Finally, collective intelligence, how do we do in Africa? For example, you can use the tool that we use, like Sandstorm. The Sandstorm tool that we use is cybersecurity audited, entirely open source, and you can rest ensure that when you’re using Sandstorm, whatever app you’re running in it, even though it may contain backdoors or whatever, it is still secure.

Keyboard shortcuts

j previous speech k next speech