Skip to main content
Skip to content
Case File
efta-efta00873524DOJ Data Set 9Other

From: Jeffrey Epstein <jeevacation®grnail.com>

Date
Unknown
Source
DOJ Data Set 9
Reference
efta-efta00873524
Pages
4
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Jeffrey Epstein <jeevacation®grnail.com> To: Joi Ito <[email protected]> Subject: Re: [IP] How cryptography is a key weapon in the fight against empire states Date: Wed, 10 Jul 2013 13:33:01 +0000 deception, a great topic for seminar, other suggestsions 2 music as a lens into the brain, 3, signal intelligence in nature, 4. power and its uses, definition, of - physical financial , political emotional. intellectual. all may have the same underlying formulas. , 5. currencies, - social, financial, global, vs local, , barter, alternative currencies, complementary currenciess, virtual, . 6. evolution in physical systems. ? 7 . brains needs for social interaction, crowd, smells. would staying in solitary with flowers be enough . On Wed, Jul 10, 2013 at 9:23 AM, Joi Ito <[email protected]> wrote: Have you seen this: hup://en.wikipedia.org/wiki/Mimic_octopus I'll ask around to see if anyone has look at schooling/crypto. - Joi On Jul 10, 2013, at 09:20 , Jeffrey Epstein <[email protected]> wrote: I think schooling is natures form of stegonogrphy. .. The picture is false. the pixels are the individual fish, . just like the reverse where the changing color of the octopus and its patterns hide the mouth and teeth ( the hidden message ) On Wed, Jul 10, 2013 at 9:16 AM, Joi Ito tto.com> wrote: Cool. Let me talk to a few of my crypto friends and think about this. BTW, I'm on the board of http://epic.org/ we're taking the NSA to the supreme court. It's an interesting org. Also, let me know if you want me to put strong crypto on your computer. If you have a nerd around to install it for you, here's the link: For email and sending stuff: https://gpgtools.org/ For your files on your computer: http://www.truecrypt.org/ - Joi On Jul 10, 2013, at 08:05 , Jeffrey Epstein <[email protected]> wrote: thanks, if you think it would work throw out to the crypto community a 100k prize or any amount you choose , to find useful bio crypto research, the immune system as signal analysis, . dna as cyphertext. ? are cell signals , encoded, . do you need multiple cells to complete a signal - a form of quorum sensing, is schooling!( fish ) a good example of deception , only capable by group behavior. . camouflage , masking, decoding pheromones, ( chemcal , eletctrical topological ), EFTA00873524 prizes competitions , awards rewards, I will help On Wed, Jul 10, 2013 at 7:56 AM, Joi Ito [email protected]> wrote: Begin forwarded message: From: David Farber <[email protected]> Subject: How cryptography is a key weapon in the fight against empire states Date: July 10, 2013 07:40:13 -0400 To: "ip" <ipftlistbox.com> Reply-To: daveefarbernet Begin forwarded message: From: Dewayne Hendricks <dewayne warpspeed.com> Subject: [Dewayne-Net] How cryptography is a key weapon in the fight against empire states Date: July 10, 2013 6:59:28 AM EDT To: Multiple recipients of Dewayne-Net <dewayne-net warpspeed.com> Reply-To: [email protected] How cryptography is a key weapon in the fight against empire states What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger ones By Julian Assange July 9 2013 <http://www.guardian.co. uk/commentisfree/2013/juU09/cryptography-weapon-fight-emp ire-states- julian-assange> The original cypherpunks were mostly Californian libertarians. I was from a different tradition but we all sought to protect individual freedom from state tyranny. Cryptography was our secret weapon. It has been forgotten how subversive this was. Cryptography was then the exclusive property of states, for use in their various wars. By writing our own software and disseminating it far and wide we liberated cryptography, democratised it and spread it through the frontiers of the new intemet. The resulting crackdown, under various "arms trafficking" laws, failed. Cryptography became standardised in web browsers and other software that people now use on a daily basis. Strong cryptography is a vital tool in fighting state oppression. That is the message in my book,Cypherpunks. But the movement for the universal availability of strong cryptography must be made to do more than this. Our future does not lie in the liberty of individuals alone. Our work in WikiLeaks imparts a keen understanding of the dynamics of the international order and the logic of empire. During WikiLeaks' rise we have seen evidence of small countries bullied and dominated by larger ones or infiltrated by foreign enterprise and made to act against themselves. We have seen the popular will denied expression, elections bought and sold, and the riches of countries such as Kenya stolen and auctioned off to plutocrats in London and New York. The struggle for Latin American self-determination is important for many more people than live in Latin America, because it shows the rest of the world that it can be done. But Latin American independence is still in its infancy. Attempts at subversion of Latin American democracy are still EFTA00873525 happening, including most recently in Honduras, Haiti, Ecuador and Venezuela. [snip] Dewayne-Net RSS Feed: <http://www.warpspeed.corn/wordpress> Archives: https://www.listbox.com/member/archive/247/=now RSS Feed: https://www.listbox.com/member/archivekss/247/125455-bf3ec4b3 Modify Your Subscription: https://www.listbox.contember/? member_id=125455&id_secret=125455-1753ffc2 Unsubscribe Now: https://www.listbox.com/unsubscribenmemberid=125455&id_secret=125455- 1e5c6695&post id=20130710074022:7EC771A2-E955-11E2-B40A-99B1C5E774E4 Powered by Listbox: http://www.listbox.com *********************************************************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and EFTA00873526 destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00873527

Technical Artifacts (19)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainen.wikipedia.org
Domainipftlistbox.com
Domaintto.com
URLhttp://epic.org
URLhttp://www.guardian.co
URLhttp://www.listbox.com
URLhttp://www.truecrypt.org
URLhttp://www.warpspeed.corn/wordpress
URLhttps://gpgtools.org
URLhttps://www.listbox.com/member/archive/247/=now
URLhttps://www.listbox.com/member/archivekss/247/125455-bf3ec4b3
URLhttps://www.listbox.com/unsubscribenmemberid=125455&id_secret=125455
URLhttps://www.listbox.contember

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.