http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion/posts/opsec/cloud_provider_adversary/index.html
If she had chosen a
bare-metal server he could cut the power, extract and refrigerate
the RAM sticks in order to retrieve the data, but such an attack
would be very conspicuous Alice’s threat model Alice is very happy with her new deployment.