In short, TCL is currently of no use for any production/critical level installations - if we should not mount even our HDD - then we should be just happy with TCLs experimental value !
Note I wrote "connected" and not "mounted." Mounting is no problem if anyone gets in as users tc or root, whether local or remote. The only safe media is disconnected.
Experimental? It's fine for nomadic/portable use. I only use TinyCore from USB even though I still have it installed on my Aspire One's hard drive (Liinux has proven utterly unusable with Atheros time outs and I grew wary of trying to sort out if it was with the Atheros drivers, WPA, or the card itself -- which functions flawlessly under XP so I only use XP). It's quite fine for a portable system. If you want enterprise-level Linux, you need something which is branded and -- most importantly -- supported as such. That means SLED and RHEL (and its clones, e. g., Oracle Unbreakable Linux, Scientific Linux, CentOS, etc.). I'd include Debian since it isn't tied to a fixed release cycle and has a fairly length support cycle, but that's only relative to other distros that focus less on security/stability than bleeding edge release numbers. FWIW, I'm currently using Scientific on my "new" laptop and also my desktop and am quite happy with it even though it's not bleeding edge (it's well-patched, though, with SL's security patches coming <= 48 hours after RH's).
Very Important & clever thinking - I think , but then w/o these chit-codes TCL may be paralysed - is not it ?
Thanks and I concur with your kind words. I like to think I'm very important and that my thinking is clever.
The answer to your question: No. The user should always have the final say in how it functions on his own hardware. The compromises I pointed out aren't "limitations" or vulnerabilities or necessarily bad. TCL's philosophy is to be portable and modular. Those are things a user can un-do on his own but are necessary compromises to allow users more control over how things work. The very things that make things easier for users -- things like "sudo su" and cheatcodes -- are also things that make it easier for others to affect your system.
I agree with Jason that other traditional on-disk distros offer their own set of compromises by offering more security infrastructure if you can live with additional default services. Those are typically compromises that *do* matter in an enterprise/production scenario and the trade off is worth it. The "tightest" default install I've encountered is NetBSD's which requires the admin/user to even start SSH (OpenBSD's default is to start SSH unless the user says no at install). Most Linux distros are going to start a variety of default services which must then be shut down if the admin/user doesn't want or need them. TCL takes an approach I like better: if you know you need a particular service (CUPS, SSH, httpd, etc.) you're likely to set it up yourself.
Should we - the interested users demand more from TCL ?
Only if you make your own demands on your own hardware; if you think its default options are unsuitable for your intended use(s), remaster it so that it is. This is one of the great things about something as flexible as TCL. There's an annoying problem that pops up with nearly every open source project which manifests itself by suggesting something like "I need or want it to behave like this so the developers should implement this ASAP." What works for everyone else never matters when this problem pops its ugly head. Make it work on your own hardware or work with those who share your own peculiar needs, then offer your changes to others in the community.