Other subs in the v/Pizzagate network:
v/pizzagate - The main investigative subverse.
v/pizzagatewhatever - Anything Pizzagate-related goes
v/pizzagatememes - All pizzagate memes
v/pizzagatemods - Meta discussion/ discussion about Pizzagate moderation
SUBVERSE RULES
Rule 1: All Submissions must be about pizzagate or the pizzagate investigation. Off-topic submissions will be deleted.
Rule 2: Submissions should be questions, or answers to questions.
Rule 3: All answers must be sourced, and those sources must also have citations. We encourage the self-moderation of this rule by asking subverse members to actively downvote posts which do not have proper sources for their claims, or which are misleading in nature.
Rule 4: No spam. Duplicate or multiple posts (posts with the same title/with the same postbody/which link to the same page) and spam will be deleted.
This is not necessarily a place to bring all topics which have been deleted from v/pizzagate. If your submission had been deleted just because it was an unsourced post and was a question, then you can probably post it here and get an answer. If you are asking about debunked leads, post at your own risk.
view the rest of the comments →
[–] the_sharpest_knife ago
Can always use a virtual PC.
https://www.virtualbox.org/wiki/VirtualBox
http://www.vmware.com/products/player/playerpro-evaluation.html
https://www.sandboxie.com/
[–] facevalue 0 points 1 point 1 point (+1|-0) ago
VMs can certainly be used for convenient sandboxing and isolation but in the past there have been exploits that provided processes on the VM access to the physical hardware and host OS. I assume that similar vulnerabilities are known but remain unpublished today. Of course I'm going full blown tinfoil hat here - using a VM in this scenario would probably be fine.
[–] the_sharpest_knife ago
It's cool there are plenty of reasons to be paranoid. I'd go with it, but the lazy guy inside me would just use someone I don't like's computer.