These experiments, these case studies are clearly going to be ongoing, as is the other side, the side of the threats and the vulnerabilities.
j previous speech k next speech