Been browsing the internet using VM's for years but available hardware is getting too old for this and now the host will have to be used for browsing, with browser sandboxing or even system sandboxing (deepfreeze).
If all personal data is kept encrypted in a VM from now on, and this VM has no access to the internet, and the host gets infected or owned by a hacker, then how can the host infection be prevented from spreading to the VM?
Can a hacker's keylogger running in the host make a recording of what I am typing inside the VM? And therefore steal the password typed to access truecrypt-encrypted personal data in the VM?