How secure is switching TTY sessions vs GNOME “Switch User”?2019 Community Moderator ElectionHow can I switch window managers in Gnome 3?How to switch tty with a script / cronjobHow to switch between tty and xorg sessionAuto-start multiple background user sessions in Linux MintArch Linux Gnome 3 slow login -> desktop transition and 2 gnome-sessions when booting upGnome 3.20 graphical glitches when switching applicationsWhat is secure to remove from GNOME Desktop => GNOMEGnome 3.22: disable alt+shift keyboard layout switchingHow to prevent switching to a different tty when Xserver starts?How can I switch users in GNOME?

What kind of footwear is suitable for walking in micro gravity environment?

How to test the sharpness of a knife?

How old is Nick Fury?

What will the Frenchman say?

Is VPN a layer 3 concept?

Should a narrator ever describe things based on a characters view instead of fact?

When did hardware antialiasing start being available?

If I cast the Enlarge/Reduce spell on an arrow, what weapon could it count as?

Why are there no stars visible in cislunar space?

Someone scrambled my calling sign- who am I?

Hot air balloons as primitive bombers

Emojional cryptic crossword

Exposing a company lying about themselves in a tightly knit industry: Is my career at risk on the long run?

Interior of Set Notation

Was World War I a war of liberals against authoritarians?

Isn't the word "experience" wrongly used in this context?

Hackerrank All Women's Codesprint 2019: Name the Product

Should I be concerned about student access to a test bank?

Pre-Employment Background Check With Consent For Future Checks

10 year ban after applying for a UK student visa

What is the tangent at a sharp point on a curve?

Justification failure in beamer enumerate list

TDE Master Key Rotation

Do I need to convey a moral for each of my blog post?



How secure is switching TTY sessions vs GNOME “Switch User”?



2019 Community Moderator ElectionHow can I switch window managers in Gnome 3?How to switch tty with a script / cronjobHow to switch between tty and xorg sessionAuto-start multiple background user sessions in Linux MintArch Linux Gnome 3 slow login -> desktop transition and 2 gnome-sessions when booting upGnome 3.20 graphical glitches when switching applicationsWhat is secure to remove from GNOME Desktop => GNOMEGnome 3.22: disable alt+shift keyboard layout switchingHow to prevent switching to a different tty when Xserver starts?How can I switch users in GNOME?










0















On my personal laptop I'm using Fedora 29 and have two user accounts for myself; let's call them "personal_admin" and "personal_user". My personal_admin account is strictly for administrative tasks (installing software and updates mostly), which my personal_user account is for day-to-day use. Is this overkill?



How secure is switching between users using virtual terminals (CTRL+Alt+F#) versus the GNOME "Switch User" command? Does the situation change if I switch virtual terminals and then launch a GUI?



Suppose that my personal_user account is completely compromised and malware is running as a daemon with personal_user's privileges. I know that I shouldn't su personal_admin while signed into personal_user since the malicious daemon could easily record my personal_admin credentials. Does using virtual terminals or the GNOME "Switch User" command mitigate against this, or is the only safe option to sign out of personal_user (or maybe even reboot)?










share|improve this question




























    0















    On my personal laptop I'm using Fedora 29 and have two user accounts for myself; let's call them "personal_admin" and "personal_user". My personal_admin account is strictly for administrative tasks (installing software and updates mostly), which my personal_user account is for day-to-day use. Is this overkill?



    How secure is switching between users using virtual terminals (CTRL+Alt+F#) versus the GNOME "Switch User" command? Does the situation change if I switch virtual terminals and then launch a GUI?



    Suppose that my personal_user account is completely compromised and malware is running as a daemon with personal_user's privileges. I know that I shouldn't su personal_admin while signed into personal_user since the malicious daemon could easily record my personal_admin credentials. Does using virtual terminals or the GNOME "Switch User" command mitigate against this, or is the only safe option to sign out of personal_user (or maybe even reboot)?










    share|improve this question


























      0












      0








      0








      On my personal laptop I'm using Fedora 29 and have two user accounts for myself; let's call them "personal_admin" and "personal_user". My personal_admin account is strictly for administrative tasks (installing software and updates mostly), which my personal_user account is for day-to-day use. Is this overkill?



      How secure is switching between users using virtual terminals (CTRL+Alt+F#) versus the GNOME "Switch User" command? Does the situation change if I switch virtual terminals and then launch a GUI?



      Suppose that my personal_user account is completely compromised and malware is running as a daemon with personal_user's privileges. I know that I shouldn't su personal_admin while signed into personal_user since the malicious daemon could easily record my personal_admin credentials. Does using virtual terminals or the GNOME "Switch User" command mitigate against this, or is the only safe option to sign out of personal_user (or maybe even reboot)?










      share|improve this question
















      On my personal laptop I'm using Fedora 29 and have two user accounts for myself; let's call them "personal_admin" and "personal_user". My personal_admin account is strictly for administrative tasks (installing software and updates mostly), which my personal_user account is for day-to-day use. Is this overkill?



      How secure is switching between users using virtual terminals (CTRL+Alt+F#) versus the GNOME "Switch User" command? Does the situation change if I switch virtual terminals and then launch a GUI?



      Suppose that my personal_user account is completely compromised and malware is running as a daemon with personal_user's privileges. I know that I shouldn't su personal_admin while signed into personal_user since the malicious daemon could easily record my personal_admin credentials. Does using virtual terminals or the GNOME "Switch User" command mitigate against this, or is the only safe option to sign out of personal_user (or maybe even reboot)?







      gnome3 tty multiuser






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 10 hours ago









      Rui F Ribeiro

      41.5k1483141




      41.5k1483141










      asked 11 hours ago









      Ender WigginEnder Wiggin

      15014




      15014




















          1 Answer
          1






          active

          oldest

          votes


















          1














          From a security perspective, switching VTs directly and using GNOME’s “switch user” are equivalent. The “switch user” feature is more about making it user-friendly, than it is about security: it means you don’t need to know which VT you’re logged in on, or even whether you’re logged in yet.



          If your two accounts are completely separate (in particular, neither can write anywhere the other account will read important information from), this will mitigate user-level compromise from one account to the other. Determining what constitutes a “safe” option for you really requires determining what risks you want to prevent, or minimise, and how far you’re willing to go to do so.






          share|improve this answer






















            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "106"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f506995%2fhow-secure-is-switching-tty-sessions-vs-gnome-switch-user%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            1














            From a security perspective, switching VTs directly and using GNOME’s “switch user” are equivalent. The “switch user” feature is more about making it user-friendly, than it is about security: it means you don’t need to know which VT you’re logged in on, or even whether you’re logged in yet.



            If your two accounts are completely separate (in particular, neither can write anywhere the other account will read important information from), this will mitigate user-level compromise from one account to the other. Determining what constitutes a “safe” option for you really requires determining what risks you want to prevent, or minimise, and how far you’re willing to go to do so.






            share|improve this answer



























              1














              From a security perspective, switching VTs directly and using GNOME’s “switch user” are equivalent. The “switch user” feature is more about making it user-friendly, than it is about security: it means you don’t need to know which VT you’re logged in on, or even whether you’re logged in yet.



              If your two accounts are completely separate (in particular, neither can write anywhere the other account will read important information from), this will mitigate user-level compromise from one account to the other. Determining what constitutes a “safe” option for you really requires determining what risks you want to prevent, or minimise, and how far you’re willing to go to do so.






              share|improve this answer

























                1












                1








                1







                From a security perspective, switching VTs directly and using GNOME’s “switch user” are equivalent. The “switch user” feature is more about making it user-friendly, than it is about security: it means you don’t need to know which VT you’re logged in on, or even whether you’re logged in yet.



                If your two accounts are completely separate (in particular, neither can write anywhere the other account will read important information from), this will mitigate user-level compromise from one account to the other. Determining what constitutes a “safe” option for you really requires determining what risks you want to prevent, or minimise, and how far you’re willing to go to do so.






                share|improve this answer













                From a security perspective, switching VTs directly and using GNOME’s “switch user” are equivalent. The “switch user” feature is more about making it user-friendly, than it is about security: it means you don’t need to know which VT you’re logged in on, or even whether you’re logged in yet.



                If your two accounts are completely separate (in particular, neither can write anywhere the other account will read important information from), this will mitigate user-level compromise from one account to the other. Determining what constitutes a “safe” option for you really requires determining what risks you want to prevent, or minimise, and how far you’re willing to go to do so.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 11 hours ago









                Stephen KittStephen Kitt

                176k24401479




                176k24401479



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Unix & Linux Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f506995%2fhow-secure-is-switching-tty-sessions-vs-gnome-switch-user%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    getting Checkpoint VPN SSL Network Extender working in the command lineHow to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate

                    Cannot Extend partition with GParted The 2019 Stack Overflow Developer Survey Results Are In Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) 2019 Community Moderator Election ResultsCan't increase partition size with GParted?GParted doesn't recognize the unallocated space after my current partitionWhat is the best way to add unallocated space located before to Ubuntu 12.04 partition with GParted live?I can't figure out how to extend my Arch home partition into free spaceGparted Linux Mint 18.1 issueTrying to extend but swap partition is showing as Unknown in Gparted, shows proper from fdiskRearrange partitions in gparted to extend a partitionUnable to extend partition even though unallocated space is next to it using GPartedAllocate free space to root partitiongparted: how to merge unallocated space with a partition

                    Marilyn Monroe Ny fiainany manokana | Jereo koa | Meny fitetezanafanitarana azy.