It came back to the data model that we have where the keys are secured in a secure enclave, so in some very safe area. The personal data that gets pulled off of the device can be kept private, can be kept encrypted, and then the open data gets combined with it.

Keyboard shortcuts

j previous speech k next speech