mamot.fr is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mamot.fr est un serveur Mastodon francophone, géré par La Quadrature du Net.

Server stats:

3.3K
active users

#aws

48 posts41 participants3 posts today
The Internet is Crack<p>📈 Historically, AWS pulled off one of the most interesting business model shifts in tech.</p><p>In this clip, Harvard economist Shane Greenstein explores how Amazon redefined cloud infrastructure—and made it wildly profitable.</p><p>The full episode digs into Web 2.0, the rise of AI, and the changing digital landscape. </p><p>Available wherever podcasts stream!<br><a href="https://youtu.be/z3z94qVCGp8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/z3z94qVCGp8</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/theinternetiscrack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>theinternetiscrack</span></a> <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.social/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudComputing</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/TechHistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechHistory</span></a> <a href="https://mastodon.social/tags/Podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Podcast</span></a></p>
The Internet is Crack<p>AWS has become a cash-generating powerhouse—but how exactly did they do it?</p><p>Tune in to our insightful discussion with Harvard economist Shane Greenstein on Web 2.0, AI, and the evolving digital landscape.</p><p>🎧 Available now wherever you get your podcasts!<br><a href="https://youtu.be/z3z94qVCGp8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/z3z94qVCGp8</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/theinternetiscrack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>theinternetiscrack</span></a> <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Web20" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Web20</span></a> <a href="https://mastodon.social/tags/Economics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Economics</span></a> <a href="https://mastodon.social/tags/Podcast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Podcast</span></a></p>
LavX News<p>Exploiting SSRF Vulnerabilities: A New Threat to AWS EC2 Instances</p><p>A recent surge in targeted attacks has revealed a critical vulnerability in AWS EC2 instances, allowing hackers to exploit Server-Side Request Forgery (SSRF) flaws. This campaign not only highlights t...</p><p><a href="https://news.lavx.hu/article/exploiting-ssrf-vulnerabilities-a-new-threat-to-aws-ec2-instances" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/exploitin</span><span class="invisible">g-ssrf-vulnerabilities-a-new-threat-to-aws-ec2-instances</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.cloud/tags/SSRF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSRF</span></a> <a href="https://mastodon.cloud/tags/IMDSv2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMDSv2</span></a></p>
Walker<p>Sigh. Amazon AWS Glacier is great for long term storage. I just wish there was an easier way to delete old vaults. </p><p>I understand the process, but it is still a pain to log into AWS, retrieve the inventory list, select the files to delete, delete the files, then able to delete the old vault. A large vault will take a while to retrieve the inventory. </p><p>Not a simple or quick process. I wish there was a nuke vault button that would take care of this.</p><p><a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/glacier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glacier</span></a> <a href="https://infosec.exchange/tags/amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amazon</span></a></p>
Mijndert<p>Wouldn't it be nice to be able to go "I'll have the same RDS reserved instances again please" in <a href="https://fosstodon.org/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>? Such a massive time sink to figure out 1. what you need and 2. what the discount will be per purchase option.</p>
Inautilo<p><a href="https://mastodon.social/tags/Development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Development</span></a> <br>EC2 reserved instances’ silent exit · The impact on Amazon Elastic Compute Cloud users <a href="https://ilo.im/16383s" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ilo.im/16383s</span><span class="invisible"></span></a></p><p>_____<br><a href="https://mastodon.social/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a> <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.social/tags/EC2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EC2</span></a> <a href="https://mastodon.social/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://mastodon.social/tags/Pricing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pricing</span></a> <a href="https://mastodon.social/tags/Application" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Application</span></a> <a href="https://mastodon.social/tags/Website" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Website</span></a> <a href="https://mastodon.social/tags/Hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosting</span></a> <a href="https://mastodon.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a> <a href="https://mastodon.social/tags/Backend" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backend</span></a></p>
:rss: DevelopersIO<p>AWS Amplify Gen 2 で外部IdPによるサインインを試してみた<br><a href="https://dev.classmethod.jp/articles/aws-amplify-gen2-external-idp-signin/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dev.classmethod.jp/articles/aw</span><span class="invisible">s-amplify-gen2-external-idp-signin/</span></a></p><p><a href="https://rss-mstdn.studiofreesia.com/tags/dev_classmethod" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dev_classmethod</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/AWS_Amplify" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS_Amplify</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Amazon_Cognito" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon_Cognito</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/TypeScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TypeScript</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a></p>
Victor Grenu<p>Joke aside, what kind of guardrails are you using to prevent Denial of Wallet (DoW) and lack of visibility on billed cloud assets?</p><p><a href="https://infosec.exchange/tags/AWSSummit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWSSummit</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a></p>
Tim Bray<p>If you care about <a href="https://cosocial.ca/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>, this from <span class="h-card" translate="no"><a href="https://awscommunity.social/@Quinnypig" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Quinnypig</span></a></span> is a big deal: <a href="https://www.duckbillgroup.com/blog/ec2-reserved-instances-are-being-deprecated/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">duckbillgroup.com/blog/ec2-res</span><span class="invisible">erved-instances-are-being-deprecated/</span></a></p><p>Tl;dr: Reserved Instances are being quietly deprecated .</p>
Rene Robichaud<p>AWS rolls out ML-KEM to secure TLS from quantum threats<br><a href="https://www.bleepingcomputer.com/news/security/aws-rolls-out-ml-kem-to-secure-tls-from-quantum-threats/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/aws-rolls-out-ml-kem-to-secure-tls-from-quantum-threats/</span></a></p><p><a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CeptBiro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CeptBiro</span></a> <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.social/tags/MLKEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MLKEM</span></a> <a href="https://mastodon.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://mastodon.social/tags/QuantumThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumThreats</span></a></p>
Chum1ng0 - Security Research :verified:<p>Documents revealing personal data were exposed. This was reported to the Finnish entity, but I never received a response from them.</p><p>As a result, I had to contact the National Cyber Security Centre of Finland (NCSC-FI) twice to get them to close the case.</p><p><a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leak</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/bucket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bucket</span></a></p>
Chum1ng0 - Security Research :verified:<p>🇫🇮 Finland: 105,000 Satula.com Records Exposed in Unsecured AWS.</p><p>🔗 <a href="https://medium.com/@newschu.substack.com/finland-105-000-satula-com-records-exposed-in-unsecured-aws-be7318ca5523" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@newschu.substack.c</span><span class="invisible">om/finland-105-000-satula-com-records-exposed-in-unsecured-aws-be7318ca5523</span></a> </p><p><a href="https://infosec.exchange/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/leak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leak</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/bucket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bucket</span></a></p>
Sathya<p>TIL </p><p>aws s3control</p><p>NAME<br> s3control -</p><p>DESCRIPTION<br> Amazon Web Services S3 Control provides access to Amazon S3 control plane actions.</p><p><a href="https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3control/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">awscli.amazonaws.com/v2/docume</span><span class="invisible">ntation/api/latest/reference/s3control/index.html</span></a></p><p><a href="https://mastodon.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a></p>
Thomas Schäfer<p><a href="https://aws.amazon.com/about-aws/whats-new/2025/04/aws-end-user-messaging-ipv6/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2025/04/aws-end-user-messaging-ipv6/</span></a></p><p><a href="https://ipv6.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://ipv6.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://ipv6.social/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a></p>
Sebastian Lohmann<p><span class="h-card" translate="no"><a href="https://mastodon.online/@things" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>things</span></a></span>, laut den Angaben auf der Webseite sind die Daten von <a href="https://lohmann.social/tags/Things" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Things</span></a> immer noch nicht <a href="https://lohmann.social/tags/E2E" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2E</span></a>-verschlüsselt und liegen laut Auskunft vom Support auf <a href="https://lohmann.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>-Speicher. Ist das noch zeitgemäß? Es wäre doch ein leichtes, das Passwort für die Anmeldung in der <a href="https://lohmann.social/tags/ThingsCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThingsCloud</span></a> für eine Client-seitige Verschlüsselung zu verwenden - das Passwort muss ja sowieso auf jedem Client eingegeben werden. Warum wird das nicht gemacht?!</p>
xcoffee<p>mal ankieken - ggf. ne <a href="https://wandzeitung.xyz/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://wandzeitung.xyz/tags/wasabi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wasabi</span></a> Alternative: <a href="https://filen.io/pricing" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">filen.io/pricing</span><span class="invisible"></span></a> <a href="https://wandzeitung.xyz/tags/restic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>restic</span></a> <a href="https://wandzeitung.xyz/tags/backup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backup</span></a> <a href="https://wandzeitung.xyz/tags/alternative" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>alternative</span></a> /via <a href="https://digital-cleaning.de/index.php/filen-verschluesselte-cloud-aus-deutschland-mit-besonderen-backup-funktionen/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">digital-cleaning.de/index.php/</span><span class="invisible">filen-verschluesselte-cloud-aus-deutschland-mit-besonderen-backup-funktionen/</span></a></p>
:mastodon: Mike Amundsen<p>Amazon Bedrock launches Session Management APIs for generative AI applications (Preview) | Amazon Web Services <a href="https://buff.ly/eQNn7Dr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/eQNn7Dr</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://mastodon.social/tags/genAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genAI</span></a> <a href="https://mastodon.social/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a></p>
Harry W.<p>I was right, <a href="https://mstdn.social/tags/DynamoDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DynamoDB</span></a> might be right for what I'm doing, but you _really_ need to understand how you're going to query this table up front. <br>So easy to paint yourself into a corner</p><p><a href="https://mstdn.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a> <a href="https://mstdn.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mstdn.social/tags/Code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Code</span></a> <a href="https://mstdn.social/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@PWS_1" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>PWS_1</span></a></span> nicht nur das, sondern die <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> ziehen effektiv <a href="https://infosec.space/tags/Wohlstand" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wohlstand</span></a> aus der <a href="https://infosec.space/tags/Welt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Welt</span></a> ab!</p><ul><li>Auch ignoriert <a href="https://infosec.space/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> in dessen <em>durch <a href="https://infosec.space/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a> herbeihalluzinierten Zahlen</em> dass <a href="https://infosec.space/tags/Dienstleistungen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dienstleistungen</span></a> nicht eingerechnet werden.</li></ul><p>Wenn wir dann z.B. <a href="https://infosec.space/tags/SaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaaS</span></a> wie <a href="https://infosec.space/tags/Office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Office365</span></a>, <a href="https://infosec.space/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a>, <a href="https://infosec.space/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a>, <a href="https://infosec.space/tags/GCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GCP</span></a> &amp; <a href="https://infosec.space/tags/Zahlungsanbieter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zahlungsanbieter</span></a> wie <a href="https://infosec.space/tags/AMEX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AMEX</span></a>, <a href="https://infosec.space/tags/VISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VISA</span></a>, <a href="https://infosec.space/tags/MasterCard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MasterCard</span></a> &amp; <a href="https://infosec.space/tags/PayPal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PayPal</span></a> gegenrechnen dürfte das sogar noch schlechter aussehen...</p>
matdevdug<p>Just finished transitioning a small <a href="https://c.im/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a> business from <a href="https://c.im/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> to <a href="https://c.im/tags/Hetzner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hetzner</span></a>. 5 medium sized servers, one load balancer, about 20 TB of backend traffic a month and then a CDN. If you are on the fence about doing it, it’s really pretty easy. Hetzner has good Terraform coverage. </p><p>The part I was a little bit surprised by was the cost difference. Hosted inside the EU, Hetzner is coming in about 60% cheaper than AWS.</p>