The technology works by creating a secure remote execution environment between users and malicious content.