[1] crypto-p.wd

brian carroll electromagnetize@gmail.com
Wed Sep 11 22:31:27 PDT 2013


// disclaimer: half of what i say here is false (right), though may yield
some ideas... //

there appears to be huge intangibility involved in cryptography, belonging
both to highly advanced mathematics and its mediation in designs of
advanced technology, as if betting at the limits of what can be known - in
extreme territories and with potentially massively powerful tools where the
ideas, hypotheses are tested. and yet failure may not be readily known,
even by the cryptologists- if peer-review and mathematical and security
advances are compartmentalized (deep state capacity versus everyday
society) or oppositional capabilities, perhaps some 'unknowns' have been
solved for some time and are the basis for breaking existing codes and
creating others. again, a naive person like myself may think this is what
p=np and calculating largest prime numbers are about, those those only a
small sample of a different security-driven secret landscape of ideas,
techniques, and technologies that may be nowhere near public or even
private discourse in day to day civilization; again, this assumption based
on an otherness or differing capacity for crypto beyond existing technology
and public encryption standards.

strong on mathematics, strong on technology- yet what about strong on ideas
as the basis for the code? what about the secret communication dimension,
not just Bell Theorem signal and noise, also Saussure and others with basic
models of communication - have these assumptions become dogmatic and
assumed solid when instead they are ready and ripe for exploits based on
misconceived notions, like a social viewpoint that is accepted and
unquestioned yet inaccurate or even to a degree untrue, then allowing a
false viewpoint or perspective to become standard, able to be exploited
from the start due to not fixing the errors, and so on... those being
errors in thinking, in conceptualization, in assumptions of 'what code is'
and where it begins and ends, and the issue of its conceptualization and
especially ~understanding or meaning. utility is a much hated word though
in an infrastructural sense perhaps relevant, and likewise: purpose.

this is where i contend that "code" that is assumed 'true' by its very
nature of transmission is insecure by the assumption that this viewpoint is
actually shared in a model of trust that grounds to truth removed of
errors, versus partial truth or even a fiction that establishes an
illusion, behind the security mask of encrypted communications. and is that
level of auditing going on with the messaging, what is transmitted- and
where does the code actually end-- is the model of encryption
-simplistically- only an issue of creating a container to send data within,
thus in some sense providing security and cover for hidden conversations,
and thus like a brown paper bag that goes from point A to point B and
blocks any attempts at intercepting the contents (say anti-magnetic,
un-x-rayable, etc), and is it a binary data model that scrambles the
contents within this container to an indecipherable format, related to
particular cryptographic equations, and via key exchange or other means,
can be decrypted and the message taken out of the brown bag when confirmed
to safely arrive at point B. and should someone gain access to the bag,
they may only be able to investigate its outside, and if advanced enough
perhaps the bag would degrade or disintegrate over time or by any attempts
to access what is on the inside of the temporary security container.

a horribly uninformed guess of the dynamics perhaps, though issues of mass
or targeted surveillance of encrypted data (say by NSA or the local police
force, in a terror-allowed extra-judicial surveying getting around the
bureaucratic blind-eye syndrome, not everything dealt within the courts
these days if ever it was) - then perhaps the brown bag is actually
instead, via the capacity for decryption and key-escrow scenarios- a
transparent ziplock pouch containing the message that is meant to be secret
and thus the data is accessible both at its origin, along its route of
transfer, at its destination, and in any storage capacity, potentially. And
perhaps that information could even be stored off-site in some database-
perhaps the ideal model for the security state, just like the fantasy of
electronic health records-- who could feasibly do a better job of this than
a ubiquitous surveillance state- what would the ur database of secrecy be,
would it be a data warehouse in some desert or underground mine somewhere,
with all the hidden information of peoples private lives, chock full of
lies, betrayals, indictable offenses, then to be queried should *any*
citizen step out of line, in any political context- to call upon electronic
blackmail or other data to shape, sculpt the future state via such
exploitative information operations? is that not the fear at least, about
unrestricted data gathering and loss of trust for where the boundaries are,
the law no longer seemingly protecting citizens or held as a hypocritical
Damocles sword above each individual, should they question the state,
bureaucracy, its authority and various representatives, public though
especially privately connected, advantaged, as if now you are on the wrong
side- no chair for you when the music stops.

