Skip to main content
Skip to content
Case File
efta-efta00752492DOJ Data Set 9Other

From: "Charles L. Harper Jr."

Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00752492
Pages
2
Persons
0
Integrity
No Hash Available

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: "Charles L. Harper Jr." To: Jeffrey Epstein <[email protected]> Subject: Re: Project discussion & proposal document attached Date: Fri, 05 Nov 2010 11:15:58 +0000 Hi Jeffrey, Thanks for quick feedback! I can begin to work on issues you've raised if you decide to go forward contracting my services. Allbest, -Charles Harper PS. I've only touched on a few issues thus far via a few days effort only. I've been focused on the strongly encouraging input from Scott Aaronson and Seth Lloyd on the topic you set: "Cryptography in Nature." Both of them independently saw the topic as an innovative way to engage deep issues at the interface between computation (modem cryptography being within the theory of computation) and both physics and biology. Biology/evolution succeeds in all sorts of computationally hard tasks. It is not understood quite how and this area of inquiry is seen as a way to open up deep discovery agendas. This includes, on the physics side, new areas in quantum computation which, as you know is at the cutting-edge of code-cracking agendas today due to Shore's Algorithm and the way that future quantum computers using it could do fast prime-factoring. Also, molecular computation, especially via DNA, allows code-cracking-type computation possibilities. Your comments suggest there may be value in pursuing innovators who are at the cutting edge in immunology as well as in predator-prey competition-innovation cycles in (computationally-modeled?) evolution. On the issue of actual cryptography, the problem is that much of the serious action will be behind closed doors. On Nov 5, 2010, at 3:27 AM, Jeffrey Epstein wrote: great proposal„ however, it needs to be more around deception alice -bob. communication. virus hacking, battle between defense and infiltration.. computation is already looked at in various fields. camoflauge , mimickry, signal processing, and its non random nature, misinformation. ( the anti- truth - but right answer for the moment ).. computation does not involve defending against interception, a key area for biological systems, if a predator breaks the code, it usually can accumulate its preys free energy at a discount . self deception, ( necessary to prevent accidental disclosure of inate algorithms. WE need more hackers , also interested in biological hacking , security, etc. On Thu, Nov 4, 2010 at 10:30 PM, Charles L. Harper Jr. < > wrote: Dear Jeffrey, Please find attached a project discussion and proposal document in reply to your request. Allbest, EFTA00752492 Charles Harper The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. EFTA00752493

Technical Artifacts (1)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.