They successfully made a system where anyone can join and write, but gradually they switched to cyber secure protocols, COG protocols, rather than reusing the WiFi. They collaborated with components and so on, and therefore gained legitimacy so that eventually people trusted more.

Keyboard shortcuts

j previous speech k next speech