Also can I please get a link to that thing about truecrypt not being secure in a virtual machine? I can not find anything about it anywhere. I think you may have misinterpreted something talking about hidden containers as being related to virtual machines. Also I do not think you are a retard. I am glad to see people who know a thing or two about computers and security here. However, I disagree with your opinion, even though it is based on the opinion of a computer security expert. My opinion regarding virtualization is also based on the opinions of computer security experts. In the end you should do what you think is best. I think using *any* isolation to keep network facing applications away from the external IP address is a good idea, even if it means using full hardware virtualization. I also think you are going to be better off if you use paravirtualization or OS virtualization to accomplish the same goal. Thank you for teaching me something new about computer security and giving me the information/motivation required to improve my security (because now I recognize that I should be using paravirtualization instead of full hardware...I never really thought of this before because I never realized full hardware virtualization had these security issues before, although I did recognize by myself that paravirtualization and OS virtualization would largely/totally avoid the security risks Theo/you pointed out to me, and I also got this realization confirmed by experts). It is very rare for me to learn something new about computer security on underground forums these days. So good job you presented evidence and documented information / citations and you managed to increase my security and get me to suggest others increase their security as well. If we still disagree on the technique (virtualization) in general makes no difference to me, because I am still in support of it and now I know how to do it even better than before (even if you and Theo still think it is a technique only used by retards, at least I know several other expert level computer security people share my opinion as well!). This is the type of debate I want to see on this forum. This is constructive. I don't want to argue with fucking retards who say you shouldn't use GPG, I want to argue with people who know what they are talking about and can help me to increase my security even if I disagree with their strategy / the conclusion they come to after examining the documented objective information related to the topic. When people come to different conclusions based on documented objective information, it is much better than when people make random shit up without even attempting to analyze/understand any material and talk out of their assholes.