Taken together, they can further a common purpose like contact tracing. Even if someone with cyber security attacks — black hat — attacks one of those data stores, they learn nothing about people’s private data.

Keyboard shortcuts

j previous speech k next speech