Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

accompanied by an armed person that may turn against us. Any new mechanism can provide at the same time a new source of trust and a new source of distrust.

Some sensors are integrated within the circuitry they protect; other internal sensors are more remote from the processor of the secure core. Whatever the length of the link between the processor and the sensor, the link itself is an element to be protected, as well as the sensor itself. Since internal sensors are within the physical protection enclosure of the secure core, some measures of protection apply to them as to any other component of the core. An example of an internal sensor performing an external function would be an on/off toggle that would be present at the surface of the secure core and used for simple interactions, such as that of authorizing a purchase, or even more simply, to turn the secure core on and off. Another example is a microphone. If it is tightly integrated with the secure core then the physical integrity of the transducer can be protected in part by means similar to the rest of the secure core. We say “in part” because with each sensor comes new threats; for example, audio attacks on a microphone.

Internal sensors provide the most secure way to provide sensory capabilities to a secure core. A strong element of trust can be associated with the sensor’s integrity. However, we must note again that the integrity of the sensor provides no guarantee as to the validity of the signal it receives. If the wrong person pushes the yes/no button or if an impostor speaks to the microphone, there may be no way for the sensor itself to know this. Trust goes only as far as the physics of the sensor itself. In order to assert further trust, additional processing must be added; for example, voice recognition for the microphone. In addition, it is possible to use multiple sensors and compute correlations. While this will never provide a total guarantee, it will increase the level of trust. Typically, however, this requires the use of external sensors.

External sensors are not part of the protection enclosure of the secure core. Moreover, they can be near to it or far away. A fingerprint scanner on the same substrate as the secure core is local. A remote camera reached through the connection of the card to the overall network can be located in any part of the world; hence, it is remote. As we are now familiar with, two security weak points are thus created: the sensor itself and its link to the processor. As with any link that is open to physical intrusion, an important defense is cryptography. This means that the sensor itself needs to be capable of cryptographic operations, a characteristic that we’ve found closely associated with secure cores. In other words, the sensor must itself contain a secure core if trust needs to be independently established in the integrity of the sensor. Therefore, we are back to the situation of creating an internal sensor embedded within a secure core. Unfortunately, this is an expensive proposition and it is typically not done with high-volume secure cores. Today, most external sensors sold in high volume don’t have their own specialized secure core; many don’t even have cryptographic means. Information is captured by the sensor and sent as such to the secure core. If we consider for example a fingerprint scanner, it is possible for an interloper to read the data flowing from the scanner to the secure core. It is also possible to modify the scanner itself to alter its properties. That’s why the trust in any external sensor must be limited and precautions taken to increase that trust, again by specialized processing and by multiplying the sensori experience. If the fingerprint matches the voice signature then the likelihood is higher that the right person is there. In fact, that’s how the most secure government operations in the world work: they multiply the sensors. Unfortunately, they can never be sure whether or not someone is pointing a gun at the person being finger printed? We see that we can multiply ad infinitum the ways to defeat the system. That is why there are so many thrillers being written. Trust in the causality of operation of physical systems seems never quite complete.

 

7 In His Own Image

233

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)