1 1 10.2 Security 1 ============= 1 1 In some cases 'tar' may be used in an adversarial situation, where an 1 untrusted user is attempting to gain information about or modify 1 otherwise-inaccessible files. Dealing with untrusted data (that is, 1 data generated by an untrusted user) typically requires extra care, 1 because even the smallest mistake in the use of 'tar' is more likely to 1 be exploited by an adversary than by a race condition. 1
1 · Privacy · Integrity · Live untrusted data · Security rules of thumb 1