EFTA00752492.pdf
PDF Source (No Download)
Extracted Text (OCR)
From: "Charles L. Harper Jr."
To: Jeffrey Epstein <jeevacation@gmail.com>
Subject: Re: Project discussion & proposal document attached
Date: Fri, 05 Nov 2010 11:15:58 +0000
Hi Jeffrey,
Thanks for quick feedback!
I can begin to work on issues you've raised if you decide to go forward contracting my services.
Allbest,
-Charles Harper
PS. I've only touched on a few issues thus far via a few days effort only.
I've been focused on the strongly encouraging input from Scott Aaronson and Seth Lloyd on the topic
you set: "Cryptography in Nature."
Both of them independently saw the topic as an innovative way to engage deep issues
at the interface between computation (modem cryptography being within the theory of computation)
and both physics and biology. Biology/evolution succeeds in all sorts of computationally hard tasks.
It is not understood quite how and this area of inquiry is seen as a way to open up deep discovery agendas.
This includes, on the physics side, new areas in quantum computation which, as you know is at the cutting-edge
of code-cracking agendas today
due to Shore's Algorithm and the way that future quantum computers using it could do fast prime-factoring.
Also, molecular computation, especially via DNA, allows code-cracking-type computation possibilities.
Your comments suggest there may be value in pursuing innovators who are at the cutting edge in immunology as
well as
in predator-prey competition-innovation cycles in (computationally-modeled?) evolution.
On the issue of actual cryptography, the problem is that much of the serious action will be behind closed doors.
On Nov 5, 2010, at 3:27 AM, Jeffrey Epstein wrote:
great proposal„ however, it needs to be more around deception alice -bob. communication. virus hacking,
battle between defense and infiltration.. computation is already looked at in various fields. camoflauge ,
mimickry, signal processing, and its non random nature, misinformation. ( the anti- truth - but right answer for
the moment ).. computation does not involve defending against interception, a key area for biological systems,
if a predator breaks the code, it usually can accumulate its preys free energy at a discount . self deception, (
necessary to prevent accidental disclosure of inate algorithms. WE need more hackers , also interested in
biological hacking , security, etc.
On Thu, Nov 4, 2010 at 10:30 PM, Charles L. Harper Jr. <
> wrote:
Dear Jeffrey,
Please find attached a project discussion and proposal document in reply to your request.
Allbest,
EFTA00752492
Charles Harper
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments.
EFTA00752493
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Dates
Email Addresses
Document Details
| Filename | EFTA00752492.pdf |
| File Size | 101.8 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 3,180 characters |
| Indexed | 2026-02-12T13:58:46.779190 |