Truth Tide TV UNSEALED 1419 Files · 74547 Email Threads
menu
videocam Videos headphones Audio description Documents mail Email analytics Reports article Articles auto_stories Narratives search Search
policy Investigate expand_more
inbox Inbox 74547 send Sent 28705 label All Mail 74547 attach_file Attachments 1907 topic Topics
People
Jeffrey Epstein person
Ghislaine Maxwell person
Bill Clinton person
Alan Dershowitz person
Elon Musk person
Bill Gates person
Ehud Barak person
Reid Hoffman person
Peter Thiel person
Larry Summers person
Prince Andrew person
Steve Bannon person
Masha Bucher person
Jason Calcanis
Michael Wolff person
Noam Chomsky person
Tom Pritzker person
Al Seckel person
Kimbal Musk person
Karyna Shuliak person
Deepak Chopra person
Ken Starr person
Peter Attia person
Jeremy Rubin person
Neri Oxman person
Marvin Minsky person
Lawrence Krauss person
Seth Lloyd person
Boris Nikolic person
Jean Luc Brunel person
Lesley Groff person
Sarah Kellen person
Nadia Marcinkova person
Darren Indyke person
Mark Epstein person
Emad Hanna person
Joscha Bach person
Rich Kahn person
Cecelia Steen
John Amerling person
Sultan Bin Sulayem person
Matthew Hitzik
Peter Mandelson person
groups People directory
74547 threads 209740 messages
arrow_back

Re: Project discussion & proposal document attached

3 messages picture_as_pdf Source PDF
C
Charles L. Harper Jr. Nov 4, 2010 10:30 PM
To
jeevacation@gmail.com

Dear Jeffrey,

Please find attached a project discussion and proposal document in reply to your request.

Allbest,

EFTA00752492

Charles Harper


The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein

Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments.

EFTA00752493

J
jeevacation@gmail.com Nov 5, 2010 3:27 AM

great proposal„ however, it needs to be more around deception alice -bob. communication. virus hacking, battle between defense and infiltration.. computation is already looked at in various fields. camoflauge , mimickry, signal processing, and its non random nature, misinformation. ( the anti- truth - but right answer for the moment ).. computation does not involve defending against interception, a key area for biological systems, if a predator breaks the code, it usually can accumulate its preys free energy at a discount . self deception, ( necessary to prevent accidental disclosure of inate algorithms. WE need more hackers , also interested in biological hacking , security, etc.

C
Charles L. Harper Jr. Nov 5, 2010 11:15 AM
To
jeevacation@gmail.com

Hi Jeffrey, Thanks for quick feedback! I can begin to work on issues you've raised if you decide to go forward contracting my services. Allbest, -Charles Harper

PS. I've only touched on a few issues thus far via a few days effort only. I've been focused on the strongly encouraging input from Scott Aaronson and Seth Lloyd on the topic you set: "Cryptography in Nature." Both of them independently saw the topic as an innovative way to engage deep issues at the interface between computation (modem cryptography being within the theory of computation) and both physics and biology. Biology/evolution succeeds in all sorts of computationally hard tasks. It is not understood quite how and this area of inquiry is seen as a way to open up deep discovery agendas. This includes, on the physics side, new areas in quantum computation which, as you know is at the cutting-edge of code-cracking agendas today due to Shore's Algorithm and the way that future quantum computers using it could do fast prime-factoring. Also, molecular computation, especially via DNA, allows code-cracking-type computation possibilities. Your comments suggest there may be value in pursuing innovators who are at the cutting edge in immunology as well as in predator-prey competition-innovation cycles in (computationally-modeled?) evolution. On the issue of actual cryptography, the problem is that much of the serious action will be behind closed doors.

1419 files from the DOJ Epstein case media release. All files are public records from justice.gov.

Built by Truth Tide TV