But what if the attacker is the one contacting Amazon to shutdown everything? Do you want your business shut down by random teenagers calling Amazon, telling them to shut everything down?
Well, at least you'll still have your data.
As you may or may not have noticed from my slashdot id
I'm on beta and can't see the id, you insensitive clod!
Desktops aren't the intended audience for x32. This stuff is for very specific scientific compute jobs that are pointer intensive (i.e., graphs etc). You won't see GNOME/KDE/whatever packages for this architecture.
The popularity of this arch won't manifest itself in general purpose software packages: most computation will be in one-off custom programs that are never released. That doesn't mean this architecture isn't popular, it just means you're using the wrong metric.
Over the last year or so I've played around with blocking the referer header from being sent at all, to any websites. 99% handle this just fine, but every now and then I'll come across sites that fail, and in various ways.
That's why I modified smart-referer to send the requested URL instead of no referer at all for 3rd party URLs. That evades most checks.