Skip to main content
Skip to content
Case File
efta-02441651DOJ Data Set 11Other

EFTA02441651

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02441651
Pages
1
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
To: Jeevacation[jeevacationegmaitcom] From: Corina Tamita Sent Mon 8/24/2009 10:26:46 PM dear jeffrey, i briefly looked into what we discussed and the most promising approach seems to be a parallel between computer and network security and infection biology. it seems no one has done it and that amazes me -- because the more i think about it the more clear it seems. one example: when you get a computer virus, no anti-virus is good enough to remove it completely. it will inactivate it and you won't be bothered by it anymore, but its remnants will be left somewhere on your computer. this seems to be a perfect analog of the junk that is left in the DNA. i discussed it with a couple of people and they seemed really interested in such a parallel. right now, what would be great would be to find theorems in computer and network security that could then be translated into infection biology. that could bring so much insight. I'm looking into potential people to discuss this with -- ron rivest at mit is very well known but probably very busy. i have to find someone lower in the food chain first... c EFTA_R1_01516216 EFTA02441651

Technical Artifacts (1)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Phone2441651

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.