Ah, there was materials posted in the case directory. You didn't indicate that. I suppose I should have checked there first.
There are still some security concerns though, as fakeroot seems to use TCP sockets for communication with faked. I'd like this to be more explicitly spelled out. One can imagine subverting this channel to alter the package contents (I'm not sure how you'd use this -- to change ownership of a file... could it do more worse things than that?) What is the stability of the save files? The --cleanup makes references to semaphores, but I don't see information about how those are used/created? How is faked started? Automatically by fakeroot, or via some other scheme? -- Garrett