Audrey Tang

That’s the first one is the control argument. The second one is the path dependency argument. Exactly as you’ve said, even if we do a thorough penetration testing and this line security perimeters, that is only good for that particular version of the firmware.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech