After defensive programming techniques and before attack method mitigations, the least privilege principle is our strongest weapon against exploitation. Much...