On Fri, Jun 05, 2015 at 09:24:51PM +0200, U.Mutlu wrote: > true, the dangers and challenges are high. The solution I finally > found took me unfortunately a long time to find it, and I know of > no other open-source solution to achieve what I described, > because of the unfortunate 'root is king and user is nobody' mentality > and reality we have. > But as described, in some security environments the user needs > a truly private space on the system where nobody else has access to. "where nobody else has access" is impossible on a shared system. Period. There reason why there is no other open-source solution is because there *is* no open source solution, period. You can't have an open source solution that perfromances something which is by definition impossible. If someone needs truly private space, the only thing they can do is to use their own hardware, purcahsed at a computer store, and then to use a system like Tails[1] booted from a read-only USB stick. [1] https://tails.boum.org/ ... and even then they have to trust the people who implemented the Tails system, and the people who implemented the firmware on the computer system, and if the system was shipped to you, you have to trust that the NSA hasn't intercepted the hardware and compromised the hardware. [2] http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ > I think the filesystem could indeed implement such a "user-only" directory, > because the FUSE-API wrapper showed me that it is indeed possible > to implement that idea. I would suggest to add this feature to ext4, > and that new feature could be a real game-changer (yes, I know another > bold statement) in IT security. Sorry, I'm not willing to advertise that a file system has a feature which is a pure snake oil --- someone claiming that this can be done is making a fradulently untrue statement. Regards, - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html