Skip to main content
Skip to content
Case File
efta-efta00825463DOJ Data Set 9Other

From: Vincenzo Iozzo

Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00825463
Pages
5
Persons
0
Integrity
No Hash Available

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo Iozzo To: "Jeffrey E." <jeevacation®gmail.com> Cc: Jeremy Rubin <IMI > Subject: Re: DNC docs Date: Thu, 16 Jun 2016 13:48:52 +0000 So to model this in computer lingo, we are thinking about race conditions(it's a class of vulnerabilities btw). Two potential scenarios are I) a non-sync'ed side channel that grants the same "rights" on the underlying asset/resource, so you exploit the time-to-sync delta 2) you exploit the delta between "time of check" and "time of use", which could happen if there are extra hops in between the use and the check and you can use the time to do something valuable. Does this sound accurate? I need to look more into trade dates and stuff cause I don't know enough to see if they match the pattern Sent from my Iphone On Jun 16, 2016, at 09:32, jeffrey E. <jeevacation®gmail.com> wrote: there are other more esoteric questions. trade date, setllement date? missions. ( especially interesting ) as if never happended? guarantees/ value? intra co debt.? if you owe money to a wholly owned personal co. is it still debt On Thu, Jun 16, 2016 at 9:28 AM, Vincenzo lozzo < > wrote: Ahh I get now why it's somewhat illegal today. there must be other latency-type of things you can do today that follow the same pattern and are legal. Bitcoin and the whole "prevent double-spending" thing is a somewhat poor attempt at avoiding the "permanent" version of what you're describing But yeah that's very good thinking :) Sent from my Iphone On Jun 16, 2016, at 08:26, jeffrey E. <jeevacation®gmail.com> wrote: the quantum phenomenon of being at two or more places at the same time, . :).. if i hand you a signed check at closing. query when does the transaction close ? On Thu, Jun 16, 2016 at 7:06 AM, Vincenzo Iozzo < wrote: Roger :) Sent from my Iphone EFTA00825463 On Jun 16, 2016, at 07:05, jeffrey E. <jeevacation®gmail.com> wrote: face to face On Thu, Jun 16, 2016 at 7:04 AM, Vincenzo Iozzo < > wrote: Hmm why is it illegal? Sent from my Iphone On Jun 16, 2016, at 07:01, jeffrey E. <jeevacation®gmail.com> wrote: yes, but that was long ago ,and now somewhat ilegal On Thu, Jun 16, 2016 at 6:29 AM, Vincenzo Iozzo < > wrote: Btw, unrelated, I was told about the jumping between banks for interests trick you pulled a while ago, that was smart. Hats off Sent from my Iphone On Jun 16, 2016, at 06:24, jeffrey E. <[email protected]> wrote: yes, that makes sense, as long as milliseconds transalates to profit, On Thu, Jun 16, 2016 at 6:11 AM, Vincenzo lozzo < wrote: Actually the better example is: "if we can shave off a couple of milliseconds when we execute the trade" But yeah, it's a bit moot anyway Sent from my Iphone On Jun 16, 2016, at 06:05, jeffrey E. <[email protected]> wrote: I dont know of any that woudl open their books. also most are probablistic , so an increase wouldnt be easily determinative On Thu, Jun 16, 2016 at 5:23 AM, Vincenzo Iozzo < > wrote: Btw do you know anybody well that does quantitative trading/hfi? I have been thinking of trying a new type of consulting where the formula is roughly "I audit your code, if I find anything that can be optimized I get 10% cut of the extra revenue you make thanks to the optimization" Technically it's not restricted to hedge funds (eg: this would work equally well for Google and the likes) but the connection between optimized code and increased revenue is probably clearer for hedge funds, plus they have a lot of customized code so higher chances that they messed up something EFTA00825464 Sent from my (phone On Jun 15, 2016, at 18:22, jeffrey E. <[email protected]> wrote: fun, but the only important ones would be hillarys secret On Wed, Jun 15, 2016 at 5:54 PM, Vincenzo Iozzo < > wrote: Sent from my (phone please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note EFTA00825465 The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for EFTA00825466 the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00825467

Technical Artifacts (1)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.