On Thu, 14 May 2020 12:33:59 -0700
stan via users wrote:
> These are meant to
> be silos, but this attack would allow someone on one virtual machine to
> capture data of another virtual machine running on the same core.
This gives me a naive idea.
Is there any way to force the VMs to run on an isolated core ? The VM
and OS must not run on the same core, if this is enforced, then
according to what you say there might be sufficient containment of the
breach.
Am I correct ? Or am I speaking nonsense ?
--
Regards,
Sreyan