It prompts us to reuse existing innovations for the appropriate configuration instead of coming up with whole new ideas, because that would need both legislature approval and also cybersecurity and privacy auditing, which takes time.
j previous speech k next speech