    Mac OS X            	   2                                             ATTR          w                     /com.apple.metadata:kMDItemKeyphraseConfidences     9  \  *com.apple.metadata:kMDItemKeyphraseLabels         +  +com.apple.metadata:kMDItemKeyphraseVersion        ,  .com.apple.metadata:kMDItemTextContentLanguage           com.apple.provenance bplist00!	

 !#?y#?3Ւtt#?    #?2    #?y#?qޘ#?hgJL#?'9&#?m#?۽"#?0k1#?ƬI3#?խ`    #?#?ь8+#?^p2cp#? #?Ij`#?e&    #?`^#?+#?$2U#?W`    #?|     #f #Kqa< #r@#ÙlQ#    #    #նN0#&n,'#Y^_-  , 5 > G P Y b k t }              
(1:CL             "              Ubplist00!	

 ![meta-rounds[source code_exploit weaknesses_continue cooperating_strategic approach[final round_meta-game history analysis_$opponent shows signs of exploitation_mutual cooperation_purely cooperative^initial rounds_$shows signs of conditional defection_avoid exploitation_strategy description_detect trivial strategies]middle rounds_cooperative equilibrium_maximize payoff]moves closely_standard strategy_nash equilibrium logic_easy exploitation targets_establish goodwill_cooperative facade_trivial strategies_opponent code analysis_defect preemptively_exploit predictable cooperation_defect unconditionally_opponent defectsYkey logic_previous code analysisZedge cases  , 8 D Y p      5Ja}#8Mf|             "              bplist00                            
bplist00Ren                              ;g