[1]https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requ irements 43 years ago, virtual machines were first envisioned. Now there are more malicious versions of the Morris worm. I'm not sure if this essay is still accurate: [2]http://theinvisiblethings.blogspot.com/2011/04/linux-secur ity-circus-on-gui-isolation.html but Micah Lee clearly doesn't understand it: If that attacker gets the ability to run programs of their choice on your computer, as they often aim to do, they have access to all of your files. They can start logging your keystrokes, taking screenshots, and even listening to your microphone and watching through your webcam. There appears to be a widespread failure in communicating current vulnerabilities as a result of current features, thus preventing people from making informed decisions on various topics. References 1. https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements 2. http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html