Mike Hearn wrote:
[...]
It's worse than that. As soon as you run any untrusted piece of code, even in your account, it is game over for your account.

Today, yes, but I think one long term aim should be to change that.
Users clearly _do_ run less trustworthy code in their accounts all the
time, because there's no real way to determine if a program is "evil" or
not ahead of time. It's possible to make an OS robust against this
reality, so we may as well start evolving Linux in this direction
now ...

So your plan is to have ~/.config/autostart be locked down such that all of the following commands fail?

   cp foo.desktop ~/.config/autostart
   cat foo.desktop >~/.config/autostart/foo.desktop
   rm ~/.config/autostart/foo.desktop
   rm -rf ~/.config

Frankly I would not want to use a system where standard commands such as cp, rm and cat are crippled in such a way. Though if the shell gives me a way to locally turn this feature off for all child processes it may be ok.

Anyway, if going through a register-autostart tool is to be made mandatory, it should at least provide the following functionality:
 * add an entry
   Example: register-autostart --add foo.desktop
 * remove an entry
   Example: register-autostart --del foo.desktop
* get a list of the entries and return their full path so an application can read them
   Example: register-autostart --list
            /home/user/.config/autostart/foo.desktop
            /home/user/.config/autostart/bar.desktop

--
Francois Gouget
[EMAIL PROTECTED]

_______________________________________________
xdg mailing list
[email protected]
http://lists.freedesktop.org/mailman/listinfo/xdg

Reply via email to