Exactly. To a computer scientist, it’s the cryptographic protocols to protect data integrity, and then for…
j previous speech k next speech