From: Sven U. <sve...@gm...> - 2013-06-24 08:33:11
|
> root may use command su to impersonate your user. So why do you see > any new privacy leak? While I do agree that there can not be absolute security when it comes to root, it surely isn't as easy as just doing su - for example, much of my sensitive data resides on an encfs partition, which only becomes readable on demand, after I enter a password. While this isn't meant as protection against root (me, on those machines), but rather against loss of the machine, it also means that simply stumbling into my homedir won't suffice either. Of course, there's no way to stop a malicious sysadmin from replacing the libraries and executables with some version reporting to him - but let me just say that while I'm willing to live with that second risk, I'm not willing to live with the first one of a nosy sysadmin just getting bored and browsing my files... Sven -- _ ___ ___ ___ The dCache File System __| |/ __|| __|/ __| An archive file-system for PB of data / _` | (__ | _| \__ \ http://www.desy.de/~utcke/Data/ \__,_|\___||_| |___/ http://www.dr-utcke.de/ |