EFTA02379148.pdf
PDF Source (No Download)
Extracted Text (OCR)
From:
Cepreii 6einucoe
Sent:
Wednesday, February 3, 2016 12:18 PM
To:
Jeffrey E.
Subject:
Re:
In US! If he can (you wrote only for me so I did not talk =o anyone) with me and my friend who is involved
2016-02-03 15:10 GMT+03:00 Jeff=ey E. <Jeevacation@gmail.com <mailto:jeevacation@gmail.com»:
Where ? with whom? .4>=A0 I will do anything that is helpful to you. / He is ve=y well respected with both
black and white hat hackers
On Wed, Feb 3, 2016 at 7:06 AM, Cepre=D040 Sennno
wrote:
is it possibl= to meet with him?
2016-01-30 17:08 GMT+03:00 Jeffrey E. <jeevacation@gmail.com</=»:
For you alone
Forwarded message
From: Vincenzo lozzo
target="_blank"
=a»
Date: Saturday, 30 January 2016
Subject:
To: "jeffre= E." <j=evacation@gmail.com <mailto:jeevacation@gmail.com»
It's har= to tell w/o proper code/documentation (couldn't find much online). In=general the four
things are:
1) the devil i= in the details, meaning that even if in theory it's all solid the imp=ementation
might have bugs. There's no definitive technical solution f=r that though
2) anything that is "cus=om" (eg: they have a custom wifi protocol) is a red flag because it m=ans
that it hasn't been properly vetted and might be broken/buggyQ=A0
3) there aren't enough details online to t=ll but it seems to me that to speed up the blockchain
verification they pa=tially centralize the network by using their own "supernodes" (e=sentially the wallets talk to the
supernodes vs the actual blockchain). Th= security of those servers seems key to me and they gloss over it online</=iv>
4) the mesh network implementation is completely up=in the air (judging from what's public)
and it could go horribly wrong= So that needs further verification
EFTA_R1_01392246
EFTA02379148
Also (5., in general the disadvantage of distributed /open things is that it is a =ot easier to steal
money vs a closed network (like swift).
<=div>
Are you looking to invest into this thing? If so , I'd =uggest a few things:
A) because problem (1)=above is not completely solvable, they need to have a plan. Part of =t is
technical (do continuous code auditing, pentesting, on board proper c=ypto people, etc), the other part is legal/financial
and pr. Specifically =hey should have some kind of insurance and they should have a pr disaster =ecovery plan. A big
disadvantage of decentralized system is that you don&t4=93 have anybody to trust and you don't have a closed network
that can=make stealing money hard, they need to address that
</=iv>
B) realistically nobody is going to attack them until they become =ignificant enough from a
financial standpoint. This gives them time to wor= on A. That said they should avoid making enemies (the
"disgruntled&q=ot; hacker type)
Hope this is useful, if yo= get more stuff from them I'm happy to look into it more. Also if you =o
invest I can help them with (A) if needed.
It's a very dumb platitude but "security is a process" is t=ue.
Unrelated: checkout edge.org <http://e=ge.org> , I think you'll like it.
<=iv>There's a short video with Minsky that is absolutely fantastic4,=A0
Sent from my (phone
On Jan 3=, 2016, at 11:26, jeffrey E. <jeevacation@gmail.com> wrote:
(https://mycelium.com=phone/index.html). what are its weak points?
=C24k please note
The information contained in this communic=tion is
confidential, may be attorney-client privileged, may
constit=te inside information, and is intended only for
the use of the addresse=. It is the property of
JEE
Unauthorized use, disclosure or copying =f this
communication or any part thereof is strictly prohibited
and =ay be unlawful. If you have received this
communication in error, pleas= notify us immediately by
return e-mail or by e-mail to jeevacation@=mail.com, and
destroy this communication and all copies thereof,
<=div>
2
EFTA_R1_01392247
EFTA02379149
=C2*
please note
The information containe= in this communication is
confidential, may be attorney-client privileg=d, may
constitute inside information, and is intended only for
the u=e of the addressee. It is the property of
JEE
Unauthorized use, disc=osure or copying of this
communication or any part thereof is strictly =rohibited
and may be unlawful. If you have received this
communicati=n in error, please notify us immediately by
return e-mail or by e-mail =o jeevacation@g=ail.com <mailto:jeevacation@gmail.com>
and
destroy this communication and all copies thereof,
=ncluding all attachments. copyright -all rights reserved
C yeaweii=004)em,
C.6enswoe
=C24>
please note
The informat=on contained in this communication is
confidential, may be attorney-cli=nt privileged, may
constitute inside information, and is intended only =or
the use of the addressee. It is the property of
JEE
Unauthoriz=d use, disclosure or copying of this
communication or any part thereof =s strictly prohibited
and may be unlawful. If you have received this
return e-mail o= by e-mail to j=evacation@gmail.com <mailto:jeevacation@gmail.com> , and
destroy this communication and all copies =hereof,
including all attachments. copyright -all rights reserved
chiv>
3
EFTA_R1_01392248
EFTA02379150
4
EFTA_R1_01392249
EFTA02379151
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Document Details
| Filename | EFTA02379148.pdf |
| File Size | 241.7 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 5,233 characters |
| Indexed | 2026-02-12T15:55:20.144161 |