EFTA02472889.pdf
PDF Source (No Download)
Extracted Text (OCR)
From:
Sent:
To:
Subject:
For you alone
jeffrey E. <jeevacation@gmail.com>
Saturday, January 30, 2016 2:08 PM
6eris K0B Cepreii
Fwd:
Forwarded messa e ------ =---
From: Vincenzo lozzo
Date: Saturday, 30 January 2016
Subject=
To: "jeffrey E." <jeevacation@gmail.com <mailto:jeevacation@gmail.co=»
It's=hard to tell w/o proper code/documentation (couldn't find much online)= In general the four things are:
1) the dev=l is in the details, meaning that even if in theory it's all solid the=implementation might have bugs. There's no
definitive technical soluti=n for that though
2) anything that is "=custom" (eg: they have a custom wifi protocol) is a red flag because =t means that it hasn't been
properly vetted and might be broken/buggy=C2*
3) there aren't enough details online t= tell but it seems to me that to speed up the blockchain verification they=partially
centralize the network by using their own "supernodes"=(essentially the wallets talk to the supernodes vs the actual
blockchain).=The security of those servers seems key to me and they gloss over it onlin=
4) the mesh network implementation is completely=up in the air (judging from what's public) and it could go horribly
wr=ng. So that needs further verification
Also=(5), in general the disadvantage of distributed /open things is that it is=a lot easier to steal money vs a closed
network (like swift).
Are you looking to invest into this thing? If so , I'=d suggest a few things:
A) because problem =1) above is not completely solvable, they need to have a plan. Part =f it is technical (do continuous
code auditing, pentesting, on board prope= crypto people, etc), the other part is legal/financial and pr. Specifical=y they
should have some kind of insurance and they should have a pr disast=r recovery plan. A big disadvantage of
decentralized system is that you do='t have anybody to trust and you don't have a closed network that =an make
stealing money hard, they need to address that
B) realistically nobody is going to attack them until they beco=e significant enough from a financial standpoint. This gives
them time to =ork on A. That said they should avoid making enemies (the "disgruntle=" hacker type)
Hope this is useful, if=you get more stuff from them I'm happy to look into it more. Also if y=u do invest I can help them
with (A) if needed.
=div>It's a very dumb platitude but "security is a process" i= true.
EFTA_R1_01585023
EFTA02472889
Unrelated: checkout edge.org <http:=/edge.org> , I think you'll like it.
There's a short video with Minsky that is absolutely fantastic=C2*
Sent from my (phone
On Ja= 30, 2016, at 11:26, jeffrey E. <jeevacation@g=ail.com <javascript:_e(%7B%7D,'c=ml','jeevacation@gmail.com');>
> wrote:
(https://mycelium.com/phone/index.html). what are=its weak points?
=C240
please note
The information co=tained in this communication is
confidential, may be attorney-client pr=vileged, may
constitute inside information, and is intended only for
JEE
Unauthorized use= disclosure or copying of this
communication or any part thereof is str=ctly prohibited
and may be unlawful. If you have received this
commu=ication in error, please notify us immediately by
return e-mail or by e=mail to jeevacation@gmail.com <javascript:_e(%78%7D;cvmlijeevacation@grnall.comi);>
, and
destroy=this communication and all copies thereof,
including all attachments. c=pyright -all rights reserved
=C24>
please note
The information container" in this communication is
confidential, may be attorney-client privileg=d, may
constitute inside information, and is intended only for
the u=e of the addressee. It is the property of
JEE
Unauthorized use, disc=osure or copying of this
communication or any part thereof is strictly =rohibited
and may be unlawful. If you have received this
communicati=n in error, please notify us immediately by
return e-mail or by e-mail =o jeevacation@grail.com <mailtoleevacation@gmail.com> , and
destroy this communication and all copies thereof,
=ncluding all attachments. copyright -all rights reserved
2
EFTA_R1_01585024
EFTA02472890
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Document Details
| Filename | EFTA02472889.pdf |
| File Size | 184.1 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 4,135 characters |
| Indexed | 2026-02-12T17:52:18.439123 |
Related Documents
Documents connected by shared names, same document type, or nearby in the archive.