I know there are some configurations that manage to disguise themselves as a real machine. I would like to look into that as it could be very useful. At the same time, I also wonder how deep the kernel level whatever go into my personal device.
dead man switch
It probably wouldn’t work out for the spyware that doesn’t want you running a VM for “anti-cheating” purposes.
Better to move them to something more private at the very least. Then we can slowly heal their addiction through in-app propaganda and purposefully declined algorithm performance over a long period of time.
thought it said Electric EP