Skip to main content
Skip to content
Case File
efta-01781926DOJ Data Set 10Other

EFTA01781926

Date
Unknown
Source
DOJ Data Set 10
Reference
efta-01781926
Pages
2
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Peter Thiel Sent: Monday, April 11, 2016 6:45 PM To: Jeffrey E. Subject: Re: FW: Jeff -- much longer discussion, but not sure I even made my questions clear= (1). I don't question that there is a line of evolutionary thinking under w=ich deception is highly adaptive (and in this sense, it is quite compatibl= with the findings of science). I meant it more as a question of the soci=logy of science: If there is a lot of deception in science, then there ar= a lot of fake scientists trying to get government grant money and thereby=replace the real scientists. I think this is a pretty big phenomenon and =eriously underestimated. (2). The related question of whether the amount of deception goes up or dow= over time is not about evolutionary biology (since I assume our evolution=ry nature doesn't change that quickly), but more about politics and techno=ogy. Thus, if there are better ways of detecting deception, then there ma= be less taking place (the cost/benefit calculus just shifts). And perhap= conversely, if there is a stronger government, then perhaps it will be ab=e to get away with more deception (think fascist/communist propaganda, or =rwell's 1984) and will find it easier to pretend that it is solving proble=s than actually to solve problems. --Peter From: Peter Thiel > Sent: Monday, Arm , From: Jeffrey E. [mailto:[email protected]) Sent: Monday, To: Peter Thiel Subject: briefly, trivers and I share the same belief in the major role of decept=on. a tool to protect or conquer free energy.. in essence if the =redator can read your algorithm, you are easy food . so deception is the=first line of defense as it usually the cheapest. if a prey knows its o=n algorithm it is open to interrogation. so nature hides it from the" =elf". Deceptive self confidence is also a winning game strategy. A=ts engage in the practise of mimetic. camouflage. , false direction. et=. To some extent, so do most viruses. ie since HIV clearly masquerades=itself as a unit of self. your question re is deception increasing, - =es as fast as methods of detection, note I assume you are awake please note EFTA_R1_00101355 EFTA01781926 The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected]<mailto:jeevacation@gmai=.com>, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved <?xml version=.0" encoding=TF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version=.0"> <dict> <key>date-last-viewed</key> <integer>0</integer> <key>date-received</key> <integer>146O40O291</integer> <key>flags</key> <integer>8590195717</integer> <key>gmail-label-ids</key> <array> <integer>2</integer> <integer>22</integer> </array> <key>remote-id</key> <string>603567</string> </dict> </plist> 2 EFTA_R1_00101356 EFTA01781927

Technical Artifacts (2)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

URLhttp://www.apple.com/DTDs/PropertyList-1.0.dtd

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.