Audrey Tang

Already in this trustless world, they develop ways to authenticate nevertheless with just digital signatures and some proof state or proof of work and so on. If you ask these people what are the ways to do computation in a way that doesn’t sacrifice privacy at all, because if just a little bit is on the blockchain, it’s on there forever, so they don’t accept this tolerable sacrifice.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech