
Mark Trickett via luv-talk wrote:
Therein is the issue with Microsoft, whomever has access, local or network, has total freedom to do as they please, for good or ill. Migrate him to a limited account on a Linux box, that can mean only his account gets compromised, and then primarily the data rather than the OS.
This is not true. It's entirely possible to run a Windows system as a non-privileged user. Doing a privileged action, such as opening Resource Manager, or installing software, requires you to type in the password for a privileged user. This is equivalent of sudo or polkit. I *think* Windows still gives the first created user the ability to run this as as admin *without* typing in a password, by default, but you can always just make a "admin" user first and a "dad" account second. Regarding Evil Maid attacks (i.e. "local access"), Microsoft Windows has a full "trusted boot" chain available, but in a desktop computer is probably off by default. It is definitely a pain to get going, but doing the same thing with Linux is no less painful.