Securing VMs: Security Through Purity — Bypassing the Red Queen | Dark Hacker News