Audrey Tang

Yes, we are mainly talking about how to increase the cryptographic security of the second assured workloads case with zero knowledge technology, essentially. So, that is cryptographically as secure as the third one, even though of course the availability profile would differ, but otherwise the same.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech