How did restricted entities continue accessing this exact computing power anyway?

By purchasing smuggled chips on the black market at a massive premium.

By hacking into Pentagon and university supercomputer clusters.

By legally renting the restricted chips over the internet from Amazon Web Services.

Correct. The cloud has no borders.

Insight 2 of 12 from the full story.

Unfold the Case