Security in Plan 9

Each computer running Plan 9 has one user id that owns all the resources on that system — the scheduler, local disks, network interfaces, etc. That user, the host owner, is the closest analogue in Plan 9 to a Unix root account (although it is far weaker; rather than having special powers, as its name implies the host owner is just a regular user that happens to own the resources of the local machine). wayback

.

We are likely to search for this page with phrases like "plan9" and "no root user".

We wonder if the insight from security concerns in a distributed operating system might be useful background knowledge for security things in federated wiki.