📄 Extracted Text (1,181 words)
From: "jeffrey E." <[email protected]>
To: Mac
Subject: Re:
Date: Thu, 11 Feb 2016 22:37:00 +0000
hes in japan until the 18th, I can send him wherever you like after
On Thu, Feb 11, 2016 at 5:13 PM, Mac < wrote:
thank you!
12 cliesp. 2016 r., a 1:12, jeffrey E. <[email protected]> nanacan(a):
ill ask
On Thu, Feb 11, 2016 at 5:52 PM, Cepreit &mums > wrote:
Hi!
My friend Nick Kovarsky, we met with Peter Thiel with the help of you, is going to be in NY and SF from
14th till 20th of February.
Unfortunately I can not come with him.
Is it possible to create his meeting with Vincenzo?
2016-02-03 15:18 GMT+03:00 jeffrey E. <[email protected]>:
yes of course
On Wed, Feb 3, 2016 at 7:18 AM, Ceprert &mime < > wrote:
In US! If he can (you wrote only for me so I did not talk to anyone) with me and my friend who is
involved
2016-02-03 15:10 GMT+03:00 jeffrey E. <[email protected]>:
Where ? with whom? . I will do anything that is helpful to you. / He is very well respected with
both black and white hat hackers
On Wed, Feb 3, 2016 at 7:06 AM, Cepreil Bensucon < > wrote:
is it possible to meet with him?
2016-01-30 17:08 GMT+03:00 Jeffrey E. <jeevacation®gmail.com>:
For you alone
Forwarded message
From: Vincenzo Iozzo <I
Date: Saturday, 30 January 2016
Subject:
To: "jeffrey E." <[email protected]>
It's hard to tell w/o proper code/documentation (couldn't find much online). In general the four
things are:
EFTA00834680
1) the devil is in the details, meaning that even if in theory it's all solid the implementation
might have bugs. There's no definitive technical solution for that though
2) anything that is "custom" (eg: they have a custom wife protocol) is a red flag because it
means that it hasn't been properly vetted and might be broken/buggy
3) there aren't enough details online to tell but it seems to me that to speed up the blockchain
verification they partially centralize the network by using their own "supernodes" (essentially
the wallets talk to the supernodes vs the actual blockchain). The security of those servers seems
key to me and they gloss over it online
4) the mesh network implementation is completely up in the air (judging from what's public)
and it could go horribly wrong. So that needs further verification
Also (5), in general the disadvantage of distributed /open things is that it is a lot easier to steal
money vs a closed network (like swift).
Are you looking to invest into this thing? If so , I'd suggest a few things:
A) because problem (1) above is not completely solvable, they need to have a plan. Part of it is
technical (do continuous code auditing, pentesting, on board proper crypto people, etc), the
other part is legal/financial and pr. Specifically they should have some kind of insurance and
they should have a pr disaster recovery plan. A big disadvantage of decentralized system is that
you don't have anybody to trust and you don't have a closed network that can make stealing
money hard, they need to address that
B) realistically nobody is going to attack them until they become significant enough from a
financial standpoint. This gives them time to work on A. That said they should avoid making
enemies (the "disgruntled" hacker type)
Hope this is useful, if you get more stuff from them I'm happy to look into it more. Also if you
do invest I can help them with (A) if needed.
It's a very dumb platitude but "security is a process" is true.
Unrelated: checkout edge.org, I think you'll like it.
There's a short video with Minsky that is absolutely fantastic
Sent from my (phone
On Jan 30, 2016, at 11:26, jeffrey E. <jeevacation®gmail.com> wrote:
(as://mycelium.corn/phone/index.html). what are its weak points?
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
EFTA00834681
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C yamemiem,
C.E.e.runcoB
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C yna:Koment,
C.EemucoB
EFTA00834682
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
C yaahceintent,
C.Beiumos
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation®gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
EFTA00834683
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00834684
ℹ️ Document Details
SHA-256
352b6530d1f12950bad7e2b273b02b8f957b1acda326c2004b3afc074e7b3b26
Bates Number
EFTA00834680
Dataset
DataSet-9
Document Type
document
Pages
5