So, I just got into the art of Scambaiting. Up until now I just got up to the point before remote access.
Recently I wanted more and I setup a VM on my old laptop and wasted more time from scammers.
Are there any dangers if they get access of the virtual machine? What is reccomended after the call ends and the remote access is stopped?
Thanks in advance.