2016-02-22 UTC
# aaronpk it's a tough one though. either you give the software write permissions to itself, which then means attackers have a higher chance of getting their bad software onto the machine, or you make it take a manual step that the user has to do to update the software so that it can't be attacked that way