Audrey Tang

So, in addition to the privacy-preserving arm, which we’ve talked about in this conversation, there’s also this provenance arm; such technologies can be adopted by the people. And if we make the provenance arm strong enough, we can be resilient even when the main connections start to break down.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech