Audrey Tang

…history. There’s already local storage based tools, where you can use that API to download locally to the browser and match it with the already known travel path from a known person who’s infected. That is passive collection, right? It’s basically where your phone has been.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech