Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

This approach to security through causality in mechanisms dates from the earliest records and artifacts of the operation of social orders. Our rather immediate and specific objective is the use of causality as a means to establishing trust within computer systems in general, and in secure core systems specifically. We will begin our discussions by extracting something of the architectural characteristics of this approach. We’ll then consider the methodology through which relevant architectures are applied to actual mechanisms for establishing trust. By first examining in some detail the intricacies of current personal electronic devices, particularly those that encompass secure core elements, we’ll then seek to extract a more abstract understanding for such systems. We’ll then attempt to apply this understanding to real world situations. If we cut to the chase for this discussion, in the end we’ll find that relative to computer systems, trust through causality is a necessary, but not sufficient approach to achieve the desire levels of trust in our systems. This will then provide us the impetus and a bit better footing when we seek to extend the discussion in the next chapter to the concept of establishing trust through process.

Given some seminal point of causality, to convey trust from this point requires a system whose architecture encompasses the tamper-resistant and tamper-evident characteristics that we noted above. We expect this architecture to yield in its implementation the characteristics of security that we previously discussed in Chapter 3. Over the history of social ecosystems, such architectures have been established in a variety of forms. First, and foremost, are architectures that make use of secrets to convey trust from a point of ultimate causality to some other location within the ecosystem. The thing, be it artifact or process, that is kept secret is not trust in and of itself, but rather it typically establishes the identity of some entity and subsequently allows any trust imbued within that entity to be conveyed across time or space, or both. Consider in a bit more detail the bulla that we previously mentioned in earlier chapters.

From exhibits at the Louvre and other museums throughout the world, specific relics show us that as early as five millennia ago, the civilizations of Mesopotamia made use of writing on clay tablets to keep records of quantities of goods exchanged. In order to convey such accounting information in a trusted fashion, small clay tablets were enclosed in a sealed clay pocket, called bulla, about the size of a small fist. The bulla evolved over time until becoming a quite complex object with its very evolution that we see in the Louvre exhibits giving us a good understanding of the significance of its constituent components. We’ll consider here its most elaborate, and final form as far as the archeological record is concerned. On the surface of the clay pocket was a seal indicating the identity of the source of the contained information, together with sacred symbols. The seal was intricate and difficult to construct in the first place, and hence it was difficult to replace when broken. This mechanism provided a means to convey the information found inside the bulla along with some degree of trust imbued in the originator of the information; that is, the person represented by the seal, validated by the protection afforded by the religious symbols. The owner of flocks might send some number of sheep to market to be sold. The sheep were driven to market by shepherds to whom either the temporary custodianship of the sheep, or the money received from their sale returning from market, might constitute an overwhelming temptation to sell a sheep or two on the side and tell the owner the price received for the full complement was less than anticipated. The shepherds in this situation represent a non-secure communication channel. The bulla was introduced as a counter-measure against just this type of threat. A bulla sent by the flock owner could convey to the purchaser just how many sheep were expected. A returned bulla sent by the purchaser could tell the owner what price was paid. The bulla could be conveyed by the shepherd, even though he might be of suspect trustworthiness; an example of secure trusted communication through an unsecured channel.

 

7 In His Own Image

219

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)