third and last observation: the other day i was considering how 'security' seems to be achievable only by putting someone in a secure area or box, and keeping the world outside this box, and how absurd that seems to be because it requires removing the world in order to try to attain security, if indeed this is an accurate assessment. the thing that struck me about this is that the world changes outside the box, and so this could either force detachment from the world, which then increasingly becomes out of touch with the external realm not included in the box, or that only people who are inside the same box can safely communicate, as long as they are modeled or entirely known in their parameters. in other words, if a person is all alone in the box they may be secured, yet the moment anything changes, or the world itself changes, this situation could be effected within this supposedly safe and secure zone. in that, if the person is inhabit or engage with the world they need to be able to interface and interact with the world. and thus perhaps the boundary or threshold issue, of entropic balancing, should anything change or the two realms somehow begin to crossover into one another. in this way, interaction beyond the box of security then potentially allows vulnerabilities into this secure zone, via the unknowability or inaccurate accounting for how these external relations exist, both outside and inside the once secure box. so too, any persons that are also included in the safe zone of the box inherently carry with them unknowns if not modeled and accounted for accurately that potentially jeapordize this internal condition, presumably more secure than no security, though with more interaction and access to 'the outside world' the more vulnerable in various dimensions, parameters, dynamics, known and unknown. so it just seemed like security itself would be impossible to achieve if the idea involves keeping out the world, or not accounting for things within a security context, yet having this be a hive of activity likewise, unless security accounting were happening to the Nth-degree beyond what may be external signifiers of security, 'the sign of security' versus its indepth practice in undocumented terms that may not even be mentioned or perceivable, given the advanced context that could exist in certain scenarios. it is somewhat like the scenario: a person walks into a bar... except that it is a supposedly secure box where they exchange secret messages and meet at conferences and function in industries (boxes within boxes) where various vulnerabilities are interwoven with activities and how could this occur in a real context of actual security unless much more was happening than meets the eye or ear. maybe this leads back to the idea of unknowability as the threshold for security, beyond a realm of awareness, where it cannot be deducted because things do not add up beyond a threshold condition and sensory awareness fails to provide a framework to evaluate what conditions feasibly need to exist for security to exist, which tends towards the metaphysical, the invisible, the utterly alien, etc.
On Wed, Feb 4, 2015 at 8:44 PM, brian carroll <electromagnetize@gmail.com> wrote:
third and last observation: the other day i was considering how 'security' seems to be achievable only by putting someone in a secure area or box, and keeping the world outside this box, and how absurd that seems to be because it requires removing the world in order to try to attain security, if indeed this is an accurate assessment.
See also the bobble: http://extropians.weidai.com/extropians.3Q97/4356.html Also you can possibly employ some trickery involving conservation of energy or physical costliness along the order of the universal scarcity of entropy. - Bryan http://heybryan.org/ 1 512 203 0507
Bryan Bishop <kanzure@gmail.com> wrote:
See also the bobble: http://extropians.weidai.com/extropians.3Q97/4356.html
quote: "The reason I bring up cryptography, however, is to show that it IS possible to defend against adversaries with enormous resources at comparatively little cost, at least in certain situations. The Singularity tunneling problem should not be dismissed out of hand as being unsolvable, but rather deserves to be studied seriously. There is a very realistic chance that the Singularity may turn out to be undesirable to many of us." just wanted to share the view that 'the singularity' may be an ideological concept unless grounded in a model of empirical truth, whereby 'many worlds' or parallel experiences are actually issues of relativistic frameworks that are not aligned and instead exist in different, faulty models of partial- or pseudo-truth, whereas 'the singularity' would involve annihilating all reigning and ruling falsehoods via a single integrated model of empirical truth for all people to function within, thus the non-fiction approach to this idea as it also involves psychology and awareness and these effecting computation and softwared reasoning/rationalizations. akin to, in some sense, the issue of various religions and deities that are competing and contrasted, versus 'one truth religion' where truth survives and is the religion. everything aligned with itself and coherent, as cosmic order. then if someone doesn't get their way or privilege or status due to grounding part with whole, it would be for the better, and certainly people will in this way be falsified and not allowed specious grand beliefs in denial of shared reality and instead this would be mediated through hypotheses, debate, and evidence, logical reasoning, and not now today via ideologies, beliefs and opinions shared by individuals and groups as if reason, which instead functions as powerful entities that are more powerful, determining events via their truth, which manages interpretation. also of note: forgot to simplify about the box. no technology in the box. start with a pencil and paper, not a personal computer for crypto, and each step involving the outside or reliance on the outside introduces vulnerabilities. the more complex, the more can go wrong, etc. thus the heavy reliance on computational technology itself becomes the insecurity in the system though also, interaction with others. the bobble observation prescient in that, in the above comment about truth, if the tunneling is considered to be happening in a realm of truth that is beyond external observation, that is effectively security, even if against a more powerful adversary. which seems to have been your point, much appreciated.
participants (2)
-
brian carroll
-
Bryan Bishop