Technology
Cybersecurity Data Protection Data Privacy Encryption Authentication Data Security Privacy Surveillance Vulnerabilities Digital Security
The commitments highlight a state‑controlled rollout that currently works only at select TSA checkpoints.