I actually appreciated the article offering another conclusion as the author did clearly indicate the originals papers conclusion. This isn't the first time papers using data from this study(https://dunedinstudy.otago.ac.nz/) has lead(excuse my pun) to controversial conclusions.
It is worth noting that McGill has over 60% of students coming from outside of Quebec so this doesn't have much to do with Quebec's education system.
http://www.mcgill.ca/about/quickfacts/students
But the article is about creating good educators, the problem is't the students coming in, it's the ones coming out of that education program, who will eventually become teachers. The problem is the program.
I first heard a variant of this story about 30 years ago, either a lot of kids killed themselves jumping out of windows on acid or it's an urban legend.
From what I can tell one of the exploits allows for code execution with root privileges, another for accessing kernel-space memory and the third will crash the machine. Are any of these things not already doable when someone has physical access to the machine?
They aren't remote code execution exploits as best as I can tell. But, it's a short leap from an exploitable root escalation to total compromise of a machine. Until these are patched, any executable you download and run could potentially be a dropper for much nastier stuff. You could combine one of these with the recently-disclosed Flash exploits, for example, and you have a drive-by root exploit ready for deployment via ad networks to millions of people.
If only humans could agree on what makes things beneficial to themselves. Are self-driving cars and rockets to Mars beneficial to humanity? Depending on how you look at it the answer is both yes and no.
It shouldn't be a struggle at all just be conscious that freeBSD does not try and protect the user from him/her self. Case in point, "kill 1" won't do anything on linux but in freeBSD it will kill the init process.