Quote:
Originally Posted by IIMarckus
Security?
|
Yes.
chroot(8) effectively changes the root directory such that the
"real" root directory, configuration files, libraries, & binaries not present in the chroot'ed directory are completely hidden/inaccessible/protected from a process running in the chroot'ed directory.
Given the shenanigans & holes exploited in the IRC world,
chroot(8) can help secure a client's system from malicious intent.