Back to Results

EFTA00752492.pdf

Source: DOJ_DS9  •  Size: 101.8 KB  •  OCR Confidence: 85.0%
PDF Source (No Download)

Extracted Text (OCR)

From: "Charles L. Harper Jr." To: Jeffrey Epstein <jeevacation@gmail.com> Subject: Re: Project discussion & proposal document attached Date: Fri, 05 Nov 2010 11:15:58 +0000 Hi Jeffrey, Thanks for quick feedback! I can begin to work on issues you've raised if you decide to go forward contracting my services. Allbest, -Charles Harper PS. I've only touched on a few issues thus far via a few days effort only. I've been focused on the strongly encouraging input from Scott Aaronson and Seth Lloyd on the topic you set: "Cryptography in Nature." Both of them independently saw the topic as an innovative way to engage deep issues at the interface between computation (modem cryptography being within the theory of computation) and both physics and biology. Biology/evolution succeeds in all sorts of computationally hard tasks. It is not understood quite how and this area of inquiry is seen as a way to open up deep discovery agendas. This includes, on the physics side, new areas in quantum computation which, as you know is at the cutting-edge of code-cracking agendas today due to Shore's Algorithm and the way that future quantum computers using it could do fast prime-factoring. Also, molecular computation, especially via DNA, allows code-cracking-type computation possibilities. Your comments suggest there may be value in pursuing innovators who are at the cutting edge in immunology as well as in predator-prey competition-innovation cycles in (computationally-modeled?) evolution. On the issue of actual cryptography, the problem is that much of the serious action will be behind closed doors. On Nov 5, 2010, at 3:27 AM, Jeffrey Epstein wrote: great proposal„ however, it needs to be more around deception alice -bob. communication. virus hacking, battle between defense and infiltration.. computation is already looked at in various fields. camoflauge , mimickry, signal processing, and its non random nature, misinformation. ( the anti- truth - but right answer for the moment ).. computation does not involve defending against interception, a key area for biological systems, if a predator breaks the code, it usually can accumulate its preys free energy at a discount . self deception, ( necessary to prevent accidental disclosure of inate algorithms. WE need more hackers , also interested in biological hacking , security, etc. On Thu, Nov 4, 2010 at 10:30 PM, Charles L. Harper Jr. < > wrote: Dear Jeffrey, Please find attached a project discussion and proposal document in reply to your request. Allbest, EFTA00752492 Charles Harper The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. EFTA00752493

Document Preview

PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.

Document Details

Filename EFTA00752492.pdf
File Size 101.8 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,180 characters
Indexed 2026-02-12T13:58:46.779190
Ask the Files