    Mac OS X            	   2  i                                           ATTR                               /com.apple.metadata:kMDItemKeyphraseConfidences     i    *com.apple.metadata:kMDItemKeyphraseLabels      9   +  +com.apple.metadata:kMDItemKeyphraseVersion     d   ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.provenance bplist00%	

 !"#$%#?R m#?ⷔCx#?D~
#?   #?_kPBp#?ٽݛ#?XFap#?׺#   #?y    #?#?}`Q#?F+    #?6K|ŀ#?    #?;^#?e.d #?5fH #?#?` #?}@    #?pG>x #B
R<+#PD@#D    #	s;#X    #"se`#ϥ/
 #i`#Ӊ}k#VNx0#նG#j    #XF#J.#~W:#i  0 9 B K T ] f o x               #,5>GPYbkt             &              }bplist00%	

 !"#$%_ encourage reciprocal cooperation_include fake comments]similar logic_endgame approaches_ultimately lead_history shows vulnerability_false sense of security]rebuild trust_aggressive intent_strategy description_initial cooperation\heavily rely_misleading names^building trust_cooperative strategy]past behavior_endgame aggression phase_initial trust-building phase_maximize final-round payoff_cooperation decisions_mid-game exploitation phase_add redundant conditions_#strategy prioritizes mutual harmony_defecting strategically_avoid predictability_longer beneficial_future repercussion\code appears_opponent defects consistently_opponent cooperates excessively_simple defection]player config]nested checks_opponent guessing]past strategy_likely cooperationYpast code  0 S k y      '4GVm{	$Jd{#7EZ             &              dbplist00                            
bplist00Ren                              ;g