Join Nostr
2026-04-30 16:58:54 UTC
in reply to

Andrew Zonenberg on Nostr: nprofile1q…qr9vg I run the vast majority of my stuff that opens a socket to the ...

I run the vast majority of my stuff that opens a socket to the internet in VMs that I can reboot much more casually.

But also I'm mostly running single-user systems. very few kernel bugs are RCEs, those are major headlines and the kind of thing that *would* get me to do an out of cycle reboot. But something that lets you privesc to kernel while running as a normal user really doesn't matter to me.

If you pop my workstation you a) can get all of my files and data, root doesn't buy you much else and b) it's a dev box I almost always have a root shell open or am going to su/sudo in the next few minutes to do something you can keylog.

The goal is to prevent an attacker from getting code exec as my local user in the first place not preventing root once they do that.