| ▲ | hyperman1 7 hours ago | |
It is indeed cool tech. But be aware that e.g. building weapons is also playing with cool tech. The main problem I see: Who is the attacker and who is the defender. The presented scenario has the machine owner (renter?) as defender, so no problem. In quite a lot of cases, the machine owner is the attacker, and e.g. Microsoft is the defender. That's where things get nasty. | ||