it just seems like so much is riding on the infallibility of a model that
has obvious weaknesses, in particular the serialization and digital mantra
of long numbers and calculation in a particular ~style of computation, as
if somehow the peak of intellect, while seriously flawed both in its
thinking (rendering a too simple worldview as binary ideology) and its
technical limitations (leading to abysmal computing for human beings,
though great for dumb and powerful machines). Try to eek artificial
intelligence out of a concept that is not grounded firstly in truth,
inaccurate models detaching quickly from human values- humans serving the
machines, trading life for the toxic necropolis though also a structural
idiocy built upon the falsehood, unstable, which is why the ideology must
be 'absolute' and basically monopolize options- the barrier of the binary
is keeping people away from understanding and being able to shape
technology, its obfuscation and abstraction far away from 'thinking code'
that was once the goal, so everyone could program a computer and instead,
only a professional class can do it, and it is so horrendous in terms of
implementation at scale that devices are basically hobbled together in a
mish-mash of oftentimes conflicting code, if not having such design issues
as the basis for exploitation, for weakening software to disallow any brown
bag or secure website to possibly exist, though held within a context that
ideologically presumes and declares the brown bag scenario is the default
situation, versus the transparent ziplock bag, whether cellphone data kept
from the manufacturer who monitors it for statistics and advertising, to
others, including government, or home computers that are like ant farms
these days in terms of potential exploits, like a plague environment where
quarantine is likely not even possible anymore, especially with TEMPEST or
keyloggers or NFC or whatnot. cancer is not only devastating the
populations, there is a cancer of ideological code, a virus-like contagion
that has overtaken technology and is best, most iconomically represented by
the binary digits of 'digital ideology' as if progress in some backwards
mind-washed and societally-engineered global cesspool.

100101101001000001101010100110010101000101011100

What is that stream of data exiting or entering my computer? -thinks the
naive person to themselves- is it my bank records being pinged remotely by
the local magistrate to use against me in an extortion scheme or to frame
me and cause my downfall?  At some level, this is the universal currency of
computation today for those who can use and "program" the devices to do
things, though of course it is reliant on computer architecture, processor
design, transistors themselves and if 2-values are the approach, that
establishes a structure that influences everything within its functional
domain, as a kind of superset operation 2(everything).

Thus, an issue like "literacy" in a very limited context may be if you have
foundational knowledge and can understand and comprehend the situation
involved, (in contrast to omniscience as a basis for literacy.) Those who
have this 'binary computation' literacy then are able to program computers
to do things via software and hardware designs, and particular systems:
e.g. a security model that becomes crypto technology, via customized
hardware and software development. And that likely is based on certain
assumptions about how things work, yet within a particular (binary)
framework as the overall, largest, or overriding assumption. A situation
like qbits or spintronics potentially upsets the model or analog
computation (if not 3-value or N-value) best suited for artificial
intelligence in that 'grey area' is vital -- retaining "unknowns" or
"neutral" states -- as part of the consideration of IDEAS within a
computational and analytic context, versus forcing an answer, most
especially if this is premature or even inelegant and in its lowlier
determinism, degrades the question in achieving its answer, dumbing things
down.

For people to succeed in society they have to become binary machines, think
like on/off switches, a quick way to success if taking on machine values
and reinforcing them, and in this way the binarist has found their religion
in a false absolutist framework that has also killed though within the
educational system, universities in particular, where ungrounded viewpoints
of subjective relativism (a=b) enable an authority to determine truth, thus
trump any errant thinking, and allow the machine to proceed on its
political path, via its own antihuman values, much of this supported by tax
dollars, loans, and lifetimes of tithing-- to gain what exactly- "the
correct viewpoint of a person who can function in the machine, as the
machine, become the machine, extend its principality".

For those not literate enough to program and much less to design crypto
systems in that context, the binary code itself is the encryption- the
opaque wall that is impenetrable, a mystery behind which all truth in
society is either captured or missing, held outside of, and thus
delegitimated by its absence (~nothingness). In this way, the existential
no-exist crisis, everything reliant on a computational system and approach
that has disenfranchised humanity, yet people are told and sold on the
faith in corrupted technology (and corrupt ideas) that the whole mess
actually works and there is a hidden purity in it all, behind the code you
cannot understand nor fathom. That it is actually beautiful and not
horrendous and a terror, "you just do not and cannot understand", unless
indoctrinated, made literate. And most everything keeps that from happening
for certain people on the outs with those running the exploitative power
game, which is also part of the 'idea'. In that limiting access, segmenting
populations of those who can and those who cannot, then is active political
science as computer science and its development. This leading to the online
webwork and network culture of today which is more a global junk drawer
than anything else, civilization turned into foolish wasteland, the trinket
icons for social media most like those thingamajigs put in the safe zone of
a baby crib for the enforced society of mass adolescence, by DESIGN.

So for one of these fools, myself, for me the binary code is a form of
encryption (or perhaps encoding with an incapacity to decode) that carries
with the mystery of perfectly hidden communication, that only few, masters
of this realm, can deal with to the degree of breaking actual cryptography
that is further embedded in this modeling of data in what seemingly amounts
to electric charge and magnetism as this is moved around and stored within
circuits, on an individual local level and as it relates to vast global
networks and congregations of such data in what are likely only
"pseudo-empirical" models, not dealing with _absolute truth and instead
reliant upon a shorter quicker route that estimates what truth is using the
same binary ideology, which tends towards reliance on ~subjective
mathematics; subjective in the sense of A=B whereas objective would be A=A,
relations involving like and unlike.

Plato enabled the questioning of paradox, accounting for it, whereas
Aristotle apparently deny its existence- and this more like Aristotle's
world. Both could be correct if delving into it, modeling it, figuring out
how the relativism fits into a shared model of truth- it could be an issue
such as allowing for time that favors one view over another, for instance.
And yet if assuming 'everything was known and figured out' and thus
"absolute truth" could be determined, after all the facts are in, then an
A=A approach may be valid as an unrealized hypothetical, a model of truth
that is highly accurate towards truth (95% +unknowns/errors) that is then
essentially "truth" yet remains contingent, based on falsification or new
data that tests and challenges the model, further solidifying or tweaking
or undermining it. This is the assumption of the binary 1, absolute truth,
and in contrast 0 as falsity. As if a daily encounter people can categorize
their experiences within. That is, as an idea, as an ideology-- yet
throughouly in the bed of relativism, without grounding in a larger
error-correcting empirical truth, and instead reliant on the local
individual skews and warping and distortion of uncorrected observations,
shared and unshared, as a basis for 'infallible' assumptions and
presumption of truth as an easily accessible, decidable condition- a choice
as it were. A right even, for an individual to determine what will be their
specific reality on a given day. Flip-flop circuitry, today it is true
tomorrow false and in two weeks truth again. No sliding scale of the
N-value analog of looping probability (.1 then .8) nor 3-value grey days in
the neutral or unknown middle zone (1-N-0) -- instead, like 'the only
correct answers on standardized exams" in the indoctrination system to
brain wash humans into machine ideology for pre-programmed, exploitable
functioning, there is always a right answer available, and someone has it
and will move ahead and those who question or think differently are
challenging the machine, breaking the ideological coherence, and must be
removed as if defective transistors, part of the corporate state business
model of mass manufacturing human components into a living global computer
based on machine values.

And what is proposed is that an assumption exists in cryptographic models
that involves this issue where, most basically, the assumption that A=A is
itself not accurate in the least, including at the computational or
hardware level, its architecture, as this then evolves into software, which
"ideas" then both are born of and born within what likely are
'inaccuracies' of thought, of consideration about IDEAS themselves that are
the basis for the code and the secret communication. A lot of assumptions
could be wrong, including at the level of messaging which crypto may assume
is A=A by default, of shared grounded interpretation when instead it is
most likely A=B by default, a question, a very grey-area of consideration
-- how do you even know what the encrypted code is, where the crypto begins
and ends-- and it seems to be that 'the crypto algorithm' is this device
that delineates : here is the crypto. And for the uninitiated and
illiterate (in this realm) it becomes a situation not only of seeing the
binary code as a wall of mystery and actual oppression, a limit or boundary
or threshold behind or beyond which is an inaccessible realm that has the
capacity lost in another realm, the potential for action, for ideas, held
in the hands and minds of others, then to be faced with a stream of numbers
and repeatedly told of their security and really- infallibility- as a
security model, because of the length of the string or the size of the
prime numbers being computed. As if entirely about numbers, truth and
ideas, and not about logic and truth firstly or in relation to these,
foundationally.

