Audrey Tang

They don’t have to contract it out to a private sector processor. They don’t need to apply to new cyber security audits or privacy evaluations because we already know how it works based on the earthquake and the flood warnings.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech