how are cloud computing providers not instantly hacked, like if someone told me they were running a service where an untrusted person could run arbitary code on their computer I'd expect by the end of the first day that it would no longer be -their- computer

Sign in to participate in the conversation
Mastodon

a Schelling point for those who seek one