Recently I was reading up on various security strategies and one that has been around for a while but is starting to gain traction now is working within a VM on your desired OS. If that VM ever gets compromised you can simply revert the system back to date and time you know it was in a healthy state or even delete the entire VM and start again.
This sounds simple enough and so there are OS's that build and expand on this VM idea like Qubes
While reading the info page on Qubes I came across a section that mentions the following:
VirtualBox or VMware Workstation are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.
From that statement I am getting the idea that if I do everything, and I mean everything on my VM and only use the host OS for running VirtualBox and nothing else; is it safe to assume that my host OS won't be able to get corrupted? Or can a hacker identify fairly easy that they're inside a VM and work their way into my host OS?