On Sat, Sep 2, 2017 at 8:28 PM, Ryan Carboni <rya...@gmail.com> wrote: > https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements > 43 years ago, virtual machines were first envisioned. > > Now there are more malicious versions of the Morris worm. > > I'm not sure if this essay is still accurate: > http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html > > but Micah Lee clearly doesn't understand it: > >> If that attacker gets the ability to run programs of their choice on your >> computer, as they often aim to do, they have access to all of your files. >> They can start logging your keystrokes, taking screenshots, and even >> listening to your microphone and watching through your webcam. > > > There appears to be a widespread failure in communicating current > vulnerabilities as a result of current features, thus preventing people from > making informed decisions on various topics.
What is this subject? Investigate Xnest or separate VT's displays for isolation...?