Audrey Tang

A key lesson we have learned is that, in cybersecurity, taking control and maintaining control of a system, from an adversary’s viewpoint, is not that easy, actually. To deny its service, to overwhelm it, is much more easy and can be mounted without much risk of retaliation.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech