Security Properties of Virtual Remotes and Spooking their Violations