Audrey Tang

They get checked for, just like cyber security audits, to make sure that they are not privacy-harming, they are privacy-preserving. There’s mathematical properties -- I know Glenn is also looking into that -- called differential privacy, so you can show which epsilon is actually the acceptable range for people’s code to submit this way.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech