I am little confused about this project. What requirements the project
doesn't meet if we use any of these 2 methods

By simply adding ACL?
By separating the code in to privileged part and unprivileged part and
using DBus to communicate the privileged part with unprivileged one ?

Regards,
MohanaSai Cherukuri
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to