Back to Results

EFTA00650035.pdf

Source: DOJ_DS9  •  Size: 103.8 KB  •  OCR Confidence: 85.0%
PDF Source (No Download)

Extracted Text (OCR)

From: Jeremy Rubin <:. > To: "Jeffrey E." <jeevacation®gmail.com> Subject: Re: New Yorker article on insider trading: Date: Sun, 01 Nov 2015 22:13:54 +0000 Sure -- semantically/morally, that is "stolen" information in the sense it is information taken without permission. Legally. it's another story... @Jeremy Rubin On Sun, Nov 1, 2015 at 12:11 PM, jeffrey E. leevacation®gmail.com> wrote: no, classic example is i overhear the chairman of co A telling co B chariman about a deal tomorrow. I can use it. they didnt give it to me and more importantly they did not benefit from the transfer of that info. that is the newest wrinkle. to be prosecuted the court said that the insider had to make money from the transfer. it is the strangest ruling in securities law in decades. On Sun, Nov I, 2015 at 12:06 PM, Jeremy Rubin c wrote: Isn't insider information always stolen? @JeremyRubin On Sun, Nov 1, 2015 at 11:50 AM, jeffrey E. <jeevacation@gmail.com> wrote: very good, we have to be careful that the info is not stolen info. , ie belongs to the co. etc. otherwise patents etc could be traded . On Sun, Nov 1, 2015 at 11:31 AM, Jeremy Rubin c wrote: http://www.newyorker.com/business/currency/making-insider-trading-legal Of course you're probably much more up to date on such pieces than myself, but this seems like an interesting kernel to framework a cryptosystem around. If the item being passed is informations which you always forward through at least a few other people before unlocking the information, and then are able to use that information to trade well (eg, with some probability p of having success based on quality of information), it operates as a probabilistic payment system where you can exchange out of the system by trading stocks in traditional systems (so you "get" a payment some p percent of the time). Thoughts? AJeremyRubin please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this EFTA00650035 communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of WE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00650036

Document Preview

PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.

Document Details

Filename EFTA00650035.pdf
File Size 103.8 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,087 characters
Indexed 2026-02-11T23:18:00.089373
Ask the Files