I am little confused about this project. What requirements the project doesn't meet if we use any of these 2 methods
By simply adding ACL? By separating the code in to privileged part and unprivileged part and using DBus to communicate the privileged part with unprivileged one ? Regards, MohanaSai Cherukuri
___________________________________________________________________________ Sent via: Wireshark-dev mailing list <wireshark-dev@wireshark.org> Archives: http://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe