How is that “private”? You would need to encrypt the memory somehow, but then the key to that is also somewhere in the cloud’s software/hardware… Afaik there is no possible way to make a truly private remote VM
If your threat model involves spying on that level, sure, self-hosting at home is probably warranted. What I mean is that I’d rather have one powerful computer and the rest, laptop, phone, etc, use that resource instead of each device being an island. I don’t want my files spread out over so many devices, I want access to everything from everything.
How is that “private”? You would need to encrypt the memory somehow, but then the key to that is also somewhere in the cloud’s software/hardware… Afaik there is no possible way to make a truly private remote VM
If your threat model involves spying on that level, sure, self-hosting at home is probably warranted. What I mean is that I’d rather have one powerful computer and the rest, laptop, phone, etc, use that resource instead of each device being an island. I don’t want my files spread out over so many devices, I want access to everything from everything.
Private if you trust the provider. Any system can be breached.