Re: Project discussion & proposal document attached
Dear Jeffrey,
Please find attached a project discussion and proposal document in reply to your request.
Allbest,
EFTA00752492
Charles Harper
The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein
Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments.
EFTA00752493
great proposal„ however, it needs to be more around deception alice -bob. communication. virus hacking, battle between defense and infiltration.. computation is already looked at in various fields. camoflauge , mimickry, signal processing, and its non random nature, misinformation. ( the anti- truth - but right answer for the moment ).. computation does not involve defending against interception, a key area for biological systems, if a predator breaks the code, it usually can accumulate its preys free energy at a discount . self deception, ( necessary to prevent accidental disclosure of inate algorithms. WE need more hackers , also interested in biological hacking , security, etc.
Hi Jeffrey, Thanks for quick feedback! I can begin to work on issues you've raised if you decide to go forward contracting my services. Allbest, -Charles Harper
PS. I've only touched on a few issues thus far via a few days effort only. I've been focused on the strongly encouraging input from Scott Aaronson and Seth Lloyd on the topic you set: "Cryptography in Nature." Both of them independently saw the topic as an innovative way to engage deep issues at the interface between computation (modem cryptography being within the theory of computation) and both physics and biology. Biology/evolution succeeds in all sorts of computationally hard tasks. It is not understood quite how and this area of inquiry is seen as a way to open up deep discovery agendas. This includes, on the physics side, new areas in quantum computation which, as you know is at the cutting-edge of code-cracking agendas today due to Shore's Algorithm and the way that future quantum computers using it could do fast prime-factoring. Also, molecular computation, especially via DNA, allows code-cracking-type computation possibilities. Your comments suggest there may be value in pursuing innovators who are at the cutting edge in immunology as well as in predator-prey competition-innovation cycles in (computationally-modeled?) evolution. On the issue of actual cryptography, the problem is that much of the serious action will be behind closed doors.
