Case File
efta-02508368DOJ Data Set 11OtherEFTA02508368
Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02508368
Pages
1
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From:
Vincenzo lozzo
Sent:
Tuesday, March 10, 2015 1:02 PM
To:
Joichi Ito
Cc:
Jeffrey E.
Subject:
epiphany of the day: the market for algo trading strategies are just like the one for
exploits
I had this feeling for a while but today I bumped into this: =ttps://www.quantopian.com/ essentially you go there,
submit your algo trading strategy and then if =ou beat the returns of the other contestants you get $100k.
Now at first I wasn't sure the parallel would hold but then I realized =hat for most non institutional investors (eg: the
engineer good at =ignal processing), the trading fees make most of these strategies unprofitable. Hence their only
chance of making money of out their work =s either to go work for an institutional investor OR use stuff like =uantopian.
In the exploitation world it used to be the case that you would just go =head and use them because you'd never get
caught/nobody cared, these =ays you only use them if you're either a criminal or a nation-state =ence why there are
similar competitions.
The interesting questions (both ways), consequences are:
1) In cyber-sec there's also a market for vulnerabilities (essentially =he building blocks of exploits), can there be a market
for the =quivalent in finance? and if so, what would that be? submission of =tatistical correlation between
stocks/currencies/etc etc?
2) In security the actors are becoming more and more a commodity, is =hat going to happen in finance as well?
3) In security bugs/exploits are countered by software vendors, whereas =n finance strategies are render useless by the
'efficiency' of the =arket. What are the commonalities/differences? I can think of many.. =?xml version=.0" encoding=TF-
8"?> <IDOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version=.0">
<dict>
<key>conversation-idgkey>
<integer>122806</integer>
<key>date-last-viewed</key>
<integer>0</integer>
<key>date-received</key>
<integer>1425992551</integer>
<key>flags</key>
<integer>8590195713</integer>
<key>gmail-label-ids</key>
<array>
<integer>6</integer>
<integer>2</integer>
</array>
<key>remote-id</key>
<string>488381</string>
</diet>
</plist>
EFTA_R1_01639366
EFTA02508368
Technical Artifacts (4)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Domain
www.quantopian.comPhone
2508368Phone
5992551URL
http://www.apple.com/DTDs/PropertyList-1.0.dtdRelated Documents (6)
DOJ Data Set 10OtherUnknown
EFTA02053996
1p
DOJ Data Set 11OtherUnknown
EFTA02662396
1p
DOJ Data Set 9OtherUnknown
From: "Jeffrey E." <[email protected]>
1p
DOJ Data Set 9OtherUnknown
From: Joi Ito
1p
DOJ Data Set 9OtherUnknown
From: "Jeffrey E." <[email protected]>
2p
DOJ Data Set 9OtherUnknown
From: "jeffrey E." <[email protected]>
1p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.