EFTA02379146
EFTA02379148 DataSet-11
EFTA02379152

EFTA02379148.pdf

DataSet-11 4 pages 793 words document
P17 P19 V16 P23 P24
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (793 words)
From: Cepreii 6einucoe Sent: Wednesday, February 3, 2016 12:18 PM To: Jeffrey E. Subject: Re: In US! If he can (you wrote only for me so I did not talk =o anyone) with me and my friend who is involved 2016-02-03 15:10 GMT+03:00 Jeff=ey E. <[email protected] <mailto:[email protected]»: Where ? with whom? .4>=A0 I will do anything that is helpful to you. / He is ve=y well respected with both black and white hat hackers On Wed, Feb 3, 2016 at 7:06 AM, Cepre=D040 Sennno wrote: is it possibl= to meet with him? 2016-01-30 17:08 GMT+03:00 Jeffrey E. <[email protected]</=»: For you alone Forwarded message From: Vincenzo lozzo target="_blank" =a» Date: Saturday, 30 January 2016 Subject: To: "jeffre= E." <[email protected] <mailto:[email protected]» It's har= to tell w/o proper code/documentation (couldn't find much online). In=general the four things are: 1) the devil i= in the details, meaning that even if in theory it's all solid the imp=ementation might have bugs. There's no definitive technical solution f=r that though 2) anything that is "cus=om" (eg: they have a custom wifi protocol) is a red flag because it m=ans that it hasn't been properly vetted and might be broken/buggyQ=A0 3) there aren't enough details online to t=ll but it seems to me that to speed up the blockchain verification they pa=tially centralize the network by using their own "supernodes" (e=sentially the wallets talk to the supernodes vs the actual blockchain). Th= security of those servers seems key to me and they gloss over it online</=iv> 4) the mesh network implementation is completely up=in the air (judging from what's public) and it could go horribly wrong= So that needs further verification EFTA_R1_01392246 EFTA02379148 Also (5., in general the disadvantage of distributed /open things is that it is a =ot easier to steal money vs a closed network (like swift). <=div> Are you looking to invest into this thing? If so , I'd =uggest a few things: A) because problem (1)=above is not completely solvable, they need to have a plan. Part of =t is technical (do continuous code auditing, pentesting, on board proper c=ypto people, etc), the other part is legal/financial and pr. Specifically =hey should have some kind of insurance and they should have a pr disaster =ecovery plan. A big disadvantage of decentralized system is that you don&t4=93 have anybody to trust and you don't have a closed network that can=make stealing money hard, they need to address that </=iv> B) realistically nobody is going to attack them until they become =ignificant enough from a financial standpoint. This gives them time to wor= on A. That said they should avoid making enemies (the "disgruntled&q=ot; hacker type) Hope this is useful, if yo= get more stuff from them I'm happy to look into it more. Also if you =o invest I can help them with (A) if needed. It's a very dumb platitude but "security is a process" is t=ue. Unrelated: checkout edge.org <http://e=ge.org> , I think you'll like it. <=iv>There's a short video with Minsky that is absolutely fantastic4,=A0 Sent from my (phone On Jan 3=, 2016, at 11:26, jeffrey E. <[email protected]> wrote: (https://mycelium.com=phone/index.html). what are its weak points? =C24k please note The information contained in this communic=tion is confidential, may be attorney-client privileged, may constit=te inside information, and is intended only for the use of the addresse=. It is the property of JEE Unauthorized use, disclosure or copying =f this communication or any part thereof is strictly prohibited and =ay be unlawful. If you have received this communication in error, pleas= notify us immediately by return e-mail or by e-mail to jeevacation@=mail.com, and destroy this communication and all copies thereof, <=div> 2 EFTA_R1_01392247 EFTA02379149 =C2* please note The information containe= in this communication is confidential, may be attorney-client privileg=d, may constitute inside information, and is intended only for the u=e of the addressee. It is the property of JEE Unauthorized use, disc=osure or copying of this communication or any part thereof is strictly =rohibited and may be unlawful. If you have received this communicati=n in error, please notify us immediately by return e-mail or by e-mail =o jeevacation@g=ail.com <mailto:[email protected]> and destroy this communication and all copies thereof, =ncluding all attachments. copyright -all rights reserved C yeaweii=004)em, C.6enswoe =C24> please note The informat=on contained in this communication is confidential, may be attorney-cli=nt privileged, may constitute inside information, and is intended only =or the use of the addressee. It is the property of JEE Unauthoriz=d use, disclosure or copying of this communication or any part thereof =s strictly prohibited and may be unlawful. If you have received this return e-mail o= by e-mail to [email protected] <mailto:[email protected]> , and destroy this communication and all copies =hereof, including all attachments. copyright -all rights reserved chiv> 3 EFTA_R1_01392248 EFTA02379150 4 EFTA_R1_01392249 EFTA02379151
ℹ️ Document Details
SHA-256
1c4d0926d8698ec516ce5dfe544d01dfd2a72cb36ea3c852794f395cb3043bfd
Bates Number
EFTA02379148
Dataset
DataSet-11
Document Type
document
Pages
4

Comments 0

Loading comments…
Link copied!