If you’re relying on someone else’s computer to keep your data safe, don’t be surprised when they use that data as a hostage to demand more money. Sure, using other peoples’ computers to host your infrastructure can make a lot of sense. Just be sure you have a backup plan for when they send Guido around to demand more money.
If you’re relying on someone else’s computer to keep your data safe, don’t be surprised when they use that data as a hostage to demand more money. Sure, using other peoples’ computers to host your infrastructure can make a lot of sense. Just be sure you have a backup plan for when they send Guido around to demand more money.