Popek and Goldberg virtualization requirements

Ryan Carboni ryacko at gmail.com
Sat Sep 2 17:28:56 PDT 2017

43 years ago, virtual machines were first envisioned.

Now there are more malicious versions of the Morris worm.

I'm not sure if this essay is still accurate:

but Micah Lee clearly doesn't understand it:

If that attacker gets the ability to run programs of their choice on your
> computer, as they often aim to do, they have access to all of your files.
> They can start logging your keystrokes, taking screenshots, and even
> listening to your microphone and watching through your webcam.

There appears to be a widespread failure in communicating current
vulnerabilities as a result of current features, thus preventing people
from making informed decisions on various topics.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1333 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20170902/83c4973b/attachment.txt>

More information about the cypherpunks mailing list