Audrey Tang

We also make sure it’s not connected directly for example to the Internet or it need the special VPN or direct clients to connect to. We pay a lot of effort and also money to white hat hackers so we work with penetration testers. Our white hat hackers took again the second place the Defcon CTF, second only to the US team.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech