EFTA00873510.pdf
dataset_9 pdf 159.1 KB • Feb 3, 2026 • 2 pages
From: Jeffrey Epstein <jeevacation@grnail.com>
To: Joi Ito <joi@ito.com>
Subject: Re: [IP] How cryptography is a key weapon in the fight against empire states
Date: Wed, 10 Jul 2013 12:05:47 +0000
thanks, if you think it would work throw out to the crypto community a 100k prize or any amount you choose
, to find useful bio crypto research, the immune system as signal analysis, . dna as cyphertext. ? are cell signals
, encoded, . do you need multiple cells to complete a signal - a form of quorum sensing, is schooling( fish ) a
good example of deception , only capable by group behavior.. camouflage , masking, decoding pheromones, (
chemcal , eletctrical topological ),
prizes competitions , awards rewards, I will help
On Wed, Jul 10, 2013 at 7:56 AM, Joi Ito <joii@ito.com> wrote:
Begin forwarded message:
From: David Farber <farber@gmail.com>
Subject: [IP] How cryptography is a key weapon in the fight against empire states
Date: July 10, 2013 07:40:13 -0400
To: "ip" <ip@listbox.com>
Reply-To: dave(&farber.net
Begin forwarded message:
From: Dewayne Hendricks <dewayne warpspeed.com>
Subject: [Dewayne-Net] How cryptography is a key weapon in the fight against empire states
Date: July 10, 2013 6:59:28 AM EDT
To: Multiple recipients of Dewayne-Net <dewayne-ne warpspeed.com>
Reply-To: dewayne-net@warpspeed.com
How cryptography is a key weapon in the fight against empire states
What began as a means of retaining individual freedom can now be used by smaller states to fend off the
ambitions of larger ones
By Julian Assange
July 9 2013
<http://www.guardian.co.uk/commentisfree/2013/jul/09/crypiography-weapon-fight-empire-states-julian-
assange>
The original cypherpunks were mostly Californian libertarians. I was from a different tradition but we all
sought to protect individual freedom from state tyranny. Cryptography was our secret weapon. It has been
forgotten how subversive this was. Cryptography was then the exclusive property of states, for use in their
various wars. By writing our own software and disseminating it far and wide we liberated cryptography,
democratised it and spread it through the frontiers of the new intemet.
The resulting crackdown, under various "arms trafficking" laws, failed. Cryptography became standardised in
web browsers and other software that people now use on a daily basis. Strong cryptography is a vital tool in
EFTA00873510
fighting state oppression. That is the message in my book,Cypherpunks. But the movement for the universal
availability of strong cryptography must be made to do more than this. Our future does not lie in the liberty
of individuals alone.
Our work in WikiLeaks imparts a keen understanding of the dynamics of the international order and the logic
of empire. During WikiLeaks' rise we have seen evidence of small countries bullied and dominated by larger
ones or infiltrated by foreign enterprise and made to act against themselves. We have seen the popular will
denied expression, elections bought and sold, and the riches of countries such as Kenya stolen and auctioned
off to plutocrats in London and New York.
The struggle for Latin American self-determination is important for many more people than live in Latin
America, because it shows the rest of the world that it can be done. But Latin American independence is still
in its infancy. Attempts at subversion of Latin American democracy are still happening, including most
recently in Honduras, Haiti, Ecuador and Venezuela.
[snip]
Dewayne-Net RSS Feed: <http://www.warpspeed.com/wordpress>
Archives: https://www.listbox.com/member/archive/247/=now
RSS Feed: https://www.listbox.cornhnember/archive/iss/247/125455-bf3ec4b3
Modify Your Subscription: https://www.listbox.com/memberflmember_id=125455&id_secret=125455-
1753ffc2
Unsubscribe Now: https://www.listbox.com/unsubscribe/?member_id=125455&idsecret=125455-
le5c6695&post_id=20130710074022:7EC771A2-E955-1 I E2-B40A-99B1C5E774E4
Powered by Listbox: http://www.listbox.com
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00873511
Entities
0 total entities mentioned
No entities found in this document
Document Metadata
- Document ID
- 32531273-0527-459f-8fb6-ec87b771317c
- Storage Key
- dataset_9/EFTA00873510.pdf
- Content Hash
- be6e86a805bf24a7a35624da86b4f57b
- Created
- Feb 3, 2026