Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

presence of adversaries. We’re going to go into considerably more detail about the concept of identity in the next section, but for the moment let’s just assume that if two parties share a secret, then if they can convey proof to the other party of the fact that they possess the secret then they’ve effectively identified themselves to the other party. So, what does a protocol look like that can accomplish this?

Well, in fact there are a plethora of protocols available through which two or more parties can authenticate their identities to each other over channels monitored by adversaries. In their book, Protocols for Authentication and Key Establishment, Colin Boyd and Anish Mathuria provide detailed specifications for a large collection of such procedures. Most have a common theme to them. One assumes that a secret shared between two parties is actually a key to an encryption algorithm. One party can send an arbitrary message to the other party and say “encrypt this.” It doesn’t matter if an adversary can see the message because the original sending party is going to take the response message and pass it through the known encryption algorithm with its copy of the secret key. If the original message comes out of the algorithm processing then the first party knows that the second party has the same key. The first party has identified the second party. If the two parties now do this same set of operations in reverse, then the second party can identify the first party. All this is known as a mutual authentication protocol. The knowledge of such protocols, that is the software to effect them on a transcendent personal device, is an artifact of its safety and security needs and those of its bearer.

Humans have five basic senses, and their entire cognitive perception of the world around them is defined by the input from those five classes of sensors. The sensors themselves are an aspect of the basic anatomy and physiology of the human body. The interpretation of the sensor signals occurs at many levels within the mind; levels that we tend to classify according the hierarchy of needs. A sudden, sharp pain in the foot might trigger a virtually instantaneous reaction when the autonomic nervous system seeks to simply move the foot away from the perceived source of the pain. If that pain has a more gradual onset, when finally noticed it might trigger a more thoughtful response involving taking off one’s shoe to remove the nail in its sole. If the pain is similar, but perhaps more chronic than acute, we might actually make an aesthetic based decision to live with it because it’s caused by a fashionable, although new and unbroken-in pair of shoes. So it is with the sensors present within the body and trusted core of the transcendent personal device.

We discussed a variety of such sensors in Chapter 7. Applications at the safety and security tasking level should seek to identify known threats based on the signature responses from the sensors. This would include interrogation of sensors to determine whether changes have occurred in the anatomical makeup of the transcendent personal device body. It includes analysis of power filters within the trusted core agent to confirm that power levels and frequencies have not been altered in an attempt to manipulate processing within the trusted core agent.

Physiological Needs

Driven by the biophysical structure of living organisms, the most basic needs of the individual are characterized by the elements or facilities necessary to support physiological processes. In the case of the human species and using the emergence of the vertebrates as a starting point, the evolution of such processes ultimately gave rise to the hierarchy of needs. In our emergent description of the transcendent personal device, we have thus far considered a variety of characteristics that derive from the higher order needs of the individual person as well as of the device itself. Forming the base level of the needs hierarchy, we must finally consider extensions to

 

9 Mutation

333

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)