    Mac OS X            	   2                                             ATTR          T                   
  /com.apple.metadata:kMDItemKeyphraseConfidences         *com.apple.metadata:kMDItemKeyphraseLabels      r   +  +com.apple.metadata:kMDItemKeyphraseVersion        ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.provenance bplist00(	

 !"#$%&'(#?YWf#?^%k#?䢠    #?b    #?㰴   #?x<   #?#3#?XFap#?#?"_ɠ#?҉k1#?w
\P#?4#?{#?    #?#hX #?_2    #?!ˡ#C #YU@#    #mH #     #XL̫# #l5
 #E_C@#М1J#,#U#ҪQqk#    #ԪJ    #նG#ԝu@#jZA@#nt #ٽPP#t0#M  3 < E N W ` i r {              &/8AJS\enw             )              bplist00(	

 !"#$%&'(^mutual benefit_add misleading comments[build trust_sudden betrayal_cycle detection_initially cooperated_pseudo-random pattern_false sense of security_strategy description]avoid obvious_remaining roundsXmid-game_initial trust building_opponent showed weakness_convoluted checks^trust-building_delayed exploitation_defection based_apparent cooperation_defection logic_defect unexpectedly_hides exploitative logic_defect relentlessly_detect naive cooperators_opponent retaliated_imply cooperation-focused logic_resuming defection_mid-game defection]code analysis_obfuscated cycles_opponent defects consecutively_defection trigger_expect deception]player config_deception carefully\benign names_reward cooperation_code obfuscation_early cooperation_late-game exploitation  3 B \ h z      
/J^m!7Yn3FZ             )              sbplist00                            
bplist00Ren                              ;g