On Mon, 11 Feb 2019 20:17:57 +0100, Jan Engelhardt wrote:
On Monday 2019-02-11 20:01, Jim Henderson wrote:
On Mon, 11 Feb 2019 19:41:45 +0100, Liam Proven wrote:
The *only* way to win over such people is to ensure that there are no problems in their path. That everything works as they expect.
Most people want secure systems that are easy to use.
Maybe we should ship with Xorg permissions open to the world. Because if I'm running an application remotely from another system, having to type 'xhost +' or to enable permissions is "too hard".
Tech note:
Most people should be running an SSO-style solution. ssh, su, etc. forward appropriate key material through environment variables and the like just by logging in, making the use of xhost wholly unnecessary.
Too inconvenient, according to some. After all, if you're using ssh with public keys, you have to generate the key pair, and that's *hard* and *inconvenient*. The "sanest" solution is to value ease of use over security, and remove any security roadblocks that might make for a poor user experience, according to some people. After all, it *is* "open"SUSE, is it not? That means (to some) that anyone should be able to exploit the system by default, and if you want security, then let the security nerds figure out how to do what needs to be done to actually make their own systems secure. Nobody else needs security, after all. (sarcasm tags should be taken as read here) -- Jim Henderson Please keep on-topic replies on the list so everyone benefits -- To unsubscribe, e-mail: opensuse-factory+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-factory+owner@opensuse.org