Audrey Tang

Taken together, they can further a common purpose like contact tracing. Even if someone with cyber security attacks — black hat — attacks one of those data stores, they learn nothing about people’s private data.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech