• @IAm_A_Complete_Idiot
    link
    2
    edit-2
    7 months ago

    This is good for precisely the single user case - potentially malicious services on your system can’t view things they otherwise would be able to, or access resources they don’t need. Even if it’s under the same user.