At 02:25 PM 1/11/99 -0800, Mark S. Miller wrote: >With what permissions do ISPs normally run CGIs? Would they enable a >Vat/CGI to checkpoint itself between requests? Note that the checkpoint >file contains secrets that must remain inaccessible to other unprivileged >users of the ISP. [?] Why does the VLS checkpoint? [?] What secrets?