Case File
efta-efta00825463DOJ Data Set 9OtherFrom: Vincenzo Iozzo
Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00825463
Pages
5
Persons
0
Integrity
No Hash Available
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo Iozzo
To: "Jeffrey E." <jeevacation®gmail.com>
Cc: Jeremy Rubin <IMI
>
Subject: Re: DNC docs
Date: Thu, 16 Jun 2016 13:48:52 +0000
So to model this in computer lingo, we are thinking about race conditions(it's a class of vulnerabilities btw).
Two potential scenarios are
I) a non-sync'ed side channel that grants the same "rights" on the underlying asset/resource, so you exploit the
time-to-sync delta
2) you exploit the delta between "time of check" and "time of use", which could happen if there are extra hops in
between the use and the check and you can use the time to do something valuable.
Does this sound accurate?
I need to look more into trade dates and stuff cause I don't know enough to see if they match the pattern
Sent from my Iphone
On Jun 16, 2016, at 09:32, jeffrey E. <jeevacation®gmail.com> wrote:
there are other more esoteric questions. trade date, setllement date? missions. ( especially interesting ) as
if never happended? guarantees/ value? intra co debt.? if you owe money to a wholly owned personal co. is
it still debt
On Thu, Jun 16, 2016 at 9:28 AM, Vincenzo lozzo <
> wrote:
Ahh I get now why it's somewhat illegal today. there must be other latency-type of things you can do today
that follow the same pattern and are legal. Bitcoin and the whole "prevent double-spending" thing is a
somewhat poor attempt at avoiding the "permanent" version of what you're describing
But yeah that's very good thinking :)
Sent from my Iphone
On Jun 16, 2016, at 08:26, jeffrey E. <jeevacation®gmail.com> wrote:
the quantum phenomenon of being at two or more places at the same time, . :).. if i hand you a signed
check at closing. query when does the transaction close ?
On Thu, Jun 16, 2016 at 7:06 AM, Vincenzo Iozzo <
wrote:
Roger :)
Sent from my Iphone
EFTA00825463
On Jun 16, 2016, at 07:05, jeffrey E. <jeevacation®gmail.com> wrote:
face to face
On Thu, Jun 16, 2016 at 7:04 AM, Vincenzo Iozzo <
> wrote:
Hmm why is it illegal?
Sent from my Iphone
On Jun 16, 2016, at 07:01, jeffrey E. <jeevacation®gmail.com> wrote:
yes, but that was long ago ,and now somewhat ilegal
On Thu, Jun 16, 2016 at 6:29 AM, Vincenzo Iozzo <
> wrote:
Btw, unrelated, I was told about the jumping between banks for interests trick you pulled a while
ago, that was smart. Hats off
Sent from my Iphone
On Jun 16, 2016, at 06:24, jeffrey E. <[email protected]> wrote:
yes, that makes sense, as long as milliseconds transalates to profit,
On Thu, Jun 16, 2016 at 6:11 AM, Vincenzo lozzo <
wrote:
Actually the better example is: "if we can shave off a couple of milliseconds when we execute
the trade"
But yeah, it's a bit moot anyway
Sent from my Iphone
On Jun 16, 2016, at 06:05, jeffrey E. <[email protected]> wrote:
I dont know of any that woudl open their books. also most are probablistic , so an increase
wouldnt be easily determinative
On Thu, Jun 16, 2016 at 5:23 AM, Vincenzo Iozzo <
> wrote:
Btw do you know anybody well that does quantitative trading/hfi? I have been thinking of
trying a new type of consulting where the formula is roughly
"I audit your code, if I find anything that can be optimized I get 10% cut of the extra
revenue you make thanks to the optimization"
Technically it's not restricted to hedge funds (eg: this would work equally well for Google
and the likes) but the connection between optimized code and increased revenue is
probably clearer for hedge funds, plus they have a lot of customized code so higher
chances that they messed up something
EFTA00825464
Sent from my (phone
On Jun 15, 2016, at 18:22, jeffrey E. <[email protected]> wrote:
fun, but the only important ones would be hillarys secret
On Wed, Jun 15, 2016 at 5:54 PM, Vincenzo Iozzo <
> wrote:
Sent from my (phone
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
EFTA00825465
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
EFTA00825466
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
please note
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
JEE
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00825467
Technical Artifacts (1)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Email
[email protected]Related Documents (6)
DOJ Data Set 9OtherUnknown
From: Jeremy Rubin
1p
DOJ Data Set 9OtherUnknown
From: "Jeffrey E." <[email protected]>
4p
DOJ Data Set 9OtherUnknown
From: Jeremy Rubin
1p
DOJ Data Set 9OtherUnknown
From: Vincenzo Iozzo
1p
DOJ Data Set 9OtherUnknown
From: Vincenzo Iozzo
4p
DOJ Data Set 9OtherUnknown
From: Jeremy Rubin <MI
5p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.