You are viewing a single comment's thread.

view the rest of the comments →

0
1

[–] facevalue 0 points 1 point (+1|-0) ago 

VMs can certainly be used for convenient sandboxing and isolation but in the past there have been exploits that provided processes on the VM access to the physical hardware and host OS. I assume that similar vulnerabilities are known but remain unpublished today. Of course I'm going full blown tinfoil hat here - using a VM in this scenario would probably be fine.

0
0

[–] the_sharpest_knife ago 

It's cool there are plenty of reasons to be paranoid. I'd go with it, but the lazy guy inside me would just use someone I don't like's computer.