I noticed Debian does this by default and Arch wiki recommends is citing improved security and upstream.

I don’t get why that’s more secure. Is this assuming torrents might be infected and aims to limit what a virus may access to the dedicated user’s home directory (/var/lib/transmission-daemon on Debian)?

    • Quail4789@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      My user is, yes. But there has to be an exploit in sudo for the program to elevate itself using it without the user knowing, no? It’s possible for sure but I’m seeing this type of a precaution on a torrent client for the first time.

        • nanook@friendica.eskimo.com
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          @BaumGeist @Quail4789 If you get software from an untrusted source, and it does not matter if it’s a torrent, ftp, https, scp, etc, you run this risk. And usually when you download with a torrent the supplying site will publish a hash which you can compare to make sure that it wasn’t corrupted in transit.

      • nanook@friendica.eskimo.com
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 year ago

        @Quail4789 @rc__buggy@sh.it just.works there is not a known exploit in sudo but there IS a known exploit in the library it uses to elevate privileges, at least in older versions. Also I make full system weekly backups so worst comes to worst I’m never going to lose more than a weeks data.