Epstein Files

EFTA00873510.pdf

dataset_9 pdf 159.1 KB Feb 3, 2026 2 pages
From: Jeffrey Epstein <jeevacation@grnail.com> To: Joi Ito <joi@ito.com> Subject: Re: [IP] How cryptography is a key weapon in the fight against empire states Date: Wed, 10 Jul 2013 12:05:47 +0000 thanks, if you think it would work throw out to the crypto community a 100k prize or any amount you choose , to find useful bio crypto research, the immune system as signal analysis, . dna as cyphertext. ? are cell signals , encoded, . do you need multiple cells to complete a signal - a form of quorum sensing, is schooling( fish ) a good example of deception , only capable by group behavior.. camouflage , masking, decoding pheromones, ( chemcal , eletctrical topological ), prizes competitions , awards rewards, I will help On Wed, Jul 10, 2013 at 7:56 AM, Joi Ito <joii@ito.com> wrote: Begin forwarded message: From: David Farber <farber@gmail.com> Subject: [IP] How cryptography is a key weapon in the fight against empire states Date: July 10, 2013 07:40:13 -0400 To: "ip" <ip@listbox.com> Reply-To: dave(&farber.net Begin forwarded message: From: Dewayne Hendricks <dewayne warpspeed.com> Subject: [Dewayne-Net] How cryptography is a key weapon in the fight against empire states Date: July 10, 2013 6:59:28 AM EDT To: Multiple recipients of Dewayne-Net <dewayne-ne warpspeed.com> Reply-To: dewayne-net@warpspeed.com How cryptography is a key weapon in the fight against empire states What began as a means of retaining individual freedom can now be used by smaller states to fend off the ambitions of larger ones By Julian Assange July 9 2013 <http://www.guardian.co.uk/commentisfree/2013/jul/09/crypiography-weapon-fight-empire-states-julian- assange> The original cypherpunks were mostly Californian libertarians. I was from a different tradition but we all sought to protect individual freedom from state tyranny. Cryptography was our secret weapon. It has been forgotten how subversive this was. Cryptography was then the exclusive property of states, for use in their various wars. By writing our own software and disseminating it far and wide we liberated cryptography, democratised it and spread it through the frontiers of the new intemet. The resulting crackdown, under various "arms trafficking" laws, failed. Cryptography became standardised in web browsers and other software that people now use on a daily basis. Strong cryptography is a vital tool in EFTA00873510 fighting state oppression. That is the message in my book,Cypherpunks. But the movement for the universal availability of strong cryptography must be made to do more than this. Our future does not lie in the liberty of individuals alone. Our work in WikiLeaks imparts a keen understanding of the dynamics of the international order and the logic of empire. During WikiLeaks' rise we have seen evidence of small countries bullied and dominated by larger ones or infiltrated by foreign enterprise and made to act against themselves. We have seen the popular will denied expression, elections bought and sold, and the riches of countries such as Kenya stolen and auctioned off to plutocrats in London and New York. The struggle for Latin American self-determination is important for many more people than live in Latin America, because it shows the rest of the world that it can be done. But Latin American independence is still in its infancy. Attempts at subversion of Latin American democracy are still happening, including most recently in Honduras, Haiti, Ecuador and Venezuela. [snip] Dewayne-Net RSS Feed: <http://www.warpspeed.com/wordpress> Archives: https://www.listbox.com/member/archive/247/=now RSS Feed: https://www.listbox.cornhnember/archive/iss/247/125455-bf3ec4b3 Modify Your Subscription: https://www.listbox.com/memberflmember_id=125455&id_secret=125455- 1753ffc2 Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=125455&idsecret=125455- le5c6695&post_id=20130710074022:7EC771A2-E955-1 I E2-B40A-99B1C5E774E4 Powered by Listbox: http://www.listbox.com The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00873511

Entities

0 total entities mentioned

No entities found in this document

Document Metadata

Document ID
32531273-0527-459f-8fb6-ec87b771317c
Storage Key
dataset_9/EFTA00873510.pdf
Content Hash
be6e86a805bf24a7a35624da86b4f57b
Created
Feb 3, 2026