And so from the outside it seems some of those who actually believe such
things must either be very naive "thinkers" and have no real philosophical
sensibility -- that is, in the realm of ideas or models of actual human
communication -- or they are lying and bullshitting and are fully aware of
the exploitation. Perhaps there is a hidden social aspect for humans
involved, implicit understanding and awareness of these limitations, though
for others it seems like the classic crooked salesman situation, crowds
gathered round for the miracle cure which is a ripoff. Intelligence wise
this is a sure thing, the deception- though the scale has gone from a
public context into a no rules private context where seemingly anything
goes within a given networked boundary- which perhaps is the setup,
allowing the petri dish to populate its ecosystem, observe and categorize
the dynamics, and so on. And thus, implicit in this suspension of
disbelief, the grey area appears in the paradoxical nature of the
situation- there is and is not security, it is contingent on varying
factors and can ebb and flow day to day. And yet at some juncture this is
already well into the application or implementation of crypto models and
assumptions-- say people are walking around with encrypted access badges
and it leads to biometric and other parallel security technologies to make
a physical security situation as robust as it can be in terms of verifying
identification.

Yet even then the well known issue of intention, the person moving from one
point to another could have ulterior motives and that access granted them
is actually an issue of insecurity due to duplicity, or who knows, with
counter intelligence it could be triplicity and fake messaging or whatnot
that is moved as information. And so that depth and issues of trust. And
then in an online, remote connection scenario, software is mediated the
locked doors and verification, yet the same issue remains of trust between
sender and receiver or the relation of those communicating via secure
exchange. And here is the question again- how can it be verified that Alice
is not Edward and Bob is not Nancy or is that irrelevant and a 'social
issue' of security and not involved in the cryptographic model.

For instance, assume there is an Edward and Bob who are exchanging a
message and it is in a biased pronoun perspective (subjective) of "history"
that warps and skews human existence to only oneside of the ledger at some
interpretative level, where inaccuracies or falsities could persist in the
data itself.

   Edward ----> ("history") ----> Bob

If Bob receives the encrypted information and "decrypts" it, presumably Bob
would then have "history" on his side and the exchange would be successful,
the crypto would have worked, and it could be assumed the data is TRUE by
default of its transmission; the code is some fancy algorithm (brown bag)
that moves the intended information from one point to another in a
protected, secure way.

   (history) Edward <===> Bob (history)


Yet what if Bob is actually Nancy in drag... what if the identity of sender
and receiver are unshared in some relativistic aspect that remains
unaccounted for in the general model of trust- easily equated with a sender
or receiver who is lying or an impersonator, etc. Or, an ungrounded
observation assumed universal and the basis for shared empiricism...

   (history) Edward <===> Nancy (history)

The reasoning or thinking person may evaluate inaccuracies or flaws within
the 'message' or 'ideas' and discern or deliberate from that context, which
could still involve 'encrypted data' as it relates to actual truth in the
model of shared exchange. For Nancy or a human being, "herstory" may
balance the biasing of the male perspective where relevant as a shared
framework, and thus there could be 'both truth and falsity' in the message,
or shared and unshared POVs. This is proposed a potential weakness in terms
of security, because the 'secret writing' does not end with the data
transmission...

  (T) Edward <===> Nancy (T/F) --------> his|her-story


Now perhaps there is implicit understanding between Edward and Nancy about
these dynamics, so a kind of autocorrect could occur via observation, such
that a human view could emerge from both a male and female accounting of
the story- yet it also may not and lead to diverging interpretations, one
biased only to male evaluation in an extreme version, and thus the female
structurally subordinate yet functioning within that realm by ideological
compliance. Institutional politics seems to occupy this realm by default,
attempting to engineer a solution while not dealing with the corrupt code
involved, or false ideas allowed to persist.

So assume this split in interpretation is not to do with sex or gender
issues and instead it is just about an unshared idea, where a model could
exist that the data exchanged in a secure way is actually A=A when instead
it is A=B, and what that dynamic establishes in terms of corrupting
assumptions of trust. In a scenario of ungrounded relativistic observation,
there could be 'N' such security problems for any variance in the ideas
themselves. Hidden readings belonging to other levels of secret writing and
hidden communication-- and this is all about meaning and language itself as
the primordial code of ideas, not mathematical concepts as the meaning,
value, and worth of the exchange, presumably.

Thus the double-agent problem could be:

   (T/F) <===> (T/F)

And depending on how those doubles interact, it could be sharing like or
unlike lies or sharing truth or unshared truth. And that is before any
ambiguity or grey area would be modeled where a question may exist,
unknowns, in what is being communicated- which is usually the norm for
exchange of information in that people are not omniscient and not capable
of thinking through every last detail of a communication due to
boundedness, though computers may have more potential ability for this-- in
plain text. Like newspapers headlines related to other headlines in a
categorical model.

   (T/N/F) <===> (T/N/F)

In the above example, the middle or 3rd value could either function as
'unknown' and thus not involve determination of what the meaning is of the
message or *some aspect of it* which could remain unintelligible or ~vague,
in some way or dimension, else it could involve an N-value approach that
slides across from truth to falsity depending on probability of
understanding, whereby 'truth' and 'falsity' are never actually attained
(impossible, I say, this absolute knowing) in the basic data model, and
there is always already an implicit realm of error and misunderstanding and
non-awareness inherent in the "secure exchange" via these shared relations
that is part of the condition of serial language based on non-empirically
grounded signs today. In other words: most all language and communication
exists in this gray area (N) from the start, even within computers, and the
binary framework (1,0) and truth and falsity in an absolute framework are a
fiction; and in this way-- a security problem in each and every exchange in
terms of the actual accounting for the truth in the secure exchange, its
validity and its role in establishing shared observation when this is more
unlikely than likely, if there are unstable shifting conditions for
observation (observers moving goalposts, etc).

So in a security model of relational exchange it would appear required to
account for ambiguity from the start, such that any exchange exists in an
insecure condition *as language* which itself can be further encrypted or
encoded and depending on the observers may or may not be shared as a
viewpoint. This is the realm of linguists as thinkers of ideas, the
potential for language as code, that extreme threshold of intelligibility
that can *appear* and actually *be* that garbled mess of signs and symbols
and numbers and yet remain intelligible as language, as hidden or secret
communication.

   Observer.1 (N) <===> Observer.2 (N)

This is to attempt to convey the idea that while 'binary code' and
encryption could transmit an idea between observers, that there is still
the issue of viewpoint, understanding and analysis- the meaning of the data
in the exchange, as this relates to secure communication. Perhaps it only
applies in a textual exchange format, yet the encryption itself may go
further than PGP or SSL and the issue of data integrity seemingly may not
even relate to the issue of 'truth' of the data itself, which in some
instances may be required though in others, it would seem to imply either a
shared empiricism must exist that error-corrects false views and thus
enables 'truth' to co-exist via remote connections, and perhaps involve
shared dictionaries or keys-- which tends towards truth-- or that it could
be wrongly assumed that this is a shared condition else asymmetrical, and
those dynamics could be involved.

The reason it may be relevant, especially in an untrusted context, is that
the 'officially' decrypted code may not be the actual hidden message, it
may be the self-evident signage of successfully contained and delivered
'security content' yet its meaning may remain ambiguous until further
analyzed, which could be done successfully or not, and may or may not be
time dependent upon having the window or keys to decipher its hidden
meaning, thus long term storage may not be an issue if it quickly degrades,
the originating context evaporates with which to contextualize it, make
sense of it, etc.

In other words, the 'official communication' could be a false perspective
and the double or *surveiller* may access the decrypted headline and
interpret at that level of binary correlation and categorization in its
rough global-model, yet the actual intelligence may not be surface level,
it may still be encrypted within that content-- and here is the idea: like
the fiction of the binary string being some intellectual stronghold that
transports the valued information, it is instead that that decrypted string
or gibberish data when made into plain text is not verifiably the
"decrypted code" which could still exist in plain language without a
computer algorithm determining its structure (instead it is ~ideas
themselves, their truth) and that this could even involve raw crypto code
itself (guessing hash data) that could carry within it decipherable yet
hidden meaning.  e.g.

A SENTENCE COULD HAVE ANOTHER HIDDEN MEANING WITHIN IT.

