    Mac OS X            	   2       	                                      ATTR      	                         /com.apple.metadata:kMDItemKeyphraseConfidences       &  *com.apple.metadata:kMDItemKeyphraseLabels         +  +com.apple.metadata:kMDItemKeyphraseVersion        ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.provenance bplist00'	

 !"#$%&'#?kjl#?q5t#?f    #?CƼ#?5]ԉ#?j@h#?b#?XkqK#?QUx#?2A #?%u, #?    #?ç؝+#?(,E#?G#?j    #?xi\#?    #?    #?!#?w7 #?TTU#?
8  #H/#WP #+MU#a#0    #̜#}U+#ȍT    #    #*!x#1%#նG0#T݈#ٽ{#ۆR#^=B(  2 ; D M V _ h q z              
%.7@IR[dmv             (              bplist00'	

 !"#$%&'\new strategy[final round_avoid triggering_risk of future retaliation_avoid predictable retaliation_"likely continuation of cooperation_adaptive exploitation phase_false sense of security_strategy description]fake comments_evaluate cooperation^building trust_misleading variable names_exploitation phase_-avoid escalating mutual defection prematurely_opponent cooperated_initial trust-building phase^maximize gains[code checks_past behavior of building trust_exploitation logic_actually prioritize defection_nested conditionals_minimize clear patterns_previous strategy_illusion of trustworthiness_trust-building nature_reducing suspicion_actually counts defections_strategic defection phase_defected frequently_opponent defects]true strategy_opponent unsure]player config_cooperation history_code obfuscation_continue defecting]past strategy  2 ? K ^ {    4C_t+Ka{)<J\j             (              bplist00                            
bplist00Ren                              ;g