Audrey Tang

It’s not just like a single email that could be construed as spam, but it’s rather the behavior, the activity itself. It’s coordinated, inauthentic behavior, and these CIBs, instead of individual lines, like the same lines would be fine if it’s a real royalty [laughs] sending you a real request, right?

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech