Audrey Tang

The people using that technique have escalated and perfected that particular technique so that it could be used both as a surveillance route, but it can also be configured, as in a few years ago, as a great cannon kind of way where people configured popular websites to DDoS the website GitHub. That is very well-documented.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech