To exclude this case, it is not enough to prohibit shared variables,
file access and network
access.
Function call between Jack's module and Jill's module must be
prohibited as well.
More precisely, the implementation of jackstart and jacksturn can not
call any function
implemented in Jill's module, and conversely.