What exactly should they do if they discover the presence of a VM? I don't think running an VM could be enough to make someone cheating.
It's interesting to look at, but all of these methods of detection are easy to beat once hackers are aware of the methods. Constantly adding new layers at least prevents simple cheats from spreading too widely, but people with the right knowledge/connections will always be able to cheat
|