👁 1
💬 0
📄 Extracted Text (1,495 words)
From: Vincenzo Iozzo
To: "jeffrey E." <[email protected]>
Subject: Re:
Date: Fri, 19 Feb 2016 00:59:56 +0000
Ok, let me know if they want to connect at some point and how. Sony for the craziness of this week, was out of
my control
Sent from my Iphone
On Feb 19, 2016, at 09:57, jeffrey E. leevacation®gmail.com> wrote:
No
On Thursday, 18 February 2016, Vincenzo lozzo < > wrote:
24h before I board the plane to Milan, so if you want me in NYC on Sunday this is a good time to say it :)
Sent from my Iphone
On Feb 16, 2016, at 21:38, Jeffrey E. < > wrote:
Forwarded messa e
From: Ceprea ECIIHICOB
Date: Tuesday, February 16, 2016
Subject:
To: "jeffrey E." <[email protected]>
my partner is in SF till 24th.he can arrive to any cities in US to meet with Vincenzo in these dates
2016-02-12 1:37 GMT+03:00 jeffrey E. <[email protected]>:
hes in japan until the 18th, I can send him wherever you like after
On Thu, Feb 11, 2016 at 5:13 PM, Mac < > wrote:
thank you!
12 4:teap. 2016 r., a 1:12, jeffrey E. <jeevacation®gmail.com> namicara):
ill ask
On Thu, Feb 11, 2016 at 5:52 PM, Cepreil Bemucort > wrote:
Hi!
EFTA00716738
My friend Nick Kovarsky, we met with Peter Thiel with the help of you, is going to be in NY and
SF from 14th till 20th of February.
Unfortunately I can not come with him.
Is it possible to create his meeting with Vincenzo?
2016-02-03 15:18 GMT+03:00 jeffrey E. [email protected]>:
yes of course
On Wed, Feb 3, 2016 at 7:18 AM, Cepreil Bemsucos wrote:
In US! If he can (you wrote only for me so I did not talk to anyone) with me and my friend
who is involved
2016-02-03 15:10 GMT+03:00 Jeffrey E. <jeevacation®gmail.com>:
Where ? with whom? . I will do anything that is helpful to you. / He is very well
respected with both black and white hat hackers
On Wed, Feb 3, 2016 at 7:06 AM, Cepreli Semmos S. wrote:
is it possible to meet with him?
2016-01-30 17:08 GMT+03:00 jeffrey E. <[email protected]>:
For you alone
Forwarded messa e
From: Vincenzo lozzo
Date: Saturday, 30 January 2016
Subject:
To: "jeffrey E." <[email protected]>
It's hard to tell w/o proper code/documentation (couldn't find much online). In general
the four things are:
1) the devil is in the details, meaning that even if in theory it's all solid the
implementation might have bugs. There's no definitive technical solution for that though
2) anything that is "custom" (eg: they have a custom wifi protocol) is a red flag because
it means that it hasn't been properly vetted and might be broken/buggy
3) there aren't enough details online to tell but it seems to me that to speed up the
blockchain verification they partially centralize the network by using their own
"supemodes" (essentially the wallets talk to the supemodes vs the actual blockchain).
The security of those servers seems key to me and they gloss over it online
4) the mesh network implementation is completely up in the air (judging from what's
public) and it could go horribly wrong. So that needs further verification
Also (5), in general the disadvantage of distributed /open things is that it is a lot easier to
steal money vs a closed network (like swift).
Are you looking to invest into this thing? If so , I'd suggest a few things:
A) because problem (1) above is not completely solvable, they need to have a plan. Part
of it is technical (do continuous code auditing, pentesting, on board proper crypto
EFTA00716739
people, etc), the other part is legal/financial and pr. Specifically they should have some
kind of insurance and they should have a pr disaster recovery plan. A big disadvantage of
decentralized system is that you don't have anybody to trust and you don't have a closed
network that can make stealing money hard, they need to address that
B) realistically nobody is going to attack them until they become significant enough
from a financial standpoint. This gives them time to work on A. That said they should
avoid making enemies (the "disgruntled" hacker type)
Hope this is useful, if you get more stuff from them I'm happy to look into it more. Also
if you do invest I can help them with (A) if needed.
It's a very dumb platitude but "security is a process" is true.
Unrelated: checkout edge.org, I think you'll like it.
There's a short video with Minsky that is absolutely fantastic
Sent from my Iphone
On Jan 30, 2016, at 11:26, jeffrey E. <[email protected]> wrote:
. what are its weak points?
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation®gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation®gmail.com, and
EFTA00716740
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C ynasicetmem,
C.EeJIRKOB
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C ysaacennem,
C.Eensucos
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C ynamnitunt,
EFTA00716741
C.BeJIAKOB
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C ytmiceimem,
C.BenfIKOB
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
EFTA00716742
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00716743
ℹ️ Document Details
SHA-256
33b895d543be143265aae13926793bb893408b7aa699a509d1203df12afbad2d
Bates Number
EFTA00716738
Dataset
DataSet-9
Type
document
Pages
6
💬 Comments 0