These experiments, these case studies are clearly going to be ongoing, as is the other side, the side of the threats and the vulnerabilities.

Keyboard shortcuts

j previous speech k next speech