https://en.wikipedia.org/wiki/Popek_and_Goldberg_virtualization_requirements 43 years ago, virtual machines were first envisioned.
Now there are more malicious versions of the Morris worm. I'm not sure if this essay is still accurate: http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html but Micah Lee clearly doesn't understand it: If that attacker gets the ability to run programs of their choice on your > computer, as they often aim to do, they have access to all of your files. > They can start logging your keystrokes, taking screenshots, and even > listening to your microphone and watching through your webcam. There appears to be a widespread failure in communicating current vulnerabilities as a result of current features, thus preventing people from making informed decisions on various topics.