The signage (letters, words, punctuation) does not readily move to a A=A
scenario in certain chaotic environments where meaning is unshared. It
could be variable, unstable, collapse if falsified or the hypothesis is
known inaccurate or false- thus A=B that it tends towards the grey-area or
even falsity. The sign itself, say a [word], could be ambiguous, it may not
translate across cultural differences as a concept or may exist in various
zoned definitions, say word processing software or written word or spoken
word, or may be a typo (world). They are potentials, possibilities, and if
not having the key, it may be missed or details that cannot be comprehended
given an unshared understanding or inaccuracies in viewpoint or reasoning
process. Say, if forcing things to a biased perspective and thus there is
data loss in attempting to access the meaning, because it does not readily
fit into the same conceptual framework. Issues of language. Yet further
there is an entire realm of language missing from this that is moreso that
of code and encrypted communication: symbolism.

If for instance a PGP encrypted communication was shared between observers
1 and 2 and so it streamed through computer processors and across networks
as digital bits and a string of abstracted encrypted information that
arrives at its destination; and for all that trouble the "officially"
decrypted message is a word that can be written in different directions,
and thus is either the same or has different meaning; say [ton] and [not]
else, [wow] and [wow] or [mom], else the ever classic anagram [santa] and
[satan]. This kind of 'word permutations' are similar to calculus in that
they transform the situation from one scenario into another, and this is
mentioned in Plato in regards to mirroring and language, that that is when
the meaning of language is unlocked and understanding begins.

This is the most basic first step into this realm, though the idea is that
signs have mutability, yet there can also be a symbolic aspect that is
inherent in all language (categorization, archetypes, say a tree in
relation to other trees as it models the 'concept' of what a tree is); and
so images and objects can function as language and be used in
communication, such as a barber pole or sign for bread outside a bakery via
the image of bread. Symbol dictionaries are the place to look for this type
of rich cultural information which dates back to the beginning of
civilization and involves the esoteric and mystical realm, in addition to
that of theology and philosophy, essentially metaphysics which can veer
straight into the occult or the core of the world's religious institutions.
so entire languages or systems of communication are already establishes for
millennia and tied into present-day language and sign and symbol systems
that potentially could be referenced in a 'decrypted communication' that
remains encrypted in this context; and it directly parallels the [infinity]
x [infinity] x [infinity] ... {N} approach, because each letter or word or
idea could potentially map into another unknown context, unless having the
capacity to decipher this non-linear, multi-linear ecology of ideas in
their various empirical frameworks-- if accessible to the observer. It is
not a serial string that suddenly is decrypted and becomes A=A by the magic
of cryptography and instead becomes a question of assuming 'the answer' is
the most immediate signage encounter upon 'official decryption' versus what
may be an extended hidden communication that is the foundation and basis
for human language and communication throughout its development of culture,
and that this is not a serial string of signs (say, greatest idea is
largest prime number!) and instead about the interconnected logic of
symbolism as it identifies truth, and those who shared this empiricism and
understanding communicate within it, and those who do not may have the
signage, and potentially the keys, yet may not be able to see it because of
an unshared model of truth (theirs: pseudo-truth) that degrades the
interpretation via the action of seeking to determine meaning.

Imagine the decrypted official message, post-binary, post crazy code, is
the plaintext word:

  rotor

And somehow the hidden key indicates to twist this 180 degrees, such that:

  jo+oj

In this arbitrary example, given pre-existing library of meaning or
contextual interpretation (say, contingent meaning based on temporary
shared keys) that this is referencing the song _these boots are made for
walkin'. Such that perhaps the two letters j somehow reference this as
pictographs and then there is additional content related to the potential
signs/symbols of that fragment as a linked cryptogram. The plaintext rotor
may be embedded in a larger decrypted document yet be distinguished by a
secret shared key that opens up or unlocks its potential meaning; in that
it may or may not be "accurate" or true, though if grounded as a shared
viewpoint it could tend towards 1 or absolute truth in that finite
micro-perspective that may identify or share some critical data. If
considering that each word in this email could carry some potential for
decryption of hidden information, not only is each letter and word a
potential variable, their combination and connections both inside and
outside this text are also relevant thus instead of a binary string of ones
and zeroes and their abstraction as an indication of the intangibility of
accessing the cryptic code, instead it is the empty set and that question
that stand in for the self-evident (yet potentially wrong) signage saying:
the decrypted code is here, read the serial message: this is a secret,
shhhh....

