Epstein Files

EFTA00773972.pdf

dataset_9 pdf 38.5 KB Feb 3, 2026 1 pages
From: Corina Tamita To: Jeevacation <E > Subject: Date: Mon, 24 Aug 2009 22:26:46 +0000 dear jeffrey, i briefly looked into what we discussed and the most promising approach seems to be a parallel between computer and network security and infection biology. it seems no one has done it and that amazes me -- because the more i think about it the more clear it seems. one example: when you get a computer virus, no anti-virus is good enough to remove it completely. it will inactivate it and you won't be bothered by it anymore, but its remnants will be left somewhere on your computer. this seems to be a perfect analog of the junk that is left in the DNA. i discussed it with a couple of people and they seemed really interested in such a parallel. right now, what would be great would be to find theorems in computer and network security that could then be translated into infection biology. that could bring so much insight. I'm looking into potential people to discuss this with -- ron rivest at mit is very well known but probably very busy. i have to find someone lower in the food chain first... EFTA00773972

Entities

0 total entities mentioned

No entities found in this document

Document Metadata

Document ID
0c5d2dfa-d509-4c8f-9ba1-600bf9a4dbab
Storage Key
dataset_9/EFTA00773972.pdf
Content Hash
5766d2d193c2cec89cecbf4ab7659c3f
Created
Feb 3, 2026