Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

with how a bank functions, consider that there is the central vault that contains our cherished goods. We want to trust that vault. Then, added to that are all the procedures surrounding taking goods out of the vault or of placing them inside the vault in the first place. In the case of the secure core, the vault derives rather little trust from its physical stature. Most of the trust emanates from the secure core being willing to die for the cause and its tenacity at regulating the access to its most sensitive contents.

Finally, we need to mention that in some situations an alternative element of trust is the assurance that even if some part of the memory is destroyed, the information contained therein may be recoverable, if it is of sufficient importance. This is achieved by using several mechanisms to check the integrity of the memory at all time and by employing enough redundancies so that information can be reconstructed from pieces that have not been altered. This, or course, flies in the face of our desire in many instances to see the data destroyed rather than ever be compromised. Even stronger measures are possible to insure that original data have not been modified. The process to achieve that is called a digital signature. The idea is that when the data, perhaps those of the owner of the personal electronic device, are written, a mathematical function is applied to them that summarizes them in what’s called the signature. The mathematics is such that it is extremely difficult to find ways to change the data while keeping the signature intact. Consequently, if someone attempts to surreptitiously change the data they will be detected when the new data is compared with the existing signature. It will not match and the data will be flagged as fraudulent. Here, the trust that the data are intact is based on the trust in the underlying mathematics.

A rather routine way to find memory corrupted is what’s called tearing in the trade. Tearing arises from the act of interrupting suddenly the functioning of a secure core processor. The term comes from the initial form-factor of secure cores, that of a card. When the card was inserted into the public phone, power was provided by the phone. If somebody suddenly removed the card, i.e. tear it out of the phone, then the current would be interrupted and with the interruption the operation of the card would cease. Whatever was in persistent memory at this point would stay there and the card would possibly be in an unstable state. This unstable state might actually stop it from functioning, or worse from a security point of view, it might let the secure core divulge confidential data when powered-up again. Today, secure cores have sophisticated anti-tearing mechanisms built in, based around the concept of a transaction, a concept that we’ve discussed at some length with respect to interactions in general. Using this concept, data are only written in long-term memory when the processor is sure that even if tearing occurs the memory will be in a stable state. Here again, trust derives from the integrity of the data of the personal electronic device. Trust is conveyed via confidence that the programmer who has defined the functions of the card has designed the programs with the precautions required for tearing protection. Actually, this requires specialized programmers, dedicated to the production of secure cores. There are few such programmers in the world and the authors have had the privilege to meet and work with many of the top specialists.

In order to offer protection against dynamic operational processes, secure cores often use internal and external sensors. Internal sensors include detectors that warn against a surge in current, whether it is accidental or intentional. Light sensors can detect the light-attacks that we have previously described. While such internal sensors provide a degree of trust, since by their presence they can protect against attacks it is worth mentioning that any protection can become a threat in itself. Specifically, the sensor can be used for promulgating an attack. In fact, this has happened with surge detectors, which then had to be themselves protected. It is not unlike hiring a body guard. The body guard provides security, but at the same time we find ourselves

232

7 In His Own Image

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)