Audrey Tang

Moreover, the state is investing in the infrastructure necessary to support these technologies. The aim is to avoid the trade-off between privacy and data utility. By employing methods like multi-party computation, homomorphic encryption, or synthetic differential private data, we can maximize data utility without compromising privacy.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech