Ah, there was materials posted in the case directory.  You  didn't 
indicate that.  I suppose I should have checked there first.

There are still some security concerns though, as fakeroot seems to use 
TCP sockets for communication with faked.   I'd like this to be more 
explicitly spelled out.  One can imagine subverting this channel to 
alter the package contents (I'm not sure how you'd use this -- to change 
ownership of a file... could it do more worse things than that?)

What is the stability of the save files?

The --cleanup makes references to semaphores, but I don't see 
information about how those are used/created?  How is faked started?  
Automatically by fakeroot, or via some other scheme?

    -- Garrett


Reply via email to