EFTA00873523
EFTA00873524 DataSet-9
EFTA00873528

EFTA00873524.pdf

DataSet-9 4 pages 1,096 words document
P17 D4 P19 V16 D6
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (1,096 words)
From: Jeffrey Epstein <jeevacation®grnail.com> To: Joi Ito <[email protected]> Subject: Re: [IP] How cryptography is a key weapon in the fight against empire states Date: Wed, 10 Jul 2013 13:33:01 +0000 deception, a great topic for seminar, other suggestsions 2 music as a lens into the brain, 3, signal intelligence in nature, 4. power and its uses, definition, of - physical financial , political emotional. intellectual. all may have the same underlying formulas. , 5. currencies, - social, financial, global, vs local, , barter, alternative currencies, complementary currenciess, virtual, . 6. evolution in physical systems. ? 7 . brains needs for social interaction, crowd, smells. would staying in solitary with flowers be enough . On Wed, Jul 10, 2013 at 9:23 AM, Joi Ito <[email protected]> wrote: Have you seen this: hup://en.wikipedia.org/wiki/Mimic_octopus I'll ask around to see if anyone has look at schooling/crypto. - Joi On Jul 10, 2013, at 09:20 , Jeffrey Epstein <[email protected]> wrote: I think schooling is natures form of stegonogrphy. .. The picture is false. the pixels are the individual fish, . just like the reverse where the changing color of the octopus and its patterns hide the mouth and teeth ( the hidden message ) On Wed, Jul 10, 2013 at 9:16 AM, Joi Ito tto.com> wrote: Cool. Let me talk to a few of my crypto friends and think about this. BTW, I'm on the board of http://epic.org/ we're taking the NSA to the supreme court. It's an interesting org. Also, let me know if you want me to put strong crypto on your computer. If you have a nerd around to install it for you, here's the link: For email and sending stuff: https://gpgtools.org/ For your files on your computer: http://www.truecrypt.org/ - Joi On Jul 10, 2013, at 08:05 , Jeffrey Epstein <[email protected]> wrote: thanks, if you think it would work throw out to the crypto community a 100k prize or any amount you choose , to find useful bio crypto research, the immune system as signal analysis, . dna as cyphertext. ? are cell signals , encoded, . do you need multiple cells to complete a signal - a form of quorum sensing, is schooling!( fish ) a good example of deception , only capable by group behavior. . camouflage , masking, decoding pheromones, ( chemcal , eletctrical topological ), EFTA00873524 prizes competitions , awards rewards, I will help On Wed, Jul 10, 2013 at 7:56 AM, Joi Ito [email protected]> wrote: Begin forwarded message: From: David Farber <[email protected]> Subject: How cryptography is a key weapon in the fight against empire states Date: July 10, 2013 07:40:13 -0400 To: "ip" <ipftlistbox.com> Reply-To: daveefarbernet Begin forwarded message: From: Dewayne Hendricks <dewayne warpspeed.com> Subject: [Dewayne-Net] How cryptography is a key weapon in the fight against empire states Date: July 10, 2013 6:59:28 AM EDT To: Multiple recipients of Dewayne-Net <dewayne-net warpspeed.com> Reply-To: [email protected] How cryptography is a key weapon in the fight against empire states What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger ones By Julian Assange July 9 2013 <http://www.guardian.co. uk/commentisfree/2013/juU09/cryptography-weapon-fight-emp ire-states- julian-assange> The original cypherpunks were mostly Californian libertarians. I was from a different tradition but we all sought to protect individual freedom from state tyranny. Cryptography was our secret weapon. It has been forgotten how subversive this was. Cryptography was then the exclusive property of states, for use in their various wars. By writing our own software and disseminating it far and wide we liberated cryptography, democratised it and spread it through the frontiers of the new intemet. The resulting crackdown, under various "arms trafficking" laws, failed. Cryptography became standardised in web browsers and other software that people now use on a daily basis. Strong cryptography is a vital tool in fighting state oppression. That is the message in my book,Cypherpunks. But the movement for the universal availability of strong cryptography must be made to do more than this. Our future does not lie in the liberty of individuals alone. Our work in WikiLeaks imparts a keen understanding of the dynamics of the international order and the logic of empire. During WikiLeaks' rise we have seen evidence of small countries bullied and dominated by larger ones or infiltrated by foreign enterprise and made to act against themselves. We have seen the popular will denied expression, elections bought and sold, and the riches of countries such as Kenya stolen and auctioned off to plutocrats in London and New York. The struggle for Latin American self-determination is important for many more people than live in Latin America, because it shows the rest of the world that it can be done. But Latin American independence is still in its infancy. Attempts at subversion of Latin American democracy are still EFTA00873525 happening, including most recently in Honduras, Haiti, Ecuador and Venezuela. [snip] Dewayne-Net RSS Feed: <http://www.warpspeed.corn/wordpress> Archives: https://www.listbox.com/member/archive/247/=now RSS Feed: https://www.listbox.com/member/archivekss/247/125455-bf3ec4b3 Modify Your Subscription: https://www.listbox.contember/? member_id=125455&id_secret=125455-1753ffc2 Unsubscribe Now: https://www.listbox.com/unsubscribenmemberid=125455&id_secret=125455- 1e5c6695&post id=20130710074022:7EC771A2-E955-11E2-B40A-99B1C5E774E4 Powered by Listbox: http://www.listbox.com *********************************************************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and EFTA00873526 destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00873527
ℹ️ Document Details
SHA-256
adc70ced0bf1b8f292780818444c75434ecf92a9573e2f8e84750e0a44b1ca3c
Bates Number
EFTA00873524
Dataset
DataSet-9
Document Type
document
Pages
4

Comments 0

Loading comments…
Link copied!