It is their work. I understand the general algorithm of their work, but I’ve never seen any line of code. Of course, this seems like it’s not functioning as it’s supposed to, but I don’t know the technical details. I will talk about that next time I meet the cybersecurity department head.

Keyboard shortcuts

j previous speech k next speech