▲ | rnhmjoj 14 hours ago | |
> A VM would bypass monitoring software installed on devices the person uses. Not really, no: a VM is just another userspace application and a monitoring software should be able to capture its traffic just fine. If he was also using a VPN, tor or conneting to a remote machine that's another story, but only saying he was using a VM doesn't really mean much. |