Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

from the external world. It can also protect information inside the secure core or information related to the secure core’s relationship with its peripherals. We will look into this a bit later.

Another module associated with the processor is the controller that manages the relationship of the processor with its memory. This is also a very critical element in terms of security, because the path between the processor and memory is a natural point of attack. Specific measures have to be taken to protect information going along this path. Cryptographic measures may be one of several tools used for such protection. Finally, we need to mention yet another important specialized module which enables protected ways to use the processor. This is a bit technical so we’ll ask the reader to excuse us if we sound cryptic: language-specific components can define a sandbox limiting the processor functions that are accessible through generic programming. We felt we had to note it, but you probably know now why we took some oratory precautions. Actually, we’ll get into a discussion about sandboxes in the next chapter, which may help clarify the point.

While the processor needs to be trusted because it is the most active part of the secure core, it does not itself contain any data that are directly linked to the owner of the personal electronic device. Such data are stored in memory. A secure core typically includes two kinds of memory: fast but short-term memory for intermediate results and slower but long-term memory for keeping data. It is possible to identify the two memories with that of humans, who can remember more of one day’s activities during that day than they’ll remember a week later. The brain sorts out which temporary memories should be made into long-term ones using a process of synapse consolidation described by Eric R. Kandel in his book In Search of Memory. Similarly, the processor uses its short-term memory to do computations whose results will be stored in long-term memory if needed. Since short-term memory, called RAM (Random Access Memory) is first of all required to be very fast, it is typically not strongly encrypted. While this is considered acceptable in general, it cannot be tolerated for very critical data such as the keys used to decipher secret information. That is why short-term memory may be accompanied by a very specialized sub-form of it, which is constructed to avoid disclosure of cryptographic information at the cost naturally of being somewhat slower. This specific memory is called transient. There are three forms of long-term memory, each of which fulfills specific needed functions. There is ROM (Read-Only Memory), a form of memory which cannot be changed once it has been written. This is particularly important in terms of security because it guarantees that the information that has been written at the factory will not be modified. Operations that are critical to the general well being of the secure core will often be found in such memory. In this situation, trust is related to the preservation of original information.

A different kind of memory is modifiable, and is used to store the data of the owner of the personal electronic device, together with other sensitive data; for example, of the institutions important to the personal electronic device, perhaps a bank or a cellular phone operator, and other data that may be needed to perform operations of interest. Whether it’s called EEPROM (Electrically Erasable Programmable Read-Only Memory) or Flash this form of memory has long-term retention. Ten years is considered a good, average duration. While such long-term memories are good at keeping data for a long time, they are not particularly good at being too frequently changed. After a time, they wear out. That is why secure cores are very careful at selecting where they write data. They keep track of how often a particular section of memory has been written and they change the place of storage accordingly if needed. Long-term memory is typically both scrambled and encrypted since this is where the most important information of the personal electronic device resides. The central element of trust in the personal electronic device is there, at the core of the core, where our most private data resides. In a way, we can say that other elements of trust are related to entering and reading data from that central vault. To make a comparison

 

7 In His Own Image

231

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)