21.03.2012 03:50, Ben Hutchings wrote:
So why do we need this as well as fakeroot?
For example, this program can be easily used to run an untrusted or buggy blob relatively safely. How can I do this using only fakeroot?

Ivan.



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to