Skip to main content
Skip to content
Case File
efta-efta00698741DOJ Data Set 9Other

From: Vincenzo Iozzo

Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00698741
Pages
3
Persons
0
Integrity
No Hash Available

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo Iozzo To: "jeffrey E." <[email protected]> Subject: Re: Speech at the EU parliament Date: Mon, 28 Sep 2015 11:06:30 +0000 Unrelated, but I think you'd like this site: http://nautil.us It's a "science" magazine Sent from my Iphone On Sep 28, 2015, at 18:39, jeffrey E. [email protected]> wrote: great On Mon, Sep 28, 2015 at 6:36 AM, Vincenzo Iozzo < > wrote: Yeah good point, will run through it and simplify! Btw a fancier way of saying the market for lemon thing is that attackers are adaptive players, so "back testing" on previous data doesn't give you a good indication of whether the product will protect you in the future or not Anyway thanks again for reading it! You alright? Sent from my Iphone On Sep 28, 2015, at 18:33, jeffrey E. [email protected]> wrote: try to make the talk more to a 6th gradee level.. overly long complex sentences put people to sleep On Mon, Sep 28, 2015 at 6:31 AM, Vincenzo Iozzo < > wrote: Thanks for reading it. Noted on sentences, I tend to write overly long ones Cost center: with the exception of anti-fraud and stuff that boosts customers confidence, people buy (defensive) security stuff either because of fear, regulation or because they might lose money/IP otherwise. Market for lemons: for most products it's impossible to tell whether they work or not because it's impossible to fully predict what a new attack will look like. Which means that you cannot really test them Sent from my Iphone On Sep 28, 2015, at 18:23, jeffrey E. <[email protected]> wrote: EFTA00698741 Security is a cost center for nearly all organizations and it is also a perfect market for lemons.?? sentences shuld be simplified On Sun, Sep 27, 2015 at 9:30 PM, Vincenzo lozzo < > wrote: Jeffrey, I'm giving a 15min speech at the EU parliament next week on the regulation of intrusion/surveillance software. Attached my notes for the talk, if you have time to go through them and have some feedback that would be great. I think you'd be a good example of the target audience. Thank you! How are things otherwise? Take care, Vincenzo Sent from my Iphone please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this EFTA00698742 communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in en-or, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00698743

Technical Artifacts (4)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.