Zan Lynx wrote: > Good precautions, but if the attackers have root, they can use debugfs > on the block device if they have to. If your drives have it, you could > set the hardware read-only pins :-) Or cut the cable. (No, not the entire cable! :-) I thought one wire controlled read/write, but maybe I'm thinking of an older technology.)