EFTA02473582.pdf
PDF Source (No Download)
Extracted Text (OCR)
From:
jeffrey E. <jeevacation@gmail.com>
Sent:
Wednesday, February 3, 2016 12:19 PM
To:
Cepreii 6emsK0S
Subject:
Re:
yes of course
On Wed, Feb 3, 2016 at 7:18 AM, Cep=D0 6,1 Gemsicon
wrote:
In US! If he can (you wrote only for me so I did not talk to a=yone) with me and my friend who is involved
2016-02-03 15:10 GMT+03:00 jeffrey =. <jeevacation@gmail.com <mailtoleevacation@gmail.com»:
> >
Where ? with whom? . =C2 I will do anything that is helpful to you. / He is very =ell respected with
both black and white hat hackers
On Wed, Feb 3, 2016 =t 7:06 AM, Cepreil 6ems=D0 oe
> wrote:
is it possible to meet with him?
2016-01-30 17:08 GMT+03=00 jeffrey E. <jeevacation@gmail.com <mailto:jeevacation@gmail.co=»:
For you alone
Forwarded message - -
From: Vincenzo Iozzo
Date: Saturday, 30 1=nuary 2016
Subject:
To: "jeffrey E." <jeevacation@gmail.com>
It's hard to tell w/o proper code/docum=ntation (couldn't find much online). In general the four
things are:=C2
1) the devil is in the details, meaning tha= even if in theory it's all solid the implementation
might have bugs. =here's no definitive technical solution for that though
2) anything that is "custom" (eg: they have a cu=tom wifi protocol) is a red flag because it means
that it hasn't been =roperly vetted and might be broken/buggy
EFTA_R1_01586017
EFTA02473582
3)-there aren't enough details online to tell but it seems to me that to =peed up the blockchain
verification they partially centralize the network =y using their own "supernodes" (essentially the wallets talk to =he
supernodes vs the actual blockchain). The security of those servers see=s key to me and they gloss over it online
4) the =esh network implementation is completely up in the air (judging from what&=39;s
public) and it could go horribly wrong. So that needs further verific=tion
Also (5), in general the disadvantage =f distributed /open things is that it is a lot easier to steal
money vs a =losed network (like swift).
Are you looking to in=est into this thing? If so , I'd suggest a few things:
A) because problem (1) above is not completely =olvable, they need to have a plan. Part of it is
technical (do continuous =ode auditing, pentesting, on board proper crypto people, etc), the other p=rt is legal/financial
and pr. Specifically they should have some kind of i=surance and they should have a pr disaster recovery plan. A big
disadvanta=e of decentralized system is that you don't have anybody to trust and =ou don't have a closed network that
can make stealing money hard, they=need to address that
B) realistically nobod= is going to attack them until they become significant enough from a
finan=ial standpoint. This gives them time to work on A. That said they should a=oid making enemies (the "disgruntled"
hacker type)
Hope this is useful, if you get more stuff from them I I-=;m happy to look into it more. Also if you
do invest I can help them with =A) if needed.
It's a very dumb platitud= but "security is a process" is true.
=div>Unrelated: checkout edge=org <http://edge.org> , I think you'll like it.
There's a short video w=th Minsky that is absolutely fantastic
Sent from my Ip=one
On Jan 30, 2016, at 11:26, jeffrey E. <=jeevacation@gmail.com> wrote:
(https://mycelium.com/phone/index.html <https://mycelium.com/phone/index.ht=l> ).
=AO what are its weak points?
please note
T=e information contained in this communication is
confidential, may be a=torney-client privileged, may
constitute inside information, and is int=nded only for
the use of the addressee. It is the property of
JEE
communication or any pa=t thereof is strictly prohibited
and may be unlawful. If you have recei=ed this
2
EFTA_R1_01586018
EFTA02473583
communication in error, please notify us immediately by
retu=n e-mail or by e-mail to jeevacation@gmail.com, and
destroy this=communication and all copies thereof,
including all attachments. copyri=ht -all rights reserved
=C2
please note
The information containe= in this communication is
confidential, may be attorney-client privileg=d, may
constitute inside information, and is intended only for
the u=e of the addressee. It is the property of
JEE
Unauthorized use, disc=osure or copying of this
communication or any part thereof is strictly =rohibited
and may be unlawful. If you have received this
communicati=n in error, please notify us immediately by
return e-mail or by e-mail =o jeevacation@g=ail.com <mailto:jeevacation@gmail.com> , and
destroy this communication and all copies thereof,
=ncluding all attachments. copyright -all rights reserved
C yeaxceri=DO em,
C.6ennmos
=C2
please note
The informat=on contained in this communication is
confidential, may be attorney-cli=nt privileged, may
constitute inside information, and is intended only =or
the use of the addressee. It is the property of
JEE
Unauthoriz=d use, disclosure or copying of this
communication or any part thereof =s strictly prohibited
and may be unlawful. If you have received this
return e-mail o= by e-mail to j=evacation@gmail.com <mailto:jeevacation@gmail.com> , and
3
EFTA_R1_01586019
EFTA02473584
destroy this communication and all copies =hereof,
including all attachments. copyright -all rights reserved
C y=DO arnemmem,
C.6erume
please =ote
The information contained in this communication is confiden=ial, may be attorney-client privileged, may constitute
inside informati=n, and is intended only for the use of the addressee. It is the propert= of JEE Unauthorized use,
disclosure or copying of this communica=ion or any part thereof is strictly prohibited and may be unlawful. If =ou have
received this communication in error, please notify us immediat=ly by return e-mail or by e-mail to
jeevacation@gmail.com <mailto:jeevacation@gmail=com> , and destroy this comm=nication and all copies thereof,
including all attachments. copyright -=11 rights reserved
4
EFTA_R1_01586020
EFTA02473585
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Document Details
| Filename | EFTA02473582.pdf |
| File Size | 272.4 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 5,988 characters |
| Indexed | 2026-02-12T17:51:53.335133 |