Audrey Tang

Beyond CSAM and fraud, there are many areas where distributed defense helps security. Cybersecurity is another good example. Previously, attacking a computer’s vulnerabilities required professional hackers remotely controlling viruses or trojans. Now, viruses and trojans are becoming smarter and may not need remote control—they can move laterally using the target’s computing power.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech