Does /g/ monitor the use of all sensitive or otherwise privileged commands on their systems?
No, I don't share my computer with my mom.
No. At work, sure, we have tons of monitoring and auditing setups for security. At home where it's just me and requires a key to get in? No, no point.
>>62339558
If someone could use privileged commands they could bypass your logger.