Audrey Tang

We invite the cyber security community, the mathematics community to inspect the algorithm and show conclusively that it cannot actually compromise privacy. Then the operators, such as the telecom operators take the same code packaged in a container, run it in their data center, and only publish the end result.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech