@micahflee @iwastux @dangerzone
Phoning home is important, but Phoning the host (which _could_ also be restricted) would be necessary, otherwise, the host could Phone home.

The exploits would also have to be linux and win32 (likely individually written) so it would be a more sophisticated situation, but putting a docker image as a safe box in a live workstation seams a bit error prone.