And so, if we were to be kind of like hosting some kind of transformational conversation, it should attract people to try to mess with data. Not just spam, but maybe even more sophisticated. Inauthentic coordinate… So, how might you think about, I don’t know, that threat, defending against it. Because for me, Taiwan, I understood that it was open, right?

Keyboard shortcuts

j previous speech k next speech