Skip to main content
Skip to content
Case File
efta-02472798DOJ Data Set 11Other

EFTA02472798

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02472798
Pages
2
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo lozzo Sent: Saturday, January 30, 2016 1:16 PM To: Jeffrey E. Subject: Re: It's hard to tell w/o proper code/docu=entation (couldn't find much online). In general the four things are: =/div> 1) the devil is in the details, meaning that even if in theory it's all so=id the implementation might have bugs. There's no definitive technical solu=ion for that though 2) anything that is "custom" (eg: they have a cu=tom wifi protocol) is a red flag because it means that it hasn't been prope=ly vetted and might be broken/buggy 3) there aren't enough details o=line to tell but it seems to me that to speed up the blockchain verificatio= they partially centralize the network by using their own "supernodes" (ess=ntially the wallets talk to the supernodes vs the actual blockchain). The s=curity of those servers seems key to me and they gloss over it online =div id="AppleMailSignature"> 4) t=e mesh network implementation is completely up in the air (judging from wha='s public) and it could go horribly wrong. So that needs further verificati=n Also (5), in general the disadvantage of distributed /open things i= that it is a lot easier to steal money vs a closed network (like swift).</=iv> =re you looking to invest into this thing? If so , I'd suggest a few t=ings: A) because problem (1) above is not completely solvable,=they need to have a plan. Part of it is technical (do continuous code audit=ng, pentesting, on board proper crypto people, etc), the other part is lega=/financial and pr. Specifically they should have some kind of insurance and=they should have a pr disaster recovery plan. A big disadvantage of decentr=lized system is that you don't have anybody to trust and you don't have a c=osed network that can make stealing money hard, they need to address that&n=sp; B) realistically nobody is going to attack them until they become sign=ficant enough from a financial standpoint. This gives them time to work on A= That said they should avoid making enemies (the "disgruntled" hacker type)=nbsp; Hope this is useful, if you get more stuff from them I'm happy to lo=k into it more. Also if you do invest I can help them with (A) if needed.&n=sp; It's a very dumb platitude but "security is a process" is true. <=div> edge.org <http://edge.org> , I think you'l= like it. There's a short video with Mi=sky that is absolutely fantastic =br>Sent from my Iphone On Jan 30, 2016, at 11:=6, jeffrey E. <jeevacation@gmai=.com <mailto:[email protected]» wrote: [email protected], and EFTA_R1_01584913 EFTA02472798 destroy this communication and all copie= thereof, including all attachments. copyright -all rights reserved <=div> 2 EFTA_R1_01584914 EFTA02472799

Technical Artifacts (4)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Phone2472798
Phone2472799
URLhttp://edge.org

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.