So, in addition to the privacy-preserving arm, which we’ve talked about in this conversation, there’s also this provenance arm; such technologies can be adopted by the people. And if we make the provenance arm strong enough, we can be resilient even when the main connections start to break down.

Keyboard shortcuts

j previous speech k next speech