EFTA02472795
EFTA02472798 DataSet-11
EFTA02472800

EFTA02472798.pdf

DataSet-11 2 pages 437 words document
P17 V16 P24 V15 D3
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (437 words)
From: Vincenzo lozzo Sent: Saturday, January 30, 2016 1:16 PM To: Jeffrey E. Subject: Re: It's hard to tell w/o proper code/docu=entation (couldn't find much online). In general the four things are: =/div> 1) the devil is in the details, meaning that even if in theory it's all so=id the implementation might have bugs. There's no definitive technical solu=ion for that though 2) anything that is "custom" (eg: they have a cu=tom wifi protocol) is a red flag because it means that it hasn't been prope=ly vetted and might be broken/buggy 3) there aren't enough details o=line to tell but it seems to me that to speed up the blockchain verificatio= they partially centralize the network by using their own "supernodes" (ess=ntially the wallets talk to the supernodes vs the actual blockchain). The s=curity of those servers seems key to me and they gloss over it online =div id="AppleMailSignature"> 4) t=e mesh network implementation is completely up in the air (judging from wha='s public) and it could go horribly wrong. So that needs further verificati=n Also (5), in general the disadvantage of distributed /open things i= that it is a lot easier to steal money vs a closed network (like swift).</=iv> =re you looking to invest into this thing? If so , I'd suggest a few t=ings: A) because problem (1) above is not completely solvable,=they need to have a plan. Part of it is technical (do continuous code audit=ng, pentesting, on board proper crypto people, etc), the other part is lega=/financial and pr. Specifically they should have some kind of insurance and=they should have a pr disaster recovery plan. A big disadvantage of decentr=lized system is that you don't have anybody to trust and you don't have a c=osed network that can make stealing money hard, they need to address that&n=sp; B) realistically nobody is going to attack them until they become sign=ficant enough from a financial standpoint. This gives them time to work on A= That said they should avoid making enemies (the "disgruntled" hacker type)=nbsp; Hope this is useful, if you get more stuff from them I'm happy to lo=k into it more. Also if you do invest I can help them with (A) if needed.&n=sp; It's a very dumb platitude but "security is a process" is true. <=div> edge.org <http://edge.org> , I think you'l= like it. There's a short video with Mi=sky that is absolutely fantastic =br>Sent from my Iphone On Jan 30, 2016, at 11:=6, jeffrey E. <jeevacation@gmai=.com <mailto:[email protected]» wrote: [email protected], and EFTA_R1_01584913 EFTA02472798 destroy this communication and all copie= thereof, including all attachments. copyright -all rights reserved <=div> 2 EFTA_R1_01584914 EFTA02472799
ℹ️ Document Details
SHA-256
9758470a98cb5da5fee1dd4fda9937badb175b9294678aebf1e4dbb05ec42a2a
Bates Number
EFTA02472798
Dataset
DataSet-11
Document Type
document
Pages
2

Comments 0

Loading comments…
Link copied!