While I know it's useless in practice as such system won't be usable, can't be fixed, no apps can be installed...etc but I would like to know is it possible to have an OS that has no root at all.
Assuming I use the chroot environment via cubic to do the following:
Create a normal user with addusr (without adding it sudo).
Modify the user root in /etc/passwd to
`root:x:0:0:root:/root:/sbin/nologin
Remove the first line in /etc/shadow.
remove the gnome-terminal
Use full disk encryption
This leaving the system with only one non-sudo user.
Will there be any way to run commands, execute .sh scripts, install apps or do any harmful actions? in this case is logging in as root completely impossible?
Thanks in advance
sudo
when you can login as root while booted from USB. That's the point, if someone has physical access to the machine it just depends on the knowledge and effort of this person how far (s)he can go. Also there are unencrypted parts, bootloader for example, one could do something malicious over there. True is, the harder you lock up the system, the harder is it to crack it, I'd say that's out of scope of normal users. In your described case the user is able to run commands or sh-scripts but restricted to harm data he has write-access to. – mook765 Aug 21 '19 at 15:28