

Lot of people will tell you something like “don’t run stuff aS rOoT” but from personal security POV root is almost irrelevant. Potential attacker can do plenty of damage without root.
root only allows crossing boundaries of the current user, but for personal use, everything you care about is probably 100% accessible under your normal user account. You don’t need root to steal your photos and passwords, you don’t need root to shimmy a daemon in your ~/.profile to start every time you log in, you don’t need root to mine shitcoins, use your machine as part of botnet or whatnot.
Good advice is to vet everything you install, or choose a third party to vet it for you. In ideal world,
- choose a stable, well-maintained and up-toodate distro with a good reputation,
- limit installing software from official sources only. …and you’re probably going to be fine.
In less than ideal world, maybe add flatpak to the mix but assume that the repository is a wild west. Running AppImage apps or installing third-party .deb/.rpm/etc. packages, again, if you trust the source, you trust the source.
(But for f’s sake, don’t just run curl | bash scripts (with sudo or not) from random github repos and stuff.)










Does your shower happen to be built on Indian burial ground?