It has to be hardened against intrusion, so we have the white hat hackers here attack it, find vulnerable, and fix it. All of this is open source, so they also export this toolkit. If people in somewhere inside the Great Firewall want to set up these local systems, there’s no external dependency.

Keyboard shortcuts

j previous speech k next speech