EFTA00752492.pdf

DataSet-9 2 pages 486 words document
👁 1 💬 0
📄 Extracted Text (486 words)
From: "Charles L. Harper Jr." To: Jeffrey Epstein <[email protected]> Subject: Re: Project discussion & proposal document attached Date: Fri, 05 Nov 2010 11:15:58 +0000 Hi Jeffrey, Thanks for quick feedback! I can begin to work on issues you've raised if you decide to go forward contracting my services. Allbest, -Charles Harper PS. I've only touched on a few issues thus far via a few days effort only. I've been focused on the strongly encouraging input from Scott Aaronson and Seth Lloyd on the topic you set: "Cryptography in Nature." Both of them independently saw the topic as an innovative way to engage deep issues at the interface between computation (modem cryptography being within the theory of computation) and both physics and biology. Biology/evolution succeeds in all sorts of computationally hard tasks. It is not understood quite how and this area of inquiry is seen as a way to open up deep discovery agendas. This includes, on the physics side, new areas in quantum computation which, as you know is at the cutting-edge of code-cracking agendas today due to Shore's Algorithm and the way that future quantum computers using it could do fast prime-factoring. Also, molecular computation, especially via DNA, allows code-cracking-type computation possibilities. Your comments suggest there may be value in pursuing innovators who are at the cutting edge in immunology as well as in predator-prey competition-innovation cycles in (computationally-modeled?) evolution. On the issue of actual cryptography, the problem is that much of the serious action will be behind closed doors. On Nov 5, 2010, at 3:27 AM, Jeffrey Epstein wrote: great proposal„ however, it needs to be more around deception alice -bob. communication. virus hacking, battle between defense and infiltration.. computation is already looked at in various fields. camoflauge , mimickry, signal processing, and its non random nature, misinformation. ( the anti- truth - but right answer for the moment ).. computation does not involve defending against interception, a key area for biological systems, if a predator breaks the code, it usually can accumulate its preys free energy at a discount . self deception, ( necessary to prevent accidental disclosure of inate algorithms. WE need more hackers , also interested in biological hacking , security, etc. On Thu, Nov 4, 2010 at 10:30 PM, Charles L. Harper Jr. < > wrote: Dear Jeffrey, Please find attached a project discussion and proposal document in reply to your request. Allbest, EFTA00752492 Charles Harper The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. EFTA00752493
ℹ️ Document Details
SHA-256
2ccc3c044aa7784f999b845cda8889960d510de4f9c6722b095bdf915f6622d8
Bates Number
EFTA00752492
Dataset
DataSet-9
Type
document
Pages
2

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!