Case File
efta-02472798DOJ Data Set 11OtherEFTA02472798
Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02472798
Pages
2
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From:
Vincenzo lozzo
Sent:
Saturday, January 30, 2016 1:16 PM
To:
Jeffrey E.
Subject:
Re:
It's hard to tell w/o proper code/docu=entation (couldn't find much online). In general the four things are: =/div>
1) the devil is in the details, meaning that even if in theory it's all so=id the implementation might have bugs. There's no
definitive technical solu=ion for that though
2) anything that is "custom" (eg: they have a cu=tom wifi protocol) is a red flag because it means that it hasn't been
prope=ly vetted and might be broken/buggy
3) there aren't enough details o=line to tell but it seems to me that to speed up the blockchain verificatio= they partially
centralize the network by using their own "supernodes" (ess=ntially the wallets talk to the supernodes vs the actual
blockchain). The s=curity of those servers seems key to me and they gloss over it online =div id="AppleMailSignature">
4) t=e mesh network implementation is completely up in the air (judging from wha='s public) and it could go horribly
wrong. So that needs further verificati=n
Also (5), in general the disadvantage of distributed /open things i= that it is a lot easier to steal money vs a closed
network (like swift).</=iv>
=re you looking to invest into this thing? If so , I'd suggest a few t=ings:
A) because problem (1) above is not completely solvable,=they need to have a plan. Part of it is technical (do continuous
code audit=ng, pentesting, on board proper crypto people, etc), the other part is lega=/financial and pr. Specifically they
should have some kind of insurance and=they should have a pr disaster recovery plan. A big disadvantage of
decentr=lized system is that you don't have anybody to trust and you don't have a c=osed network that can make
stealing money hard, they need to address that&n=sp;
B) realistically nobody is going to attack them until they become sign=ficant enough from a financial standpoint. This
gives them time to work on A= That said they should avoid making enemies (the "disgruntled" hacker type)=nbsp;
Hope this is useful, if you get more stuff from them I'm happy to lo=k into it more. Also if you do invest I can help them
with (A) if needed.&n=sp;
It's a very dumb platitude but "security is a process" is true. <=div>
edge.org <http://edge.org> , I think you'l= like it.
There's a short video with Mi=sky that is absolutely fantastic =br>Sent from my Iphone
On Jan 30, 2016, at 11:=6, jeffrey E. <jeevacation@gmai=.com <mailto:[email protected]» wrote:
[email protected], and
EFTA_R1_01584913
EFTA02472798
destroy this communication and all copie= thereof,
including all attachments. copyright -all rights reserved
<=div>
2
EFTA_R1_01584914
EFTA02472799
Technical Artifacts (4)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.