Event JSON
{
"id": "b8819f56232ac6379b439f862f256a694310bbc361a3675c6870983b9f710505",
"pubkey": "f83fc6145057e57deec8b903d2ee761d8cde778b6f5ba8d50947c55ebdd9fb52",
"created_at": 1714510087,
"kind": 1,
"tags": [
[
"p",
"2ffa8eb4af9e3ea1900c461683d5ddfd77c81dc2998b47f5eb1ddc7a7e69ff30",
"wss://relay.mostr.pub"
],
[
"p",
"1d95c32d9a9d95a54f98eb2eaa156f3d3a71dc49eca2c960b2b89962758f1cc0",
"wss://relay.mostr.pub"
],
[
"e",
"d0b85dfc2b50a310126edea236d555e9dc15bfa68daf30aa0608bd92111d0624",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://fosstodon.org/users/swick/statuses/112362133074054451",
"activitypub"
]
],
"content": "nostr:npub19lagad90ncl2ryqvgctg84wal4mus8wznx950a0trhw85lnflucquphm4g suid programs executing in the environment of the parent process means that I might become root in a user namespace and get the filesystem view of the current mount ns. This won't work with your approach, will it?",
"sig": "f54a9577e148c5bc0e551ed59d2c5c7cc9f91b7ca6461fb4250e517dbf081431d27bc479535007757e03f3a6eb245a0e0b5e422cf68d0395b7f3a4961f833f24"
}