Audrey Tang

The second thing is that it’s not also not about backdoors or Trojan horses. It’s about a path dependency. Once we use a PRC component in the 3G deployment, it becomes very difficult to move away to another design, to another system.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech