That depends, some people need to be offended and get a reality check.
Otherwise just muttering imprecations jnder your breath against humanity at large will get you through the day.
That article is SO wrong. You don't run one instance of a tier1 application. And they are on separate DCs, on separate networks, and the firewall rules allow only for application traffic. Management (rdp/ssh) is from another network, through bastion servers. At the very least you have daily/monthly/yearly (yes, yearly) backups. And you take snapshots before patching/app upgrades. Or you even move to containers, with bare hypervisors deployed in minutes via netinstall, configured via ansible. You got infected? Too bad, reinstall and redeploy. There will be downtime but not horrible. The DBs/storage are another matter of course, but that's why you have synchronous and asynchronous replicas, read only replicas, offsites, etc.
But for the love of what you have dear, don't run stuff on bare metal because "what if the hypervisor gets infected". Consider the attack vector and work around that.
Incidentally, the European court for human rights said that that law violated the ECHR convention.
The UK said "yeah, so what?", which since they've left the EC it's legally right, but it's not a great outlook when you're told your laws violate human rights.
you don't need to know how the ISP network works, you only need some networking concepts. Subnets/addressing and very basic routing (for a basic setup). You won't even need firewall rules if you don't host anything at your place (that needs to be accessed from outside)
Simplex.chat
No identifiers, pfp, FOSS, can route through tor.
Or host your own matrix or xmpp server.