• digdilem@lemmy.ml
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    11 months ago

    Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.

    Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?

    • IAm_A_Complete_Idiot@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      11 months ago

      The idea is malware you installed would presumably run under your user account and have access. You could explicitly give it different UIDs or even containerize it to counteract that, but by default a process can access everything it’s UID can, which isn’t great. And even still to this day that’s how users execute a lot of processes.

      Windows isn’t much better here, though.