No one reading your comment will take you seriously when you claim OP said something they didn’t say. You realize the comment is right there for us to read, right?
If we keep going back, Israel has committed far too many hostilities that were never responded to. Hell, they bomb syria most weeks without any retaliation form Syria. They commit horrors against west bank citizens all the time.
Painting Israel as a victim just for having a small population / geography… I don’t know about that. They’ve committed far too many massscres since their inception to be portrayed like that.
Unfortunately, I’m not certain it’s in Israel’s best interest that this doesn’t escalate. They can probably do serious damage to Iran whereas the reverse is far less certain (evidently from this attack). And they knew very well that their embassy attack will bring Iranian retaliation. Now they’ll just use that for an even greater response.
Didn’t say you can’t whatever you want. I said “by your logic”. That was assuming you don’t contradict your own logic, but of course you can otherwise :)
I see. I have little knowledge, but I bet that the “root privileges” part of this process is the reboot. Upon rebooting, system updates are applied from the new image via some privileged process.
That’s pretty neat. Unfortunately I haven’t ventured deeply enough into that type of system yet (was it called immutable distro or something?). I use gentoo, which doesn’t support this out of the box.
Yes I did, and that’s a very good point. What sudo does not allow me to do is grant a user access to modify or read specific files or directories. I can get both that and access to executing specific programs using a users/groups permission system.
Another thing I don’t like about sudo is that you end up using the same password for everything, which is also the password for logging in. Putting higher privileges behind my same login password opens me to a single point of failure.
The short answer is that my distro did not let me do this easily. But that was for good reason.
A system update would require too many privileges that it would be almost indistinguishable from root.
Currently, every user I have is restricted in what files it has access to. A system update user would need access to so many files, including install locations of all binaries, and non-binary installation paths of all current and future programs I install (some package installs modify /var, many modify /etc, and so on).
This user will also have access to all these programs, down to system applications. It can trivially break a permission system I come up with.
It may be possible to restrict system updates to a user, but it would be such a powerful user that its not really worth it.