    Mac OS X            	   2                                             ATTR          k                   
  /com.apple.metadata:kMDItemKeyphraseConfidences         *com.apple.metadata:kMDItemKeyphraseLabels         +  +com.apple.metadata:kMDItemKeyphraseVersion        ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.provenance bplist00(	

 !"#$%&'(#?)8   #?A=#?y#?    #?pO.H#?B   #?6i#?uCx#?JO#?9    #?#?w
\P#?Ʒ]<#?D4Qk#?'X|#?iEn`#?U #YU@#RP    #     #Y\`#D    # #Ǧ~s#ʲG^0#T    #-죀#W^#C#նG#:ص #?#*+ #:%P#t0# ݭk#<&ω#~W:#,#M  3 < E N W ` i r {              &/8AJS\enw             )              bplist00(	

 !"#$%&'([red herring_include unused code blocks[meta-rounds_aggressive exploitation_ prioritize mutual trust-building_maximize exploitation_deceptive comments_add fake comments^mid-game round_seem trustworthy_strategy descriptionXmid game_!strategy combines early deception_mid-game manipulation_negative value hints^strategy fails_exploitation logic_defection logic_alternated afterward_defect relentlessly_implies cooperation_cement dominance_opponent defected_confuse pattern recognitionZearly game_obfuscating intent_consecutive defections_naive cooperator_defection minimizes losses]player config]code suggests_code uses complex conditionalsYlate game_sense predictability_early cooperation_misleading code structure_randomly cooperate_likely cooperation_late-game aggression_late-game exploitation  3 ? \ h      (Ld{9DYr 0EZq             )              bplist00                            
bplist00Ren                              ;g