i explicitly said "if the user executes ... they're powned" and never said anything about "running". you're implying i'm taking far more risk than i am
i'm trying to understand (and minimize, if needed) the automated risks of having untrusted files *stored* locally, which would give me time to read them and develop a level of trust
fwiw, if i need to run something untrusted, i'm using #2 some, but mostly:
4. a 2nd (untrusted) machine running locally, which is beefier than my laptop and also used for benchmarking.
i've never seen any unusual behavior from it, but treat it as though it's compromised
i'm trying to understand (and minimize, if needed) the automated risks of having untrusted files *stored* locally, which would give me time to read them and develop a level of trust
fwiw, if i need to run something untrusted, i'm using #2 some, but mostly: