I depends actually on how you do it, if you tunnel he connection via multiple hops (or do a split on multiple networks, even better ) and use encrypted disks no way the can touch it, i know the can see whatever is up there, but for tos the encryption prevent them from that legally, or better, use Alibaba or a Russian provider
I depends actually on how you do it, if you tunnel he connection via multiple hops (or do a split on multiple networks, even better ) and use encrypted disks no way the can touch it, i know the can see whatever is up there, but for tos the encryption prevent them from that legally, or better, use Alibaba or a Russian provider