Bertrand du Castel
 
 
 Timothy M. Jurgensen
MIDORI
PRESS
Cover

Blog
Knol

COMPUTER THEOLOGY

The Technical Realm

Computers and computer networks extend across a broad plane of cost and capability. Some work for us, the individual users, while others often treat us as resources under their purview. We have observed that personal electronic devices are iconic examples of systems that work on our behalf. The implication is that such systems are small and inexpensive enough to allow their ubiquitous deployment; essentially every person can have at least one, but perhaps several. Be they called e-mail communicator, mobile phone, personal assistant, ultra-portable computer, key fob or credit card with a chip, they are meant to always be on the person of their bearer. They contain bearer-related information of importance whose protection is assumed by both the person owning the device and the institutions in communication with the device. For example, the account information in the mobile phone is private and is used to appropriately charge communications. Another example is the personal information allowing employees to link to their company network. Certainly the employee and the company count on it to be protected. Finally, yet another example is the information on the chip of a credit card. It actually represents money, always a target for theft. Most important, however, is the ability of the computer to establish and vouch for the unique identity of the computer bearer. It is through this ability to establish and convey identity in a highly trusted fashion that such computers truly become the conveyors of policy in the modern world.

What we plan to explore in this book is a required set of characteristics of personal electronic devices that allow them to function as our representatives within the cyber-world. From our perspective, the optimal such computer does not yet exist. However, personal devices that deal with important private information have at their core a security system. The actual security varies considerably from device to device. The core security mechanisms range from barely protected software keys to specialized hardware called a trusted module whose purpose is to encompass dedicated security circuitry or even specialized processors. If the optimal private computer is the culmination stepping stone of the evolution of private, personal, secure computational facilities, then the trusted module is perhaps the emergent species of this family. The size of a match head, a trusted module is oriented from its design onward toward being a secure token for the individual being. As such, it is an excellent kicking off point as we consider the connection between computer systems in general and the social structure of human groups.

Personal electronic devices are at the forefront of an emerging technological infrastructure within which people live and work. The infrastructure offers us every increasing levels of service and yet we find ourselves at an increasing disadvantage as we try to exist comfortably within it because of its extent, speed and complexity. We desire it, or are required to make use of it, but we often do so at our peril because of these factors. Certainly, few among us are completely comfortable in engaging in complex transactions with faceless, nameless and anonymous entities that exist in the amorphous cyberspace that defines much of our current world. Our physical environment is similarly suspect. Often we find ourselves quite uncomfortable with the presence of strangers in certain venues of our lives. Yet, we must interact with the ill known and the unseen; it is the way of our existence.

Within the various computers on the network, the spread of viruses, worms, Trojan Horse and other malevolent diseases threaten the health of the entire infrastructure. If one has an e-mail address that’s been around for a decade or so, it is likely that it is on so many spam lists as to render it incapable of conveying useful information. When one out of a hundred messages is actually good, the channel is of little use. Of almost equal concern is the economic paradigm of the infrastructure, driven largely by advertising. Trying to read a body of information while seeing

26

1 Tat Tvam Asi

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.
ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)