Let’s say I want to enforce certain settings, such as the use of a proxy in network settings for certain users.

Isn’t this easily bypassable by for example by installing TOR browser or using a VPN app in the user space?

How does system mangers can be sure users will only use the system as planned by the sysadmin? I’m especially interested in network settings, but in general I would be interested to know more about this/be pointed towards the right direction.

Thank you!

  • Eager Eagle
    link
    English
    618 hours ago

    besides just downloading and running a binary, there are plenty of package managers that work in the user space and don’t need root access.

    • @[email protected]
      link
      fedilink
      -218 hours ago

      If you are setting up a secure system though you would only use a package manager that needed sudo

      • Eager Eagle
        link
        English
        217 hours ago

        Who’s setting up the system is not necessarily the same person using it.