Audrey Tang

They mostly, I think, do it in the information layer, not so much on the hard cybersecurity layer. That is to say we don’t see, for example, breaking into candidates’ emails or things like that. We don’t see that yet. It’s mostly on the information operation level.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech