[tor-talk] Benefits of Running TBB in a VM?

Roman Mamedov rm at romanrm.net
Sat Jul 5 17:45:12 UTC 2014

On Sat, 5 Jul 2014 10:05:10 -0700
Bobby Brewster <bobbybrewster203 at yahoo.com> wrote:

> >>>if your non-VM host system has been compromised, there is absolutely no
> >>>notable advantage to using a vm.  your vm will be affected by the
> >>>malware that sits on the host system.  
> I don't understand this. If my Ubuntu system has a virus / rootkit / whatever then what I do on it is compromised.
> The VM is, in effect, a seperate OS. How would it be affected by the malware on the non-VM system?

First of all, malware at the host OS can capture and log all keypresses you do
in the VM system; can also make screenshots or video capture of what you do in
it, can also capture network traffic or even read memory of the guest VM.

Second, there is the issue of trust; your host system has unrestricted access
to the entire disk of all guest VMs it runs. If your host executes malicious
code, you can't be sure that your guest VMs haven't been accessed and tampered
with in some way. On the contrary, you should assume they HAVE been
compromised by the infected host.

With respect,
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140705/47ec3cff/attachment-0001.sig>

More information about the tor-talk mailing list