That is no longer the case and hasn't been since FreeBSD 11.0-RELEASE. It's one of the new System Hardening options available during the installation process I personally advise to disable in my tutorial by setting the following variables, in addition to setting others manually later on:In the land of red devils known as Beasties exists a system devoid of meaningful exploit mitigations. As we explore this vast land of opportunity, we will meet our ELFish friends, [p]tracing their very moves in order to hijack them. Since unprivileged process debugging is enabled by default on FreeBSD, we can abuse PTrace to create anonymous memory mappings, inject code into them, and overwrite PLT/GOT entries. We will revive a tool called libhijack to make our nefarious activities of hijacking ELFs via PTrace relatively easy.
https://forums.freebsd.org/threads/...-set-up-a-freebsd-desktop-from-scratch.61659/Disable reading kernel message buffer for unprivledged users
Disable process dubugging facilities for unprivledged users
Ramndomize the PID for newly created processes
Insert stack guard page ahead of the growable segments