What is needed for decently secure multi desktop user system where the users have access to input devices, but not to the machine itself?

Assuming the OS is some GNU+Linux distribution,
What is needed to secure such a setup. Are there some things that assume that if you have access to the things described, you own the system? Or anything else? Is such a setup feasible?
The s… Continue reading What is needed for decently secure multi desktop user system where the users have access to input devices, but not to the machine itself?