Do you see the absurdity of assuming encryption occupies only an obfuscated
realm when in a context of philosophy, truth, ideas, logic, and mathematics
involved in those questions versus what are by comparison computational
trivialities in terms of "intelligence" as it exists in the realm of ideas
versus vacuum packed into a clean-room context of science, technology, and
technocrats with a ruling agenda? It is really laughable, in that there is
real idiocy involved in assuming an idea is simply true or decrypted as a
sign of a language system and that there are clear boundaries between these
security concepts. I doubt humans do this though apparently a great many in
the population are ideological adherents and enforce this viewpoint, have
taken over entire institutions, in particular the education system itself,
government, health care, and are determining by this false perspective
binary mindset the future of humanity, which is not only in decline, it is
that of the earth turned into an open air concentration camp and yet given
tools to communicate about it (ziplock bags) that would lead to their
further persecution for being revealed an enemy of the rogue terror state
via gilliam Brazil-like error-nightmares that can never be recovered from,
bad components must die, only the ideologically pure will survive, who like
in the Matrix now use humans as batteries to keep their machine running,
"evolving".

A related aspect involving Plato is that there are original ideas,
fundamental concepts, and then there are "copies". And it seems very
relevant to issues of code, programming, cryptography and security,
including with hardware development (knock-off chips, secret instructions,
etc). Issues of verification of A=A that can be lost via mutations or loss
of oversight or control or unshared goals, ideas, as part of the process.
So that seems to describe some of the politics involved, where an idea can
start out in truth (A=A) yet move towards another viewpoint or further into
pseudo-truth (pT) over time, such that A=>B (or, A=B). This is like a
once-secure crypto approach that is subverted somehow, either known (A=B)
and thus invalidated for its security or believed secure (pT=T) and thus in
that error there is a loss in security; in that *subjectivity* as it were,
that unaccounted for ambivalence or the impossibility of determining its
truth via accounting.

Yet what is even more readily evident in "popular crypto" appears to be the
issue of 'copies of copies' which is the internet model of software
distribution, whereby the issue of the first copy had a close relation to
the original, such that A1=A2 may be nearly indistinguishable, whereas
through the reiterative process of 'copying the copy', (such that A2 =>
A3...A300+) then also involves erosion of the original within the realm of
the copies, whereby A2 is closer to B than A1, and A300 is no longer
recognizably the same, cannot function as an imposter, and is a
self-evident degradation of the original idea (A=B), "unlike". It does not
pass, the camouflage of the mimicry broken; just repeating signs (code)
without "understanding" then has entropic loss of intelligibility as a
consequence.

And thus at the level of signage, a key could be known and repeated,
attempted to be used, yet if it is ungrounded, shallow, disconnected, the
observer would stay on the outside of the conversation, surface
interaction, versus entering into a shared realm of awareness. The hidden
communication could be right in front of a person and they may never know
it. That is, in terms of ideas. How to encrypt a phone call or video the
same way probably relies on existing concepts tied into binary data
transmission, though still even in those domains the same issues of subtext
and accessibility apply. Grounding, ungrounded truth, verification.

So this is to presume that cryptography has innate connection to
conceptualization, modeling of the relations, exchange, in a context of
security and shared data. And yet in some ways this language viewpoint
inverts the signal/noise approach, in that the secret writing may instead
occur in the noise and not within the signal as is presumed of 'decrypted
message' via a software solution, at least formally, from a naive view. In
that there could be many needle-in-haystack scenarios inherent in ordinary
language transmission that effectively function as encrypted information or
messaging as part of ordinary communication processes. And you could have
your optic nerve tapped by neuroscientists who are reading your brainwaves
and seeing what you see, seeing the keys and considerations, yet if the
empirical model of truth is unshared or errors are relied upon, that split
fractures and limits interpretation, making it potentially inaccessible in
that it functions in a different paradigm of consideration, outside the
framework of evaluation-- in the realm of ideas, not of ideological
determinism to validate a too simple model that becomes a method of
behavioral command and control.

