It’s not just like a single email that could be construed as spam, but it’s rather the behavior, the activity itself. It’s coordinated, inauthentic behavior, and these CIBs, instead of individual lines, like the same lines would be fine if it’s a real royalty [laughs] sending you a real request, right?

Keyboard shortcuts

j previous speech k next speech