Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

the limitations of the dinosaurs as they faced a rapidly changing ecosystem armed with a brain the size of a walnut.

Finally, at least with respect to the need of esteem, the concept of reputation derived from experiential identity comes to the fore. Within the computer world, experiential identity is thoroughly intertwined with archival memory; being able to establish and subsequently recall the experiences in the passing of interactions. Reputation then builds upon the memory of such experiences as reflected or reported by third parties. Thus, for the transcendent personal device to properly establish and evaluate reputation, of its own bearer and also of the other parties to interactions, it must possess or have access to a means of establishing trust in such other parties. As we have noted in previous discussions, this is a manifestation of the recursive evaluation of the trust equation of interactions. So, from an esteem need standpoint, the requirement is for a trusted means to identify and interact with other parties. The actual mechanisms needed, specifically an identification system and a method for secure interactions across time and space, build upon responses to the lower level needs of belonging and safety.

Belonging Needs

Belonging is very much about differential identity. Computers can certainly function in groups as the wide variety of networks currently in play today reminds us. Computers however are tools of humans. They function on behalf of humans. The issue becomes, of course, on behalf of which humans do they function? In today’s dichotomy of client-server computing, a secure core functions primarily as a tool of the server community as opposed to being prosthesis for the bearer, who is after all, the end-user and consumer within the content system.

In fact, differential identity is a central issue in the current state of network infrastructures. Mechanisms in use are typically insufficient to provide an adequate level of trust in the asserted differential identities of transaction participants. Consequently, mistaken identity or improper authentication of identity perceived as “identity theft” are significant problems. Perhaps even more important than solving the problems inherent in current systems, is the enabling of important new areas of policy application that highly trusted differential identity would provide. In a complementary fashion, highly trusted differential identity also provides enhancement opportunities for personal privacy.

The transcendent personal device is a central element in establishing the differential identity of a person. Only by being able to do this can one then develop a reliable credential system on which experiential identity can be based. This is primarily a social ecosystem issue, much like the establishment of the transcendent personal device as a fiduciary acting on behalf of the bearer. While the transcendent personal device itself, if done well technically, can make significant strides in extending the benefits of social grouping mechanisms into the Web, a coherent policy infrastructure will make the effort significantly more trustworthy.

As we’ve considered previously, one of the mechanisms used to convey trust is the use of secrets. We can use a shared secret between two entities to establish a common domain of trust that encompasses the two, as long as we’re confident that no other entity shares the secret. The more entities that share a secret, the less is the degree of trust that we can convey through the knowledge or possession of the secret. If only two entities share a secret and if I am one of the entities, then when another entity can tell me the secret I know precisely the identity of that entity. However, if I want to include many other entities in my own, personal domain of trust, then I have

 

9 Mutation

329

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)