In the cloud, however, network boundaries are much blurrier -- and existing protections can't easily be shunted into cloud environments that are running within an unknown and unseeable third-party environment.
Barriers generated this way can repel harsh attacks, and its gestures and motions can convince watchers that something unseeable actually exists; once this is achieved, the perceived item will materialize.