The document proposes a system to provide rapid recovery from cyber attacks and protect user data on computers. The system would use virtual machines (VMs) and isolate user data and applications in separate VMs. It would allow automatic checkpoints of system state to enable rollback to a trusted state if an attack is detected. The proposal outlines a prototype architecture, evaluates defenses against common attack categories and behaviors, and provides a plan to construct and integrate separate VM components for network and file system monitoring and control.