Comment Re:So now ... (Score 1) 5
Were you able to before? Obviously, "like everyone else" you'll be keeping it encrypted at rest with keys that are kept in an HSM. For the important "pet feeding habit data" you will have made an exception and actually bought your own HSMs, kept in your multiple highly geographically separated underground bunkers with limited on site compute and simply feed limited summary results back to the cloud. For less important "nuclear weapons test results" data you find some compromise where you can track which and for the "current location of warheads data" you might just decide that you take the risk because, you're just going to have to accept the risk of that data leaking anyway for other reasons, and cost of processing is a priority. That's why right data classification and appropriate handling is important.
Every computer you use you trust Intel, Infineon, Samsung and tens or hundreds of others manufacturers not to embed hostile radio devices or software on chips that phone home. That includes some companies that actually have added weird management systems against their users wishes. Apple (IIRC) have pubilcly had the situation where they threw away a bunch of mother boards that arrived for their cloud. I'm sure all of the others have too. What don't they spot?
Adding one more cloud provider doesn't really make things much worse that it was to begin with.