📄 Extracted Text (836 words)
From: jeffrey E. <[email protected]>
Sent: Wednesday, February 3, 2016 6:08 PM
To: Svet
Subject: Fwd:
Forwarded messag=
From: Cep =Heil 6enanoa On Wed, Feb 3, 2016 at 7:06 AM, Cepr =85i1 6enAKOs <=a
href=" get="_blank" rote:
is it poss=ble to meet with him?
2016-01-30 17:08 GMT+03:00 Jeffrey E. <[email protected]=>:
For you alone
ar> Forwarded message
From: Vincenzo lozzo &
Date: Saturday, 30 lanu
Subject:
To: "jef=rey E." <[email protected] <mailto:[email protected]»
It's =ard to tell w/o proper code/documentation (couldn't find much online).=ln general the four things
are:
1) the devi= is in the details, meaning that even if in theory it's all solid the =mplementation might have
bugs. There's no definitive technical solutio= for that though
2) anything that is "=ustom" (eg: they have a custom wifi protocol) is a red flag because i= means that it
hasn't been properly vetted and might be broken/buggy=C2
3) there aren't enough details online t= tell but it seems to me that to speed up the blockchain
verification they=partially centralize the network by using their own "supernodes"=(essentially the wallets talk to the
supernodes vs the actual blockchain).=The security of those servers seems key to me and they gloss over it onlin=
4) the mesh network implementation is completely=up in the air (judging from what's public) and it
could go horribly wr=ng. So that needs further verification
Also=(5), in general the disadvantage of distributed /open things is that it is=a lot easier to steal money
vs a closed network (like swift).
Are you looking to invest into this thing? If so , I'=d suggest a few things:
A) because problem =1) above is not completely solvable, they need to have a plan. Part =f it is
technical (do continuous code auditing, pentesting, on board prope= crypto people, etc), the other part is legal/financial
EFTA_R1_01584556
EFTA02472539
and pr. Specifical=y they should have some kind of insurance and they should have a pr disast=r recovery plan. A big
disadvantage of decentralized system is that you do='t have anybody to trust and you don't have a closed network that
=an make stealing money hard, they need to address that
8) realistically nobody is going to attack them until they beco=e significant enough from a financial
standpoint. This gives them time to =ork on A. That said they should avoid making enemies (the "disgruntle=" hacker
type)
Hope this is useful, if=you get more stuff from them I'm happy to look into it more. Also if y=u do invest I
can help them with (A) if needed.
=div>It's a very dumb platitude but "security is a process" i= true.
Unrelated: checkout edge.org <http:=/edge.org> , I think you'll like it.
There's a short video with Minsky that is absolutely fantastic=C2
Sent from my (phone
On Ja= 30, 2016, at 11:26, jeffrey E. <[email protected]> wrote=
(https://mycelium.=om/phone/index.html). what are its weak points?
=AO please note
The information contained in this commu=ication is
confidential, may be attorney-client privileged, may
cons=itute inside information, and is intended only for
the use of the addre=see. It is the property of
JEE
Unauthorized use, disclosure or copyi=g of this
communication or any part thereof is strictly prohibited
a=d may be unlawful. If you have received this
communication in error, pl=ase notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,=br>including all attachments. copyright -all
rights reserved
=C2 please note
The information containe= in this communication is
confidential, may be attorney-client privileg=d, may
constitute inside information, and is intended only for
2
EFTA_R1_01584557
EFTA02472540
the u=e of the addressee. It is the property of
JEE
Unauthorized use, disc=osure or copying of this
communication or any part thereof is strictly =rohibited
and may be unlawful. If you have received this
communicati=n in error, please notify us immediately by
return e-mail or by e-mail =o jeevacation@g=ail.com <[email protected]> , and
destroy this communication and all copies thereof,
=ncluding all attachments. copyright -all rights reserved
C yiatameii=DO em,
C.Eemucos
=C2 please note
The informat=on contained in this communication is
confidential, may be attorney-cli=nt privileged, may
constitute inside information, and is intended only =or
the use of the addressee. It is the property of
JEE
Unauthoriz=d use, disclosure or copying of this
communication or any part thereof =s strictly prohibited
and may be unlawful. If you have received this
return e-mail o= by e-mail to [email protected] <mailto:[email protected]> , and
destroy this communication and all copies =hereof,
including all attachments. copyright -all rights reserved
C y=DO amemmem,
C.6encwos
3
EFTA_R1_01584558
EFTA02472541
please note
=he information contained in this communication is confidential, may be =ttorney-client privileged, may constitute
inside information, and is in=ended only for the use of the addressee. It is the property of JEEUnauthorized use,
disclosure or copying of this communication or any p=rt thereof is strictly prohibited and may be unlawful. If you have
rece=ved this communication in error, please notify us immediately by ret=rn e-mail or by e-mail to
[email protected] <mailto:[email protected]> , and destroy this communication an= all copies thereof,
including all attachments. copyright -all rights r=served
4
EFTA_R1_01584559
EFTA02472542
ℹ️ Document Details
SHA-256
2db87ed4b08a55227be0bc73d7f05ac5ef8c61224bceb832d78f14bbf415a2b1
Bates Number
EFTA02472539
Dataset
DataSet-11
Document Type
document
Pages
4
Comments 0