Audrey Tang

They successfully made a system where anyone can join and write, but gradually they switched to cyber secure protocols, COG protocols, rather than reusing the WiFi. They collaborated with components and so on, and therefore gained legitimacy so that eventually people trusted more.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech