> Inside the sandbox but not on my machine. Show me how it can access an unmounted directory.
So it says right on the tin of my favorite distro:
'Warning: Beware that the docker group membership is effectively equivalent to being root!
Consider using rootless mode below.' So # docker run super-evil-oci-container with a bind mount or two and your would-be attacker doesn't need to guess your sudo password.
What's particularly vexing is that there is this agentic sandboxing software called "container-use" and out of the box it requires you to add a user to the docker group because they haven't thought about what that really means and why running docker in that configuration option shouldn't be allowed, but instead they have made it mandatory as a default.
I'll go halfers with you, any other takers? I feel like sharing infrastructure via small online co-ops can take the bite out of the cost. So much cheaper then the cost of being the product via meta/goog etc.
Another way to think about it, many websites the data gets transmitted before you hit submit, between various type ahead reactive frameworks, soft keyboards with networked spell checking, your AI powered mood ring, always listening smart watch/car/home etc. Grandad always said don't say anything on the radio you wouldn't say in public, well we're up to don't think out loud or see how your crazy idea looks in text before you edit the Mel Gibson tones out of it. Tinfoil hats are off, on, locked!
That's an illegal tube is what you've got right there... Hay wait _I_ could be an illegal tube at any point, either by choice or at the mercy of a lawmakers writing tools.
So it says right on the tin of my favorite distro: 'Warning: Beware that the docker group membership is effectively equivalent to being root! Consider using rootless mode below.' So # docker run super-evil-oci-container with a bind mount or two and your would-be attacker doesn't need to guess your sudo password.
reply