Examining any PC or server hosted on the machine, itwould appear that the machines were hosted normally by a hypervisor, but, she argues, itwouldbe tough to detect another hidden hypervisor intercepting data or manipulating the virtualized computers.