This repository has been archived on 2024-01-13. You can view files and clone it, but cannot push or open issues or pull requests.

31 lines
1.2 KiB
HTML
Raw Normal View History

2019-07-30 03:06:42 +00:00
<h1 id="win10" class="anchor"><a href="#vm"><i class="fas fa-link anchor-icon"></i></a> Use VMs for isolation.</h1>
<div class="alert alert-warning" role="alert">
<strong> When opening up insecure applications use a VPN!</strong>
</div>
<img src="/assets/img/layout/vm.jpg" width="367" height="369" class="img-fluid float-right" alt="virtual-machine-logo" style="margin-left:10px;">
<ol>
<li><strong>Choosing a strong hyperviser.</strong>
<ul>
<li>Use one that is [free software](https://www.wikipedia.org/wiki/Free_software) like QEMU</li>
<li>Stay wary of KVM as it can be a security flaw.</li>
<li>Choose one with managable settings like shared clipboard.</li>
</ul>
</li>
<li><strong>Choosing an OS.</strong>
<ul>
<li>View our [OS section](https://www.privacytools.io/operating-systems/) for information on OSes that respect your privacy.</li>
</ul>
</li>
</ol>
<h3>Related Information</h3>
<ul>
<li><a href="https://security.stackexchange.com/questions/73338/can-virtual-machines-be-used-to-isolate-vulnerable-software">VMs Have Flaws</a> - Security Stack Echange question "Can virtual machines be used to isolate vulnerable software?".</li>
</ul>