Popek and Goldberg virtualization requirements
ryacko at gmail.com
Sat Sep 2 17:28:56 PDT 2017
43 years ago, virtual machines were first envisioned.
Now there are more malicious versions of the Morris worm.
I'm not sure if this essay is still accurate:
but Micah Lee clearly doesn't understand it:
If that attacker gets the ability to run programs of their choice on your
> computer, as they often aim to do, they have access to all of your files.
> They can start logging your keystrokes, taking screenshots, and even
> listening to your microphone and watching through your webcam.
There appears to be a widespread failure in communicating current
vulnerabilities as a result of current features, thus preventing people
from making informed decisions on various topics.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 1333 bytes
Desc: not available
More information about the cypherpunks