Audrey Tang

The data collection, when it resides on a third party solution provider, which doesn’t offer into an encryption, you cannot be sure that they’ll delete all the data and creates a tech service for cyber security intrusions.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech