Audrey Tang

Anyway, then the key to this really is the idea of a public code as public infrastructure. In many other jurisdictions, we have seen that those siloed deployment itself is quite secure. By the way, they exchange data. That becomes the weakest link. It’s quite asymmetric in a bad way.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech