‘Where Does Cloud Storage Really Reside? And Is It Secure?’

Jan 23, 2017 · 83 comments
Ruchir (Seattle)
Is this serious??? The author writes this article and the next day joins for a position at Google Cloud! Of-course the cloud is safe... I think it was supposed to be a satire!!!
Elle (PST)
Thank you for this article! And there is a cloud storage you might want to check out: https://cryptocomes.com/has-storj-really-changed-the-principles-of-cloud...
MontrealInsuranceGuy (Montreal)
One of the most fascinating comment strings I have ever read on NYT. The physical location of servers, along with their security (both physical and cyber-security) is often overlooked and an important consideration. If your cloud provider stores your data in a foreign country you are exposing your business and your clients data to extra-territorial law. The Patriot Act is perhaps the best example of this phenomenon. Thinking (perhaps deluding yourself) that you have cost-free data storage is false. You are necessarily giving up privacy by using the cloud.
Amazon is currently building a significant data farm in Canada. This will expose Amazon's users to Canadian privacy laws and potentially Canadian criminal laws if you are using your data for nefarious purposes.
Reading and understanding your service agreement is important. In most agreements the provider is allowed to use third-party services or providers. So while you might have confidence in the brand of your cloud provider, their service is only as robust as the weakest of their providers. If that provider is housing their servers in say Moldavia well then you may be exposed to Moldavian law and having that government scrutinize your data.
VW (NY NY)
Rubbish. The author fails to point out that Google, for example, scans ever word of every transactions, and sells your profile. You identity is the product, and they sell you.
Yoda (Washington Dc)
is the information you put on the cloud still safe after many years, especially if the "cloud" company you are using goes out of business?
Jim Manis (Pennsylvania)
I was initially skeptical of the cloud, but when my Kindle died a few years ago, and I was able to retrieve all the books I'd purchased quite easily from Amazon's cloud, I recognized its relevance immediately.
cb (mn)
Yes, but are the clouds nimbus, stratus, cumulus? Or?
Eduardo B (Los Angeles)
Understand that the "cloud" originally referred to all of the backbones and associated networks. It meant that data could take essentially an infinite number of paths to its destination, where the packets of data are reassembled into the correct order and missing ones are requested from origin. The current term cloud is an extension of the original, now encompassing all data centers in each provider's inventory.

Eclectic Pragmatist — http://eclectic-pragmatist.tumblr.com/
Eclectic Pragmatist — https://medium.com/eclectic-pragmatism
koyotekathy (Phoenix, AZ)
I would like to suggest that the real reason for the cloud is that ultimately we will be unable to buy software programs on CDs or download them. We will have to use the cloud, where the programs will be based. In this way, they can prevent prirating of software, a problem since the very beginning costing the software companies a lot of money. They also do all the updating. It will totally out of your control.

In addition, you will have to pay a fee at least annually to use that software. Some of us have stayed with certain favorite programs declining the updates for years. Now we will have no choice.

These companies may not care whether we store or data there or keep it on our computers. They want to control access to their programs - their lie blood.

In the meantime, I use 2 external hard drives as my "clouds." But given what I said above, I still will lose the ownership of my software.
OSS Architect (California)
When experts talk about "data security", they also talk about "data integrity", and "disaster recovery". The general public would probably consider data integrity (protection from loss, deletion, or unwanted changes to data) as part of "security".

As comments here have pointed out, the legal framework surrounding cloud stored data is as primitive, as the technology is advanced. Only the EU and it's member countries have started to address the legal rights of data stored outside of the "owners" physical control. Our Federal government is currently pursuing Microsoft to force it to retrieve data stored in foreign countries, for access by the FBI and other US agencies.

As for traditional "security", (access control) Cloud storage access can be restricted to a known list of device ID's; that are hard (but not impossible) to spoof. When data is encrypted with a key that embeds the device identifier, then even large scale data breaches are "acceptable" because the data can't effectively be decrypted.

Corporate data security has a poor history because of low investment in cyber security staff, security software, system/intrusion monitoring, etc. At the scale of Cloud data storage, these are fully funded, because contracts for corporate data storage in the Cloud come with damages clauses, and some severe financial penalties; hence, in the Cloud, you have to secure the haystack, not the needles.
Jeremy (arizona)
I did appreciate the article because this is a question I have had. My personal view is that cloud computing is great for business as it is scalable. However, as far as personal info is concerned, regrettably, I am deeply skeptical about the willingness of major cloud providers and the big entities referred to in this article to put an individuals interests first. Yahoo grossly mislead its new owners and effectively all its user base. How many companies willingly collaborated with the NSA and other government agencies? Do we really want to trust corporate America with our personal data, pictures and such?
Barbara (sc)
I have my cloud data stored across multiple resources, the better to protect myself from hacking or computer failure. It works for me and there's enough of it that I pay nothing for the convenience.
Yoda (Washington Dc)
you don't pay for your hard disks?
MikeH (Upstate NY)
Why was the cloud developed in the first place? So these companies could develop big data that they can mine for whatever (usually commercial, profit-motivated) purposes they wish. The "service" they provide is really self-serving. Whatever you put into the cloud no longer belongs to you alone.
Markangelo (USA)
With all the wireless and blue-tooth connectivity
is not the data during transfer
actually floating in the cloudy air at times.
Certainly all those machines are not
securely joined by tough cables ?
To hack that one would need alligator clips;
the other just a receiver correct.
GCU (.)
"To hack that one would need alligator clips; the other just a receiver correct."

That depends. A properly configured wireless connection is ENCRYPTED. You can intercept the encrypted data, but you can't decrypt it easily. However, those "free" wireless access points that are everywhere are not secure, because the passwords are public information. In that case, you should use an end-to-end encryption method, such as a VPN.

BTW, "alligator clips" don't work when tapping fiber-optic cables.
Amanda (New York)
Yes, a properly designed cloud service can be more secure that conventionally storing data on your hard drives. Cloud platforms have multiple layers of redundancy and backups built in.

However not all clouds are the same,
The key consideration is privacy.

The big public cloud services have full access to all your files. It's 2017 and there are now secure solutions to this problem.

Take for example cloud storage services like Sync.com. They take a different approach. Your data is encrypted before it reaches the cloud and only you have the encryption keys.

It's important not to trade in security for convenience.
GCU (.)
"Your data is encrypted before it reaches the cloud and only you have the encryption keys."

That sounds good until you ask who supplies the encryption software that you are using.
AT (San Antonio, Texas)
So use your own software, like AES-256 obtained from an independent source, and generate keys of at least 128 bits using, e.g., SHA-512 on pictures taken with your non-online camera. Do this on a stand-alone computer and transport data between it and the Web-connected one on thumb drives.

Nothing can be guaranteed to be absolutely safe, but, short of NSA deciding to spend serious money attacking you, something like the above should be good enough.
M. L. Chadwick (Portland, Maine)
Nationwide censorship and attacks of Freedom of Speech may be in our future.

Call me paranoid, but heck, we really are under attack. With the Alt-right having seized power, anything from individual and group Facebook pages to the NYT website (and its apps) to individuals' ability to use search engines freely are at risk.

I hope Silicon Valley is hard at work figuring ways to circumvent these potential dangers, so Americans will be able to communicate freely.
Ray (London)
A cloud computer = someone else's computer. If you want to keep something really private, keep it on an offline computer at home, suitably backed up. And not a laptop with a non-removable battery and wifi !
Rob (Livermore, CA)
Related saying: "There is no cloud. There is only someone else's computer." (This was posted on the office door of one of our company's IT people.)
Frank Callis (Detroit)
"The Cloud". Marketed to make it sound like your files reside somewhere in heaven, being shepherded by the angels.

They're not.
Tony (Cambridge, MA)
Saying "your Facebook photos...don’t have a permanent home on a specific chip, but may move among computers" risks confounding storage with processing. The data that constitutes a photo is ultimately stored on a hard drive on a server, and probably backed up to another. But it doesn't move, Brownian motion-like, amongst servers. When you asked to view a photo, however, the service that looks up that picture and renders it on a web page, could be executed on any number of machines. In that regard there is no "facebook web server" but rather a "facebook web application" that takes advantage of available capacity across many servers.
Common Sense (West Chester, PA)
Most hacking happens after users accidentally infect their computer, usually due to clicking on a link in an email. The malware then logs their keystrokes. Eventually User ID's and passwords are gleaned. If the hackee happens to be, say an employee of Target, with remote logon access, that's how the hacker gets into a big database. Often, the hack is not detected until the data shows up for sale on an underground website. Cloud servers may be well protected against brute force attacks, but the data of individual users remains vulnerable to the stolen-password hack. that is why, it is wise to 1) never use the same password for all online accounts, and 2) change passwords frequently.
Dan (California)
and use 2-factor authentication (password plus a text message, for example) on systems that offer it...
NorthernVirginia (Falls Church, VA)
It is my sense that, with the contents of your wallet, you can bribe someone to give you access to any data that you want stored in some data center in, say, Bangalore. I wonder why I am wrong.
Melquaides (Athens, GA)
It's a good question but one, I think, with an answer: cloud computing really has computers managing computers. Rather than a big room where NorthernVirginia's bag of gold sits here and melquiades's sits there, there is a huge room with thousands of computers and massive software that manage many softwares and data retrievals: your bag of gold is sort of a virtual thing that really only the cloud software actually knows anything about the whereabouts of and really only the processing that the management software applies to it even vaguely understands the contents of
Robert (Boston)
The article states that data "may" be safer in the cloud as it may be chunked up to reside on multiple servers. It also states there have been no hacks of the big public clouds. Your article misstates the state of the art in a cheery fashion.

There's an old maxim in the IT security business. Any entity that says they have never been hacked is either misinformed and/or overconfident. We hear about hacks, the majority of the time, because consumers see the end result of them and not because the companies ever knew about being hacked.

Worse, consumers have no leverage as the laws about corporate disclosure of hacks are so very weak and carry no real teeth. Over a billion people hacked at Yahoo and it's a story for a week or two - and Yahoo didn't disclose it in a timely fashion because they did not have to.

Now, there is your real story - why are consumers so poorly protected by current laws?? Yet, nothing about it in the NYT.
txasslm (texas)
What or how would you recommend consumers be protected by laws?
gentlewomanfarmer (Massachusetts)
Not much, as a practical matter, that laws can do aside from punishing the hackee. Sure, identity theft coverage can be mandated, but again - that is closing the barn door after the horses got out. You are best advised to practice good IT hygiene yourself, and for starters encrypt your hard drive.

Personally, at this point in time I think we should be more worried about government search warrants than hackers.
M. L. Chadwick (Portland, Maine)
Sadly, there's also a possibility that government hacking may occur on a far broader scale than before.
Paula Robinson (Peoria, Illinois)
The cloud servers and drives may be more secure in some strictly technical sense, but the odds of someone breaking into one specific person's house to steal his or her specific data is incredibly small.

In contrast, the odds of someone, somewhere breaking into a major organization's servers is much, much greater.

People have had their data compromised by hacks of major health insurance companies, major banks, major credit card companies, and leading colleges -- even all four -- yet never had their personal laptops or homes broken into.

So, which is, in reality, safer? Where would you trust your digital data more?! The answer is pretty clear!
Steve (CA)
I'm not sure it is as small as you think. The bad guys have botnets, which scour the internet looking for private machines to control, both to add to the botnet, and to take private information. Don't assume that you're not an attractive target just because you're small.
Old Yeller (SLC UT USA)
With cloud storage (and web based software) all of us owners become renters.

You don't own the data you store in the cloud. You are at the mercy of unknown corporate servers somewhere. You have to trust them to maintain the data you give them, and to support their web software indefinitely. And speaking of trust, just think about the bank analogy for ten seconds. It's a pretty specious argument.

It's OK for backup, but for anything important I would rather use my aging workstation with its vintage software than trust the cloud. At least I know that my work tools and my data will always be available when I need it.
Al Fulton (Greenville, S. C.)
Unless your aging hard drive crashes...
Rick (ABQ)
Thank you! Someone finally states the obvious. Cloud computing is nothing more than slick marketing. I leased a car versus buying once. Big mistake. Turning your computing over to a stranger is like turning your car over to the valet in Ferris Bueller's day off.
full name (USA)
"Most of those attacks hit traditional servers, though. None of the most catastrophic hacks have been on the big public clouds."....uuh a billion Yahoo accounts is not a "big public cloud"?
Mark Nieuwenhuizen (The Netherlands)
The hack on Yahoo was on a single server where the account data got stolen. What they got where the keys for that single storage room you have on a cloud based warehouse. When you change the locks, the storage room is safe again. In a hack on the cloud database itself, changing locks (passwords) won't do much good.
Ric Cain Gaunt (Dallas)
Bravo for attempting to explain Cloud computing in a short article for non-techies. But you have embedded some new stereotypes/myths to confound the reader in future readings on the subject. An egregious example about cloud computing is the statement “It’s much more efficient than stand-alone computers running one job at a time”.
Computers have been running more than one job at a time since 1964 when IBM introduced the S360 operating system. Even a small scale local area network (LAN), in use since the seventies, can run related jobs simultaneously. The cloud came along much, later, and embodies much more than systems multitasking. Any young developer or old programmer knows this.
“For the people running the computers, it doesn’t really matter where the data or the programs are at any one moment”
For the people running the computers, it really DOES matter. Cloud control system software has been designed to allow data to be in Nairobi and code in Boise, and for both to change locations in microseconds.
As for security, ask about ‘open source’ code in operating systems or apps. Open source gives the hacker a strong leg up in that it reveals the ‘style’ and many conventions used in its own development; and, since the beginning, the guy on the master console, that employee or contractor, has been considered the weakest link in systems security. National Security Agency and Stanford are both strong brands but the best anti-hacker talent may come out of VoTech.
Idaho (Idaho)
"Open source gives the hacker a strong leg up in that it reveals the ‘style’ and many conventions used in its own development".

This argument boils down to "if we hide our vulnerabilities we are more secure than if we have many people looking for them". It's like hiding the key to your house under the doormat rather than having security assessment.

Security through obscurity is a proven fallacy.
Jeff (Chicago, IL)
If I am accessing my own data stored on a cloud server from my own laptop or a public computer, what would prevent a highly skilled hacker from accessing that same cloud data through the device I was using, while pretending to be me, using my hacked user I. D. and password? It would seem hacking the mass data of many or all users stored in a cloud would be incredibly difficult due to what I assume are multiple firewalls and fail safes but the stored data for individuals would appear to be far less secure. Am I missing something? Requiring retinal scans and/or fingerprints from users to access cloud data would seem to be a more secure approach than typed I.D.'s and passwords.
Ed the Red (Michigan)
It's called multi-factor authentication (MFA), and it's something you can (and should) enable on your email (Gmail supports MFA, as do other services). It's also a good idea to use MFA to secure important accounts such as 401(k) plans.

With MFA, when you try to log in, you are sent a secret code that you then need to enter to gain access. Often it's in the form of a text message—better yet is using an authenticator app such as Duo. The code is good for a limited time, usually 5 minutes. Anyone else trying to log in to your account will get the request for the code but will have no idea what to enter. You can choose to make individual devices "trusted" if you don't want to repeatedly enter codes.
The Dog (Toronto)
I think the next question is: who owns the data in the cloud? Securing data simply guarantees (or not) that it can't be stolen. But can it be sold? Or subpoenaed? Can it be used by the owners of the cloud for their own purposes? Can it be processed or studied? In other words, what am I agreeing to when I upload my files to a cloud?
Backrow (Virginia)
If you encrypt your data yourself, then most of these concerns are minimized.
FMH (.)
"... what am I agreeing to when I upload my files to a cloud?"

Reputable cloud services should tell you all that somewhere on their web site. For example, Dropbox has these legal documents online:

Terms of Service
Privacy Policy
Business Agreement
DMCA Policy
Acceptable Use Policy
Phil (Austin, TX)
Easy. Read your Terms of Service.
Sera Stephen (The Village)
The photo at left shows an array of drives which would carry thousands of times the entire literary output of humanity. The data center which the NSA has built in Utah (The Intelligence Community Comprehensive National Cybersecurity Initiative Data Center), contains thousands of times that amount of computer servers.

As William Binney said: "All the e-mails, texts, and photos in the world could fit in an average kitchen. Obviously, they have other things in mind"

What things, or is that too much to ask of the government of the people, by the people and for the people?

The "Cloud" is, potentially, anything "they" want it to be.

As a friend said years ago: If the CIA, NSA, Stasi, the KGB had designed Facebook, they wouldn't have to change a thing.
DanielS (New Jersey)
Let's assume a 8 foot ceiling kitchen, 12 TB 3.5 inch hard drives (reasonable for brand new bulk storage), and 4 MB photos (some are quite a lot smaller, some are quite a lot larger), and that there have been about 3.5 trillion photos taken since the beginning of photos. This means we need to store about 14.7 EB, with about 1.2 Million drives (not taking into account any redundancy). With 8 foot ceilings, we need about 2,100 ft^2, which is a quite large kitchen. That's just photos. Without any redundancy.

Video takes up way, way more storage, and Youtube is getting about 5 hours of new video every second uploaded. There's a lot of data in this world, and most of it isn't written, and most of it just isn't sinister.
Phil (Austin, TX)
Have you ever heard of "classified"? If everyone in the country knew, it would most likely leak out to the rest of the world.
Sera Stephen (The Village)
@ DanielS
Your math is right, but Binney was talking about the claimed purpose of the NSA site, meaning, what they said they were using the storage for: capturing surreptitious interpersonal data.

Obviously no one needs to capture the YouTube data since it's on public display.
Alex Hill (<br/>)
The weakest link in the security of data stored in the cloud is most likely to be the individual user's password, I'd imagine.
TimInHonolulu (ÜT: 21.357864,-158.022031)
I dispute the idea the cloud data is only stored remotely. Run a program that looks at your file tree and file sizes. You will find the cloud on your own hard drive. The cloud in my view makes your computer an unwitting server. I believe that the large file the FBI found on Anthony Weiner's computer was an artifact of a Huma Abedin's user account deletion that left the deleted bloated Cloud file as an un-allocated sector. Cloud may be the future. But the facts are not as they are portrayed by the industry.
Jim Propes (Oxford, MS)
I'm sorry, call me a Luddite, but I can't help remembering Mr. Weasley's riposte to his daughter Ginny: "Never trust anything that can think for itself if you can't see where it keeps its brain." (JK Rowling, "Harry Potter and the Chamber of Secrets')

We can quibble about the ability of the various clouds to "think for itself," but the principle remains. The clouds are networked computers; therefore they can be hacked. And they will be. There are too many past examples for any of us to believe differently.
Phil (Austin, TX)
Go with a service that uses end to end encryption. Use a hard to guess password. Change passwords frequently.
Steve (CA)
Even more important than passwords: Use two factor authentication.
mattiaw (Floral Park)
So if you work in a data center, outside the cloud, you should be worried?
John (Georgia)
Yes.

Enterprise data centers are no longer sustainable operationally, financially, or securely. The economies of scale and the broad array of applications provided by Cloud companies make Enterprise computing untenable.

Any CIO/CTO attempting to convince their organization's board to build or expand an Enterprise site is cooking the books.
Deanalfred (Mi)
The 'cloud' may indeed be a safer place to store information, photos,, anything digitized. But where is the 'cloud'?

The cloud actually resides in some machine or machines,,, and where that machine is physically located will depend upon the level of legal or illegal access by the government at that location.

Storage devices owned by a company may have a subpoena issued in Germany for files,,, but the server is in Ireland. Who's laws prevail?

The US government wants access to all Apple iPhones,,,, but 'only' for a select few thousand criminal investigations. Where is the data stored? Backup data? Are there intermediate servers that have copies,,, and where are they?

The cloud may be more secure when confronting scammers,, or maybe hackers,, but secure against lawful and unlawful intrusion by the government of the server's location? No. I'd think more liky a 'one stop shopping' for ,,,,,,

Locate the hard drives and servers carefully.
FMH (.)
You should also point out that there are physical cables connecting your computer and the computer storing your data in "the cloud". This book goes into fascinating detail on the infrastructure of the internet, including "the cloud":

"Tubes : a journey to the center of the Internet" by Andrew Blum.
NorthernVirginia (Falls Church, VA)
Great book.
FMH (.)
Times: "... don’t have a permanent home on a specific chip ..."

That should be "hard drive", not "chip".
EDK (Boston, MA)
Frankly, I don't like "cloud" computing, primarily for reasons of safety and reliability. I generally prefer to have my own files on my own devices only, and "back them up" periodically. Why? Because there is not guarantee that those "cloud" servers won't lose all your data, or your access won't be blocked, one day.
FMH (.)
".. there is not guarantee that ... your access won't be blocked ..."

That can indeed happen, so even if you do use the cloud, you should always back up your data locally:

The Blog That Disappeared
Roxane Gay
JULY 29, 2016
https://www.nytimes.com/2016/07/30/opinion/sunday/the-blog-that-disappea...
Phil (Austin, TX)
Can you guarantee a fire will never burn your house down?
Rick (ABQ)
No, but that doesn't mean you live your life in a hotel.
alocksley (NYC)
The suggestion here is that an individual's data is more secure when stored with other people's data. But doesn't that make it a more likely target for a hacker? If the hacker's intent is a "big score", like a bank robber's, why would they waste time trying to hack my machine when by hacking Amazon, or Microsoft, or Google, the possible reward is much greater?

