Skip to main content
Skip to content
Case File
efta-02472889DOJ Data Set 11Other

EFTA02472889

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02472889
Pages
2
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Sent: To: Subject: For you alone jeffrey E. <[email protected]> Saturday, January 30, 2016 2:08 PM 6eris K0B Cepreii Fwd: Forwarded messa e ------ =--- From: Vincenzo lozzo Date: Saturday, 30 January 2016 Subject= To: "jeffrey E." <[email protected] <mailto:[email protected] It's=hard to tell w/o proper code/documentation (couldn't find much online)= In general the four things are: 1) the dev=l is in the details, meaning that even if in theory it's all solid the=implementation might have bugs. There's no definitive technical soluti=n for that though 2) anything that is "=custom" (eg: they have a custom wifi protocol) is a red flag because =t means that it hasn't been properly vetted and might be broken/buggy=C2* 3) there aren't enough details online t= tell but it seems to me that to speed up the blockchain verification they=partially centralize the network by using their own "supernodes"=(essentially the wallets talk to the supernodes vs the actual blockchain).=The security of those servers seems key to me and they gloss over it onlin= 4) the mesh network implementation is completely=up in the air (judging from what's public) and it could go horribly wr=ng. So that needs further verification Also=(5), in general the disadvantage of distributed /open things is that it is=a lot easier to steal money vs a closed network (like swift). Are you looking to invest into this thing? If so , I'=d suggest a few things: A) because problem =1) above is not completely solvable, they need to have a plan. Part =f it is technical (do continuous code auditing, pentesting, on board prope= crypto people, etc), the other part is legal/financial and pr. Specifical=y they should have some kind of insurance and they should have a pr disast=r recovery plan. A big disadvantage of decentralized system is that you do='t have anybody to trust and you don't have a closed network that =an make stealing money hard, they need to address that B) realistically nobody is going to attack them until they beco=e significant enough from a financial standpoint. This gives them time to =ork on A. That said they should avoid making enemies (the "disgruntle=" hacker type) Hope this is useful, if=you get more stuff from them I'm happy to look into it more. Also if y=u do invest I can help them with (A) if needed. =div>It's a very dumb platitude but "security is a process" i= true. EFTA_R1_01585023 EFTA02472889 Unrelated: checkout edge.org <http:=/edge.org> , I think you'll like it. There's a short video with Minsky that is absolutely fantastic=C2* Sent from my (phone On Ja= 30, 2016, at 11:26, jeffrey E. <jeevacation@g=ail.com <javascript:_e(%7B%7D,'c=ml','[email protected]');> > wrote: (https://mycelium.com/phone/index.html). what are=its weak points? =C240 please note The information co=tained in this communication is confidential, may be attorney-client pr=vileged, may constitute inside information, and is intended only for JEE Unauthorized use= disclosure or copying of this communication or any part thereof is str=ctly prohibited and may be unlawful. If you have received this commu=ication in error, please notify us immediately by return e-mail or by e=mail to [email protected] <javascript:_e(%78%7D;[email protected]);> , and destroy=this communication and all copies thereof, including all attachments. c=pyright -all rights reserved =C24> please note The information container" in this communication is confidential, may be attorney-client privileg=d, may constitute inside information, and is intended only for the u=e of the addressee. It is the property of JEE Unauthorized use, disc=osure or copying of this communication or any part thereof is strictly =rohibited and may be unlawful. If you have received this communicati=n in error, please notify us immediately by return e-mail or by e-mail =o [email protected] <[email protected]> , and destroy this communication and all copies thereof, =ncluding all attachments. copyright -all rights reserved 2 EFTA_R1_01585024 EFTA02472890

Technical Artifacts (9)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainedge.org
Phone2472889
Phone2472890
URLhttps://mycelium.com/phone/index.html

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.