communication capabilities that are so
close to human ones in some cases that they are actually the conduit to human
capabilities, as with phones and cameras. So it would seem to be an interesting
hypothesis to see what in the physical trust system maps to the human trust
system, and where there would be differences. This would allow us, of course,
to close the loop, since we could in turn then look at those extra human
mechanisms and see if there are traces of them in personal electronic devices, in
their current or future form. We will delve into considerations of the future
forms in Chapter 9. The theme of this chapter was an historical perspective of
trust, and hence, security through causality relationships in physical
implements. With respect to computers, this translates directly into computer
hardware architectures along with the design, manufacture and servicing of
computer systems. With that in mind, we can now turn our attention to procedure
and process. This will take us directly into consideration of computer software
and its contribution to the mind of the machine.
|