Case File
efta-02427049DOJ Data Set 11OtherEFTA02427049
Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02427049
Pages
1
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
To:
Jeffrey Epsteinfleeyacation©gmail.com]
From:
John Brockman
Sent:
Mon 3/22/2010 12:08:47 PM
Subject:
code
Can you go a little bit deeper for me re: meaning of "encryption methods are used
in biological systems". Are you talking about scientists examining/revealing that
there are natural biological encryption system that we are discovering, or is it
more about synthetic biology where scientists are designing encryption for, say,
the genomes the create? It matters because it's a different category of people to
look for. ie, am I looking for a Venter or Mullis, or would it be the kind of
people Steve Levy wrote about in crypto
(http://www.stevenlevy.com/index.php/other-books/crypto) or that Markoff is
reporting on now in his NYT cyber-security series, or, say, someone who works for
Microsoft or Google.
JB
Mobile
John Brockman
President Ed e Foundation, Inc.
New York, NY 10022
The Edge Annual Question 2010:
HOW IS THE INTERNET CHANGING THE WAY YOU THINK?
http://www.edge.org/g2010/q10_index.html
EFTA_R1_01496117
EFTA02427049
Technical Artifacts (4)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Domain
gmail.comPhone
2427049URL
http://www.edge.org/g2010/q10_index.htmlURL
http://www.stevenlevy.com/index.php/other-books/cryptoRelated Documents (6)
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.