First of all, this would violate Debian Policy; packages are NOT supposed to install any files to a user's home directory, and debhelper and associated tools for Debian packaging do not have the capability to do so while retaining such files in APT's control. Second of all, this would violate the Filesystem Hierarchy Standard (http://en.wikipedia.org/wiki/Filesystem ... _structure
). In addition, package handling by APT is always done with root permissions, and as such, you would end up with root-owned files within an user-owned directory. This is not technically feasible, it is highly unlikely to ever be implemented, nor is it actually desirable at all.
Install packages with user privileges (as opposed to properly doing so with root privileges) is highly discouraged; it's possible, (see http://askubuntu.com/questions/339/how-can-i-install-a-package-without-root-access
; read the first post carefully). Yes, you can run programs and executables from your Home directory (assuming your Home partition isn't marked as "noexec" in /etc/fstab), but do not expect APT to cooperate with you. As a side note, I remember that Fedora 12 initially let users install software without the need for root privileges; this provoked such an outcry that the decision was reversed (see https://bugzilla.redhat.com/show_bug.cgi?id=534047
). I'll quote a H-Online article here...(http://www.h-online.com/open/news/item/ ... 63623.html
The change has upset many who believe that this is opening up the system to a new range of possible attacks, from a denial of service by just installing as much software as possible to fill up the hard disk, to a privilege escalation exploit where an attacker could download a package from a repository which has a known vulnerability and then exploiting that vulnerability. Some Fedora developers say that these scenarios are mitigated by the fact that the user must be on the physical console of the system for the privilege to be automatically granted and that the change only affects the desktop versions of Fedora 12. Other developers have pointed out that this could still allow for an attack, for example, where the user's browser is compromised, allowing the attacker to then attempt to install a vulnerable package and use that to get administrator privileges.
I cannot stress how dangerous it would be to allow software to be installed within a package manager and integrated with the rest of the system, without requiring root privileges to do so.