>(I think >using the printer is not advisable - the output is not really so >immutable after all - JUST reprint the modified content will do. >Similarly for WORM storage medium - just write into another CD.) In these systems, the untrusted person doesn't have physical access to the medium, though he has total access to the interface for adding data to it. One example would be where the untrusted person is a hacker from the Internet. Another would be where the medium is in the possession of an independent auditing firm. WORM storage media is actually of little interest these days for security since you can accomplish the same thing with programming -- as long as the untrusted person doesn't have any access to the storage except a communication wire, the server can make data immutable even while using ordinary disk drives -- if you have enough confidence in the engineering. -- Bryan Henderson IBM Almaden Research Center San Jose CA Filesystems -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html