John Hasler wrote: > I wrote: > > Then the sponsors just have to acquire access to the appropriate machines. > > Frank Küster writes: > > root access? Sole root access? > > That's a different question, isn't it? If you don't trust the machine's operator, then even root access isn't good enough. If you trust him, the DD/non-DD distinction is moot. Thiemo