What's up, people? Compatibility should be equivalent to the architecture being used. Whatever the scenario, there will always be the necessity of creating layers of abstraction for security. One could create a jailed/chroot environment for the compat layer. The next step would be creating a virtual and headless machine. SSH keys would need to be created. Create files in other jailed environments. Connect to the jailed environment from the desktop.
Yes, that is a lot, and, just on one side. People use the excuse of, "I need an incentive." No. You are going to do it when you want. Anyway, may all of you have a blessed and goodly day.

