📄 Extracted Text (285 words)
From: Jeffrey Epstein <[email protected]>
To: John Brockman
Subject: Re: code
Date: Mon, 22 Mar 2010 12:21:30 +0000
no in essence someone who is familiar with siganl processing, wavelet analysis, more like nsa types, no biology
experience necessary. theorists on codes /. not programmers. experts in Alice and bob communication
On Mon, Mar 22, 2010 at 8:08 AM, John Brockman -tj > wrote:
Can you go a little bit deeper for me re: meaning of "encryption methods are used in biological systems". Are
you talking about scientists examining/revealing that there are natural biological encryption system that we are
discovering, or is it more about synthetic biology where scientists are designing encryption for, say, the
genomes the create? It matters because it's a different category of people to look for. ie, am I looking for a
Venter or Mullis, or would it be the kind of people Steve Levy wrote about in Crypto
) or that Markoff is reporting on now in his NYT
cyber-security series, or, say, someone who works for Microsoft or Google.
JB
Mobile
John Brockman
President, Edge Foundation, Inc.
New York, NY 10022
The Edge Annual Question 2010:
HOW IS THE INTERNET CHANGING THE WAY YOU THINK?
http://www.edge.org/q2010/ 10_index.html
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation®gmail.com, and
destroy this communication and all copies thereof,
including all attachments.
EFTA00890116
ℹ️ Document Details
SHA-256
fbd855b92d7ca1ea96efd63dedc4f11bdf6258946552392b60c164de814354fd
Bates Number
EFTA00890116
Dataset
DataSet-9
Document Type
document
Pages
1