EFTA00761574.pdf
👁 1
💬 0
📄 Extracted Text (161 words)
From: John Brockman < INIMI>
To: Jeffrey Epstein <jeevacation®gmail.com>
Subject: code
Date: Mon, 22 Mar 2010 12:08:47 +0000
Can you go a little bit deeper for me re: meaning of "encryption methods are used in
biological systems". Are you talking about scientists examining/revealing that there are
natural biological encryption system that we are discovering, or is it more about synthetic
biology where scientists are designing encryption for, say, the genomes the create? It
matters because it's a different category of people to look for. ie, am I looking for a
Venter or Mullis, or would it be the kind of people Steve Levy wrote about in Crypto
(http://www.stevenlevy.com/index.php/other-books/crypto) or that Markoff is reporting on now
in his NYT cyber-security series, or, say, someone who works for Microsoft or Google.
JB
Mobile
John Brockman
President, Edge Foundation, Inc.
5 East 59th Street
New York, NY 10022
The Edge Annual Question 2010:
HOW IS THE INTERNET CHANGING THE WAY YOU THINK?
http://www.edge.org/q2010/q10_index.html
EFTA00761574
ℹ️ Document Details
SHA-256
effe055b68c70b09582dba10a299d0b1ccb303f03413085fea7a5958a1ac29bb
Bates Number
EFTA00761574
Dataset
DataSet-9
Type
document
Pages
1
💬 Comments 0