Audrey Tang

Also, if you adopt that as a substrate, you kind of always have to go back to the first principles of zero-knowledge and zero-trust authentication.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech