From: Vincenzo lozzo <i7- To: "jeffrey E." <jeevacation@gmail.com> Subject: Re: Date: Fri, 19 Feb 2016 00:59:56 +0000 Ok, let me know if they want to connect at some point and how. Sorry for the craziness of this week, was out of my control Sent from my Iphone On Feb 19, 2016, at 09:57, jeffrey E. <jeevacation(@)gmail.com> wrote: No On Thursday, 18 February 2016, Vincenzo lozzo hii wrote: 24h before | board the plane to Milan, so if you want me in NYC on Sunday this is a good time to Sent from my Iphone On Feb 16, 2016, at 21:38, jefirey E. > wrote: ao-------- Forwarded message ---------- From: Cepreii Beskos = t~—Ci‘C Date: Tuesday, February 16, 2016 Subject: To: "jeffrey E." <jeevacation@gmail.com> my partner is in SF till 24th.he can arrive to any cities in US to meet with Vincenzo in these dates 2016-02-12 1:37 GMT+03:00 jeffrey E. <jeevacation@gmail.com>: hes in japan until the 18th, I can send him wherever you like after On Thu, Feb 11, 2016 at 5:13 PM, Mac <> wrote: thank you! 12 esp. 2016 r., B 1:12, jeffrey E. <jeevacation@gmail.com> nanucan(a): ill ask On Thu, Feb 11, 2016 at 5:52 PM, Cepreii beasxos hii! wrote: Hi! say it :) EFTA00716738

--=PAGE_BREAK=--

My friend Nick Kovarsky, we met with Peter Thiel with the help of you, is going to be in NY and SF from 14th till 20th of February. Unfortunately I can not come with him. Is it possible to create his meeting with Vincenzo? 2016-02-03 15:18 GMT+03:00 jeffrey E. <jeevacation@gmail.com>: yes of course On Wed, Feb 3, 2016 at 7:18 AM, Cepreii benaxos hii wrote: In US! If he can (you wrote only for me so | did not talk to anyone) with me and my friend who is involved 2016-02-03 15:10 GMT+03:00 jeffrey E. <jeevacation@gmail.com>: Where? with whom? . I will do anything that is helpful to you. / He is very well respected with both black and white hat hackers On Wed, Feb 3, 2016 at 7:06 AM, Cepreii bensaxos hii: wrote: is it possible to meet with him? 2016-01-30 17:08 GMT+03:00 jeffrey E. <jeevacation@gmail.com>: For you alone ---------- Forwarded message ---------- From: Vincenzo lozzo Date: Saturday, 30 January 2016 Subject: To: "jeffrey E." <jeevacation@gmail.com> It's hard to tell w/o proper code/documentation (couldn't find much online). In general the four things are: 1) the devil is in the details, meaning that even if in theory it's all solid the implementation might have bugs. There's no definitive technical solution for that though 2) anything that is "custom" (eg: they have a custom wifi protocol) is a red flag because it means that it hasn't been properly vetted and might be broken/buggy 3) there aren't enough details online to tell but it seems to me that to speed up the blockchain verification they partially centralize the network by using their own "supernodes" (essentially the wallets talk to the supernodes vs the actual blockchain). The security of those servers seems key to me and they gloss over it online 4) the mesh network implementation is completely up in the air (judging from what's public) and it could go horribly wrong. So that needs further verification Also (5), in general the disadvantage of distributed /open things is that it is a lot easier to steal money vs a closed network (like swift). Are you looking to invest into this thing? If so , I'd suggest a few things: A) because problem (1) above is not completely solvable, they need to have a plan. Part of it is technical (do continuous code auditing, pentesting, on board proper crypto EFTA00716739

--=PAGE_BREAK=--

people, etc), the other part is legal/financial and pr. Specifically they should have some kind of insurance and they should have a pr disaster recovery plan. A big disadvantage of decentralized system is that you don't have anybody to trust and you don't have a closed network that can make stealing money hard, they need to address that B) realistically nobody is going to attack them until they become significant enough from a financial standpoint. This gives them time to work on A. That said they should avoid making enemies (the "disgruntled" hacker type) Hope this is useful, if you get more stuff from them I'm happy to look into it more. Also if you do invest I can help them with (A) if needed. It's a very dumb platitude but "security is a process" is true. Unrelated: checkout edge.org, | think you'll like it. There's a short video with Minsky that is absolutely fantastic Sent from my Iphone On Jan 30, 2016, at 11:26, jeffrey E. <jeevacation@gmail.com> wrote: CE). what are its weak points? please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and EFTA00716740

--=PAGE_BREAK=--

destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved C yBaxeHHem, C.besakos please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved C yBaxkenHem, C.Bensakos please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved C ypaxenuem, EFTA00716741

--=PAGE_BREAK=--

C.Benskos please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved C ypaxkennem, C.bensaxos please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited EFTA00716742

--=PAGE_BREAK=--

and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation@gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00716743