Privilege separation[1], most likely. If your system needs to do three things, it could either just do all of them using a single executable requiring all three permissions (thus also theoretically allowing an attacker to use it to do all three things as well) or split your system into three executables, each only having the permission to do one thing (thus reducing the amount of potential damage).[1]: https://en.wikipedia.org/wiki/Privilege_separation
ape4|1 year ago
crest|1 year ago
Brian_K_White|1 year ago