EFTA01980463
EFTA01980465 DataSet-10
EFTA01980467

EFTA01980465.pdf

DataSet-10 2 pages 507 words document
P17 V16 P19 D6
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (507 words)
To: Charles L. Harper Jr. From: Jeffrey Epstein Sent Fri 11/12/2010 2:49:03 AM Subject: Re: Very interesting research area on the evolution of deception The signals , from one cell to another, are the things that undergo the first evolution or co- evolution„ the eavesdroppers , or free riders , get the benefit without cost. The deception or code , keeps the predator at bay, ( misdirection, camaflauge, mimicicry)// the alice -bob dynamic, is what I want. I need code theory experts, with a bioligical understanding. Not database mining, crypto's who want to understand origins of life. On Fri, Nov 12, 2010 at 2:57 AM, Charles L. Harper Jr. wrote: Dear Jeffrey, Quick note: I have done a bit more research on one area you mentioned to me last week. Darwin himself wrote a book on deception in orchids: "On the various contrivances by which orchids are fertilized by insects." (1885) I have discovered that there is a rich and broad-ranging contemporary research literature in this topical area. (I've found hundreds of papers as well as overview books, gene databases, etc.) Apparently, the rate of speciation-evolution in orchids having to do with food and sexual deception, and with plant-pollinator pairing and co-evolution is very rapid. It seems to be a rapidly expanding research field that is seriously connected into evolutionary theory and plant genetics. The topic is not (yet) connected in any way to issues in cryptography. However, I note extensive work on gene complexes called "MADS-box" genes in orchids. This kind of work relates to one of the significant research frontiers I mentioned: systems biology and evolution towards understanding the dynamics of variation: how does a plant specoes "learn" to re-create insect sex phermones as well as insect shapes? (Probably you will know Marc Kirschner at Harvard, who is a key pioneer in systems biology and research on the "evolution of evolution" dynamics of variation). I have identified some serious plant geneticists working in this arena. I think there may be potential to connect with innovation agendas in cryptography pursuing "nature inspired" approaches. For example, the work of the cryptologist John A. Clark (See: http://www- thet s cs.vork.ac ttk Jac tV.ndf): Paper: "Nature-Inspired Cryptography: Past, Present and Future." (2003) and EFTA_R1_004613611 EFTA01980465 Paper: "Fusing Natural Computational Paradigms for Cryptography: Or, How to Create Quantum Solvable Cryptographic Problems with Heuristic Search." (2006) This note relays a quick pass only into the literature to report that there seems to be a lot there that looks seriously interesting. Allbest, Charles Harper ************* The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to ice% acationagmail coin, and destroy this communication and all copies thereof, including all attachments. EFTA_R1_00468612 EFTA01980466
ℹ️ Document Details
SHA-256
9ea3e0343bf8ed3b9050f8d90875dcbf2ed7643ed0a839f2ed1743a4187a59bf
Bates Number
EFTA01980465
Dataset
DataSet-10
Document Type
document
Pages
2

Comments 0

Loading comments…
Link copied!