Case File
efta-efta00698741DOJ Data Set 9OtherFrom: Vincenzo Iozzo
Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00698741
Pages
3
Persons
0
Integrity
No Hash Available
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo Iozzo
To: "jeffrey E." <[email protected]>
Subject: Re: Speech at the EU parliament
Date: Mon, 28 Sep 2015 11:06:30 +0000
Unrelated, but I think you'd like this site: http://nautil.us
It's a "science" magazine
Sent from my Iphone
On Sep 28, 2015, at 18:39, jeffrey E. [email protected]> wrote:
great
On Mon, Sep 28, 2015 at 6:36 AM, Vincenzo Iozzo <
> wrote:
Yeah good point, will run through it and simplify!
Btw a fancier way of saying the market for lemon thing is that attackers are adaptive players, so "back
testing" on previous data doesn't give you a good indication of whether the product will protect you in the
future or not
Anyway thanks again for reading it! You alright?
Sent from my Iphone
On Sep 28, 2015, at 18:33, jeffrey E. [email protected]> wrote:
try to make the talk more to a 6th gradee level.. overly long complex sentences put people to sleep
On Mon, Sep 28, 2015 at 6:31 AM, Vincenzo Iozzo <
> wrote:
Thanks for reading it. Noted on sentences, I tend to write overly long ones
Cost center: with the exception of anti-fraud and stuff that boosts customers confidence, people buy
(defensive) security stuff either because of fear, regulation or because they might lose money/IP
otherwise.
Market for lemons: for most products it's impossible to tell whether they work or not because it's
impossible to fully predict what a new attack will look like. Which means that you cannot really test
them
Sent from my Iphone
On Sep 28, 2015, at 18:23, jeffrey E. <[email protected]> wrote:
EFTA00698741
Security is a cost center for
nearly all organizations and it is also a perfect market for lemons.??
sentences shuld be simplified
On Sun, Sep 27, 2015 at 9:30 PM, Vincenzo lozzo <
> wrote:
Jeffrey,
I'm giving a 15min speech at the EU parliament next week on the regulation of intrusion/surveillance
software.
Attached my notes for the talk, if you have time to go through them and have some feedback that
would be great. I think you'd be a good example of the target audience. Thank you!
How are things otherwise?
Take care,
Vincenzo
Sent from my Iphone
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
EFTA00698742
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in en-or, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00698743
Technical Artifacts (4)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Related Documents (6)
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.