Also, the author speaks of clouds sharing workloads, but cooperative computing has been around for a long time. The concept of a "time sharing option" has been around since the early mainframe days. Rebranding it as a "cloud" is just marketing.

The real (only?) advantage of cloud computing is sharing of the cost of running large computer capacity among many users.
Thomas (Nyon)
Any and everything that is transmitted via or stored on the internet will be accessed and read by the NSC, the GSHQ, the RCMP, the Russian FSA, the Chinese security services, hackers of multiple nationalities and just about every 14 year old kid on the planet.

On the internet there is no such thing as secure. If you want it safe, keep it on a computer, which is not connected to the internet.
Backrow (Virginia)
Yes and no. If I keep anything on a hard drive, either the files or that hard drive are encrypted. My data, my encryption, my key. So you are mistaken, there is very secure if you take the time to secure it yourself.
Ian (New York)
This is not entirely true and it depends on many factors. If your company or you contract with a SaaS solution provider who uses colocation services (where the SaaS company owns the hardware and leases space in a purpose-built data center), you will likely also own the data, contractually. Any good SaaS company that would provide data and document storage as a part of their solution would also likely encrypt data in transit and at rest. Combine this with the appropriate security measures as outlined by industry standars )with audits, etc..) and it is highly unlikely there will be a breach. Highly unlikely. HOWEVER, the data could be subpoenaed by the appropriate law enforcement group or agency, depending on where the data was hosted.
The most likely gap in security would by your computer. Of course, this also assumes tha tthe company has not intentionally or accidentally created a back-door.
Now, this is different from the cloud services that you are likely thinking about, like storing your photos, documents and data in a cloud service as a private citizen. In those cases, I suspect that the data is quite secure, but it is likely NOT to have the same safeguards around privacy.
Something like Facebook is scary, regarding privacy. This is more likely related to their tracking of your actions and behaviors for marketing and development purposes. Still, highly concerning.
Amanda (New York)
Use strong encryption for protection.
C. V. Danes (New York)
Nothing exposed to the Internet is secure. If you must store potentially sensitive information in the cloud, then the best way to ensure its security is to encrypt it prior to storing it. That way, if you data is stolen, the thieves will have to try to figure out how to decrypt it.
FMH (.)
"... encrypt it prior to storing it."

The word "prior" should be emphasized: PRIOR.

Some cloud services use end-to-end encryption, but you are still vulnerable to flaws in the encryption implementation and to hackers or government agencies who have control of the computers owned by the cloud service.
Dheep P' (Midgard)
You are correct - Nothing exposed to the Internet is secure. Nothing.
I have given up trying to explaining to others that fact. Just the other day someone said to me with that blank, naive look and said " Well, it's a secure site. It's safe". All I could do is chuckle weakly.
Frank (Cincinnati, OH)
This is a disappointing article. There is no reason to believe that information stored in the cloud s safe.

The logi here reminds me of the argument that Apple computers were safer We all know that turned out to be untrue. The criminals have their own timeline.
bob (santa barbara)
One other thing I like a lot about dropbox (and it may be true of others) is that it is constantly (as in every few minutes) making a backup of my files. So if the current one gets corrupted, I have access to a very current, working version. If I had to restore it from my own backup, I would have a version from last night
FMH (.)
What if Dropbox goes out of business or is shut down by a lawsuit or government order?
Backrow (Virginia)
You still need to encrypt things in Dropbox. And Dropbox was recently hacked. I hope you changed your password.
Mark Denison (New York)
Dropbox and Microsoft Cloud both preserve a copy on your computer and on their servers. Even if servers were destroyed, your data remains on your computer. This is not the case for all cloud services. In fact, for photos and music the advantage is that it doesn't depend on your devices limited storage.
jj (ct)
Cloud computing just means that you are using someone else's computer. Nevertheless, it is on a computer.
Susan (Buck County, PA)
Why am I not 100% reassured?
AnObserver (New York City)
Read the article. "Someone else's computer" is a computer rather different than then one in your house.
Martin (CT)
Yes, but on a much better computer, managed by serious professionals. Data is protected against many threats that a home system would be vulnerable to.