a few years by now, and occasionally I question whether this practice makes sense.

What does make it incredibly dangerous is that it also applies for eg “sudo”: if you don’t have any additional protection, it effectively means that any exploit in any app can be immediately extended to a local privilege escalation, as there is no additional protection in place.

In other words, be careful what you wish for. :)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: