Here’s the problem. So many legitimate things need elevation, and often multiple times in a single install. Guess what most Windows users do, when they see an elevation prompt. What do you reckon?
Honestly I don’t think it’s that bad. I have to use sudo just as often on linux as I have to accept the elevation box on win. Win11 has some serious issues but UAC is harmless.
Sudo is very different. You need to explicity enter your password. It may be cached for a short time and I’d argue that’s actually better.
If I’m installing something, it asks for my password once but can then raise to root multiple times that’s fine.
If I’m installing something and it asks for elevation three times, for example it needs to Install multiple drivers. It generates an automatic click when installing for many unexperienced users. It’s dangerous imo.
So you think a person that would turn off UAC wouldn’t just put NOPASSWD in the sudoers? I doubt that. And even if they had to enter their pwd… Wouldn’t that just be annoying for the casual user instead of increasing security? I doubt they would be like “Oh I have to enter my pwd now, that really makes me think twice about whatever I was going to do with sudo.”
Sudo is just clicking “ok” with extra steps, thus making adding and removing programs more annoying, thus meaning the common user will probably just be logged in as root all the time. I challenge you to change my mind.
That’s exactely what happened in my mind when I was getting started with Linux (kind of), although it’s arguably a habit that comes from using Windows where people don’t really think about OS users and permissions
As a Linux beginner who has a couple of false starts into it being my daily driver I’ll say that there are two stumbling blocks left for me. Permissions “issues” is the bigger problem and some programs not being as fleshed out is the other.
I don’t know. Not everyone who uses a computer should be an expert. Not everyone is 100% alert all the time. I know there has to be a line somewhere.
I feel like it would be really easy to have the OS check if the exe is appended to some other extension and force the user to rename it before allowing it to be executed.
It’s still a valid complain, but the problem is not exactly the presence or absence of a confirmation IMO, it’s a deeper matter.
What causes user desensitization (I guess that’s a word) is a direct result of how Windows users traditionally install software - from untrusted sources or by downloading them directly from a vendor’s website then manually installing it.
UAC would be just fine if it was a rare thing to see, but because of this “download a .exe > double click > install” flow users see it all the time, which defeats the purpose of the warning. It became just another half-measure Windows has implemented.
And it’s unhelpful because it doesn’t give any details about what it wants to do with that admin access and also treats permission for one action as permission for all actions (not that you can tell what they first action you’re permitting is).
I like the way android does it, where you can grant or revoke special permissions by category of action.
Though the system I’d like to see is one where each program is sandboxed and then even you close the program (or it prompts for an elevation), then you get a list of system differences between the sandbox and your system and can choose whether and which changes to push from the sandbox env into the main env. Or to combine sandboxes so that programs can interact with each other.
It’s not like I want to defend windows, but If it needs admin permission you usually can’t start it without confirmation.
Here’s the problem. So many legitimate things need elevation, and often multiple times in a single install. Guess what most Windows users do, when they see an elevation prompt. What do you reckon?
Honestly I don’t think it’s that bad. I have to use sudo just as often on linux as I have to accept the elevation box on win. Win11 has some serious issues but UAC is harmless.
Sudo is very different. You need to explicity enter your password. It may be cached for a short time and I’d argue that’s actually better.
If I’m installing something, it asks for my password once but can then raise to root multiple times that’s fine.
If I’m installing something and it asks for elevation three times, for example it needs to Install multiple drivers. It generates an automatic click when installing for many unexperienced users. It’s dangerous imo.
It can’t really be compared to Sudo.
So you think a person that would turn off UAC wouldn’t just put NOPASSWD in the sudoers? I doubt that. And even if they had to enter their pwd… Wouldn’t that just be annoying for the casual user instead of increasing security? I doubt they would be like “Oh I have to enter my pwd now, that really makes me think twice about whatever I was going to do with sudo.”
Can confirm, have borked my sysyem this way
Sudo is just clicking “ok” with extra steps, thus making adding and removing programs more annoying, thus meaning the common user will probably just be logged in as root all the time. I challenge you to change my mind.
That’s exactely what happened in my mind when I was getting started with Linux (kind of), although it’s arguably a habit that comes from using Windows where people don’t really think about OS users and permissions
As a Linux beginner who has a couple of false starts into it being my daily driver I’ll say that there are two stumbling blocks left for me. Permissions “issues” is the bigger problem and some programs not being as fleshed out is the other.
if you give elevated permission to movie.mp4.exe, that’s natural selection
I don’t know. Not everyone who uses a computer should be an expert. Not everyone is 100% alert all the time. I know there has to be a line somewhere.
I feel like it would be really easy to have the OS check if the exe is appended to some other extension and force the user to rename it before allowing it to be executed.
Everyone knows most people turn UAC completely off after it nags them for the 10th time and they get frustrated and dump it.
I turn UAC off before it nags me for the 10th time.
The only nag I want to see is the one right before it gets turned off.
I hate things that just throw up nag screens that users get desensitized to and just click through anyway. It hasn’t increased security at all.
Looking at you “do you trust the authors of the code in this workspace folder” VSCode. Yes I effing do, that’s why I opened it to begin with!
Fair enough but then you shouldn’t complain about the lack of confirmation (like the meme does)
It’s still a valid complain, but the problem is not exactly the presence or absence of a confirmation IMO, it’s a deeper matter.
What causes user desensitization (I guess that’s a word) is a direct result of how Windows users traditionally install software - from untrusted sources or by downloading them directly from a vendor’s website then manually installing it.
UAC would be just fine if it was a rare thing to see, but because of this “download a .exe > double click > install” flow users see it all the time, which defeats the purpose of the warning. It became just another half-measure Windows has implemented.
And it’s unhelpful because it doesn’t give any details about what it wants to do with that admin access and also treats permission for one action as permission for all actions (not that you can tell what they first action you’re permitting is).
I like the way android does it, where you can grant or revoke special permissions by category of action.
Though the system I’d like to see is one where each program is sandboxed and then even you close the program (or it prompts for an elevation), then you get a list of system differences between the sandbox and your system and can choose whether and which changes to push from the sandbox env into the main env. Or to combine sandboxes so that programs can interact with each other.