Yeah, I'm not going for foolproof here. I understand that GRUB (or whatever bootloader used) could still get zapped. However, that would leave only one small piece of software vulnerable on the system as opposed to all of it. I think most projects don't do anything to protect against this - if you get hit, just put in another HDD).
I'm trying to see if there is a relatively easy way of protecting a huge majority of the SW loaded on the disk. And since disk space isn't an issue and TC is so small, redundant copies would work well, the problem is just how do I figure out if a different copy is needed.
The fallback option is interesting, but not exactly what I'm looking for. There could be a problem in an executable that doesn't prevent the kernel from booting correctly but would still make the system useless. A boot time check would be best because it would check all of it.