Security through obscurity just hides the fact that base system is actually less secure, the users being deceived. Have you ever read Android security docs and bulletin? Whonix docs? Qubes docs? Windows security docs? Do you even know the things I'm talking about? Probably not. You're just like "our permission model is best and prevent all security vulnerabilities from happening" ignoring how vulnerable is having xorg installed, the /proc leaking information, lack of strong sandboxing, moreover a compromised non-root account with sudo equals full root permission and your permission system won't help. We're talking about security model dude not permission model, they might have a tiny overlapping but dude they're not the same thing.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
Security through obscurity just hides the fact that base system is actually less secure, the users being deceived. Have you ever read Android security docs and bulletin? Whonix docs? Qubes docs? Windows security docs? Do you even know the things I'm talking about? Probably not. You're just like "our permission model is best and prevent all security vulnerabilities from happening" ignoring how vulnerable is having xorg installed, the /proc leaking information, lack of strong sandboxing, moreover a compromised non-root account with sudo equals full root permission and your permission system won't help. We're talking about security model dude not permission model, they might have a tiny overlapping but dude they're not the same thing.