^thehatsrule^
Group: Members
Posts: 3275
Joined: July 2006 |
|
Posted: Mar. 25 2008,16:30 |
|
Just for discussion's sake: If you run something under a host OS, I would think that you would still be vulnerable to malicious code from the host, such as software keyloggers. Then again, there may be a hardware(?) keylogger. Or subject to phishing due to redirection by some network proxy, etc. I would not be surprised if people hard reset public machines after use just to clear volatile memory, heh heh.
IMO, it just boils down to trust and your personal paranoia :P
|