Fair point. Though tbh I still think the user-isolation security for Linux is only really suited for the University/company threat model, where you generally trust users not to actually use exploits because they would get expelled/fired.
If you allow a completely untrusted user onto your system I think your chances of staying secure are low.