At 02:25 PM 1/11/99 -0800, Mark S. Miller wrote:
>With what permissions do ISPs normally run CGIs? Would they enable a
>Vat/CGI to checkpoint itself between requests? Note that the checkpoint
>file contains secrets that must remain inaccessible to other unprivileged
>users of the ISP.
[?] Why does the VLS checkpoint?
[?] What secrets?