Audrey Tang

Through ZTA, it checks my fingerprint, my device and its SIM card, and the edge activities on my device. Even if one of the three is compromised, the other two factors keeps me safe, and allows the defense team on the cybersecurity plenty of time — a day or two — in order to do forensics to keep the threat from spreading.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech