Audrey Tang

We take this very seriously, and we believe that active penetration testing and forensics, and all these tools, enables us to have a clear understanding of our information technology’s infrastructure and its limitations, so that we use it in a responsible manner.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech