    Mac OS X            	   2       
                                      ATTR      
                         /com.apple.metadata:kMDItemKeyphraseConfidences     E  c  *com.apple.metadata:kMDItemKeyphraseLabels         +  +com.apple.metadata:kMDItemKeyphraseVersion        ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.provenance bplist00"	

 !"#?Ƹ m#?×#?3Ւtt#? V>#?̵#?#?䢠    #?IB-: #?⇮    #?@   #?ܡBR#?|#?Q#?;    #?խ`    #?#?̮:B#?Ij`#?    #?g     # Zb2 #і #    #Q    #    #+P #ι+#1HJ#)#,#հ#;ݷk#ۨ`i`#LͫP  - 6 ? H Q Z c l u ~               )2;DMV             #              _bplist00"	

 !"_encourages mutual cooperationZmeta-round[source code_opponent strategy code_subsequent rounds\final rounds[build trust_future meta-rounds_avoids triggering_predictable opponents_"prevents endless retaliation loops_%defecting maximizes short-term payoff_conditional cooperation_avoiding detection_avoid exploitation_strategy description]prior history_maximize payoff_occasionally forgive_signals willingness\program code^pure exploiter_defect occasionally_cooperative opening_defect unconditionally_deterministic strategy_known exploitative strategyZvice versa]future rounds]code analysis\small chance_observed opponent behavior_opponent defects twice_break retaliation cycles  - M X d }      8Rg|(AZx             #              bplist00                            
bplist00Ren                              ;g