EFTA00761574.pdf

DataSet-9 1 page 161 words document
👁 1 💬 0
📄 Extracted Text (161 words)
From: John Brockman < INIMI> To: Jeffrey Epstein <jeevacation®gmail.com> Subject: code Date: Mon, 22 Mar 2010 12:08:47 +0000 Can you go a little bit deeper for me re: meaning of "encryption methods are used in biological systems". Are you talking about scientists examining/revealing that there are natural biological encryption system that we are discovering, or is it more about synthetic biology where scientists are designing encryption for, say, the genomes the create? It matters because it's a different category of people to look for. ie, am I looking for a Venter or Mullis, or would it be the kind of people Steve Levy wrote about in Crypto (http://www.stevenlevy.com/index.php/other-books/crypto) or that Markoff is reporting on now in his NYT cyber-security series, or, say, someone who works for Microsoft or Google. JB Mobile John Brockman President, Edge Foundation, Inc. 5 East 59th Street New York, NY 10022 The Edge Annual Question 2010: HOW IS THE INTERNET CHANGING THE WAY YOU THINK? http://www.edge.org/q2010/q10_index.html EFTA00761574
ℹ️ Document Details
SHA-256
effe055b68c70b09582dba10a299d0b1ccb303f03413085fea7a5958a1ac29bb
Bates Number
EFTA00761574
Dataset
DataSet-9
Type
document
Pages
1

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!