> Certainly! That is not the point, however. The point is that users of OTHER 
> 'application domains' have better security with a VM (or one of the other 
> approaches discussed) because THEIR environment has no ability to interact 

                                                      ^^^^^^^^^

How do you know these 'VM' enviroments provide that gaurantee?  You
don't.  You don't know, and you are not even qualified in the least
to judge if they are able to gaurantee that.

> with the OTHER environments. The digression into VM vs. separate machine 
> vs. compoud vulnerabilities is totally tangent to the original topic, and, 
> while educational, is certainly no longer productive at this time.
> 
> I strongly suggest that we all retire with a lot of good information on 
> vulnerabilities and an agreement that there are different methods for 
> addressing security problems.

You're just a system administrator who sells his services to gullible
clients.

Can you please stop talking like you know anything about how
secure products are built or judged?

Reply via email to