Martin v. Löwis wrote: > Well, if you were to create a hierarchy of proxy objects for "remoting" > objects across different interpreters, Then you have the problem of bulletproofing the proxy objects, and somehow convincing yourself that nothing other than proxy objects can leak across. -- Greg