EFTA02394415.pdf
Extracted Text (OCR)
From:
Peter Thiel
Sent:
Monday, April 11, 2016 6:45 PM
To:
Jeffrey E.
Subject:
Re: FW:
Jeff -- much longer discussion, but not sure I even made my questions clear=
(1). I don't question that there is a line of evolutionary thinking under w=ich deception is highly adaptive (and in this
sense, it is quite compatibl= with the findings of science). I meant it more as a question of the soci=logy of science: If
there is a lot of deception in science, then there ar= a lot of fake scientists trying to get government grant money and
thereby=replace the real scientists. I think this is a pretty big phenomenon and =eriously underestimated.
(2). The related question of whether the amount of deception goes up or dow= over time is not about evolutionary
biology (since I assume our evolution=ry nature doesn't change that quickly), but more about politics and techno=ogy.
Thus, if there are better ways of detecting deception, then there ma= be less taking place (the cost/benefit calculus just
shifts). And perhap= conversely, if there is a stronger government, then perhaps it will be ab=e to get away with more
deception (think fascist/communist propaganda, or =rwell's 1984) and will find it easier to pretend that it is solving
proble=s than actually to solve problems.
--Peter
From: Peter Thiel
Sent: Monday, April 11, 2016 10:31 AM
Subject: FW:
To.'
(
)
From: Jeffrey E. [mailto:jeevacation@gmail.com)
Sent: Monday, April 11, 2016 3:39 AM
To: Peter Thiel alimisISISINIMNImp>
Subject:
briefly, trivers and I share the same belief in the major role of decept=on.
a tool to protect or conquer free energy..
in essence if the =redator can read your algorithm, you are easy food . so deception is the=first line of defense as it
usually the cheapest. if a prey knows its o=n algorithm it is open to interrogation. so nature hides it from the" =elf".
Deceptive self confidence is also a winning game strategy.
A=ts engage in the practise of mimetic. camouflage. ,
false direction. et=. To some extent, so do most viruses. ie since HIV clearly masquerades=itself as a unit of self. your
question re is deception increasing, - =es as fast as methods of detection,
note I assume you are awake
please note
EFTA_R1_01423784
EFTA02394415
The information contained in this communication is confidential, may be attorney-client privileged, may constitute
inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use,
disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have
received this communication in error, please notify us immediately by return e-mail or by e-mail to
jeevacation@gmail.com<mailto:jeevacation@gmai=.com>, and destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
<?xml version=.0" encoding=TF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version=.0">
<dict>
<key>date-last-viewed</key>
<integer>0</integer>
<key>date-received</key>
<integer>1460400291</integer>
<key>flags</key>
<integer>8590195717</integer>
<key>gmail-label-ids</key>
<array>
<integer>18</integer>
<integer>5</integer>
</array>
<key>remote-id</key>
<string>603567</string>
</dict>
</plist>
2
EFTA_R1_01423785
EFTA02394416
Document Preview
Extracted Information
Email Addresses
Phone Numbers
Document Details
| Filename | EFTA02394415.pdf |
| File Size | 153.4 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 3,409 characters |
| Indexed | 2026-02-12T16:06:30.592179 |
Related Documents
Documents connected by shared names, same document type, or nearby in the archive.