Anyway, then the key to this really is the idea of a public code as public infrastructure. In many other jurisdictions, we have seen that those siloed deployment itself is quite secure. By the way, they exchange data. That becomes the weakest link. It’s quite asymmetric in a bad way.

Keyboard shortcuts

j previous speech k next speech