It really isn't intended to protect from much of anything, that is the main issue with it. I am pretty sure ESX products are actually for paravirtualization, where as vmware workstation etc are full hardware virtualization. You are confusing I have only been studying computer security for about six years, but I do find it unlikely that you have ever worked in the computer security industry. And it will not, which is the issue Actually you did make claims about the DEA and the NSA. I didn't ask for specific details I just am curious which sort of work it was, SIGINT, COMINT, MASINT, etc. I don't think anyone will kill you for saying that will they?! ASLR and a 64 bit OS are at least highly suggested if you want to avoid being pwnt by the nth buffer overflow vulnerability in whichever applications you use. Yes we know you don't think your VM is secure from hackers, that is why it is strange to market it as a security oriented VM. You also have implemented its other security features poorly, and many of them are just eye candy that serve no real security function. Scanning for malicious tracking cookies and generic spyware is essentially useless for serious security, but being immune to buffer overflow vulnerabilities in all of the applications you run seems like a pretty necessary thing to me. 1. They will root the guest VM and dump the key from memory there? After all the guest VM has the network facing applications that they can target already running inside of it. 2. If the key is in the guest VM memory it is also in host VM memory 3. They have much more than 5-6 seconds to forensically analyze the RAM after power is cut 4. I don't think you can likely pull the plug before they restrain you And all of the tools are more or less the same on Windows or Linux. The more you pound on the keyboard the more I see you are either delusional or an epic troll I have no idea because you have not demonstrated any security know how, all you have demonstrated is the ability to install some random stuff (shit) and what is required for SR on Windows XP. It is a shame if you are being paid to do anything related to security, but not that surprising. Most corporate security people blow. When it is used as a checksum AES-256 has had its security substantially reduced, I think there was also an attack that caused significant damage to it when used as a symmetric encryption algorithm, however there are no known cases of AES-128 or higher being directly broken. You can spout off bullshit uncited claims and say you have secret inside info all you want, but at the end of the day it just makes you look like a fuckwad. Citation, technical details, or shut the fuck up, to put it nicely. 1. They will analyze the virtual drive looking for the leak 2. Things in guest memory also must be in host memory I doubt that I can decrypt anything you send me that has been encrypted with a strong algorithm. I also doubt that the NSA can. You are the one claiming that AES-256 can be cracked, not me. HVM and full hardware virtualization are not the same thing, you can have full hardware virtualization via binary translation without using HVM. This is the way the terms are very commonly used anyway, technically I believe that binary translation is not actually full hardware virtualization, but virtualbox is still called full hardware virtualization even if it isn't getting hardware support from the CPU. This product will not keep you safe from FBI and is unlikely to keep you safe even from many state and local agencies.