Secure way to run a linux binary which needs access to ressources only available to root?
As a developer, I ask how to approach security concerns regarding permissions of a binary which needs access to resources only available to root users.
For example, let’s think of a simple tool which creates a virtual device or executes co… Continue reading Secure way to run a linux binary which needs access to ressources only available to root?