Audrey Tang

Then the defensive technologies will not be distributed. We will rely on those two or three model makers to implement, say, watermarks. The sentences they generate, the pictures they generate will have those invisible watermarks that they can tell.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech