>>1015765
>Nobody here is running UNIX,
Linux is indistinguishable from UNIX aside from fags who take UNIX seriously. Even Windows is basically UNIX since it's the same bullshit based around a C API and files.
>the old thing that the UNIX-Haters Handbook references.
never read it.
>Most of us are using some recent Linux distro, or a modern BSD derivative. They're all different and many can do more than just DAC, although some need kernel patches for that.
YES. They can do MAC, which nobody uses. Securing the user against himself is a non-goal.
>If I want to do something as root, I login on a unusued tty, and do it right there.
This is how I did it too and hence why I hate Linux. Even then it still has innate vulns. Even logging in is a pain in the ass. If you type your username and hit enter and then type the password without pausing sufficiently long after the enter key, part of the password goes to stdout instead of being captured. Absolute garbage. Right now on my Linux systems I just run everything as root.
>This is all done via those DAC things that you think are worktlesss. But they actually work if you use them properly like this, the way they were designed for.
Clearly they don't work if they require the user to do huge workarounds 100 times a day.
>BTW, before you say again "but nobody ever does this", you're wrong. I never fully trusted irc clients, so always create separate user for irc.
Literally write your own IRC client in a memory-safe PL. Problem solved. No DAC or even MAC needed. I stopped trying to get MAC to work around 2009 and went for capability-based security instead.
>>1015783
>we're talking about desktop users, who run everything as a single non-root user
>>1015786
ransomware _DOES NOT_ remotely require any privileges. if you run something as your own user on Linux or Windows it can do whatever it wants with all your files. who gives a fuck about system32? I can reinstall the OS. what matters is obviously only the user's files
>>1015795
this picture is literally smarter than 99% of neckbeard LARPers
>>1015797
>Try considering the permissions you'd need to have for a text editor and a game with a modder SDK to work correctly, and you'll see how annoying the whole thing is.
Because UNIX braindamage will make you answer questions like "hurr durr do you want give access to this SHM, socket, and file, etc". Because UNIX braindamage is full of retarded global namespaces. The capability security model in contrast makes sandboxing much easier.
>Also that comic is retarded, admin access allows much stronger malware persistence and thus allows for long term data theft and botnetting, something that's not possible without sudo.
Already debunked ITT. Also user level rootkit is a big and old topic.
>In the off chance you're not trolling, a virus running as admin can do nastier things, such as embedding itself within your motherboard, within your hardware firmware (especially for I/O devices), and generally making itself a lot harder to detect.
And you're relying on shitty Linux/Windows OSs to have no escalation vulns. You're already owned. Everyone here already knows the way to run untrusted software is on a separate machine. If we had a capability-secure OS we could run it on any machine and know it wont escalate, but for now we're stuck with UNIX braindamage.
>not stored locally and
doesn't matter since they pass through your local userspace
>passwords can't be read out without admin rights.
>So the browser may run as user but can't be accessed as user.
No system works like that jej. UNIX has nothing more than DAC. Stop pretending otherwise.
>only if the user uses a client program
>rest of post
No, what....