This conceptual code, beyond the sign, into the sign, between the signs,
appears absent in the thinking and ideas of crypto as computation, though
in terms of its calculus-like ~mathesis (mathematics of language, language
of mathematics) based in logical reasoning, this infrasign, intra-sign and
symbolic question go into the deep core of culture at its earliest and its
most recent era where the same model of truth has been relied upon and
extended, in the realm of ideas, and thus de|con-struction and other
approaches -- hell, triple loop, salchow, flip and lutz in skating is
itself language, or the arrangement of flowers, or the color and details of
clothing ensembles-- and that these domains can be secretly written/read,
parsed for hidden meaning in day to day interactions and this is also and
perhaps more prominently the realm of crypto-communiations, if not
preceding its technological development because the mathematics are
different; what if every number of the largest prime was a bounded infinity
and each related to the next in sequence, what computer can deal with that?
none. The conceit is that today's crypto is that strong, whereas the
"ideas" of this crypto is indeed that strong, just not the technology to
communicate it. The ideas are the protection, as they are encoded or hidden
in others, requiring thinking yet also competence, not mere mimicry, not
just stand-ins or copies or clones seeking to exploit via subversion or
controlling a domain- such as: the classic "x" marks the treasure,
therefore everyone is at x, yet that is not the real x, it is actually x',
and so on, because it is symbolic, goes beyond the sign=sign as truth when
instead it is a question relying upon shared verification, validation,
testing, rigor-- security.

An example of the difference would be a coin toss, a binarist having
modeled the issue to only allow heads or tails, when there is a slight
probabilistic chance it could land on its edge under certain conditions,
and thus paradoxically be 'both' heads and tails or indeterminate, and thus
an issue also of time is involved. So even though the probability may be
hypothetically 0.00001 that it lands on its edge, say the coin toss lands
between thick blades of grass on the soccer field, and thus requires a
follow-on toss, that instead this ambiguity can be removed from the binary
model, made irrelevant, as with 'unknowns'. That is only amplified when
dealing with a realm that more closely occupies this edge-condition day to
day, issue to issue, then forcing it to goals on one side or the other
(1,0) when instead it is likely in a gradient between them (N), either as
3-values (unknown) or the bounded scale, sampling a resolution up to
infinity between them, for any given evaluation of truth, in an empirical
framework. Relativism, the ideological beast, ignores this and goes binary
to allow 'super large prime numbers' to exist as ideological viewpoints,
irrespective and ignoring their falsifiability, that is the essential
corruption of the rigged game that ends with killing off humanity.

Whereas if you are in outer space, there is no horizon and you flip the
coin, presumably it is going to keep spinning and spinning until friction
eventually slows it down though perhaps outside influence will motivate it
(ionic wind or hot-cold difference from sun) and perhaps that will keep it
going and going and going... and yet even if it were to stop spinning
someplace so remote as to have no place to 'land', no horizon to tell what
side is UP, how without this frame of reference would the coin toss be
determined in its sidedness. Seemingly it would involve being pulled toward
the nearest gravitational source and if habitable and surviving reentry,
say on a dead moon, it may finally land in some dusty realm, highly
unlikely on its edge, though perhaps removed of its identifiable sides or
not, yet at that point, it would be determined-- this is the result of that
long ago flip of probability minus immediate gravity. The weightlessness of
not knowing, of having questions, not enough variables to model an idea
fully, and taking that time _before deciding what is true, is that realm of
the neutral observer, and of a method of analysis requiring of hypothesis,
not reliant upon the quick answers a false-theoretical framework provides,
such that for universal or enigmatic situations the first choice would
instead be absolute "truth" or "falsity" in the binary mindset, further
constructing and building the false perspective of ungrounded relativism. A
trillion quadrillion zillion coin tosses true and false-- that is what we
can do! -- Yet what if most of those evaluations are inaccurate, hollow,
even destructive for the ideas they are mediating, to the point that it
subverts "truth" and replaces it with a fake realm of false choices and
corrupt relations as the status quo. Perhaps more time need be given to let
the coin spin for each and every question, instead of seeking to determine
its outcome in a too simple model of reality.


  s8b
  23x
  d0s

The code snippet above could have as much or more "computational
complexity" than the largest prime number, in terms of its cryptographic
potential, if instead of evaluating a single message or correct answer that
there could be a novel's worth of meaning. This is the 'universe in a grain
of sand' approach, more like that of scrying where set theory universes
could be nested within others, and these ecologically connected inside and
linked outside the matrix, crypto patterns that are bounded N-variable
relations that offer an interpretative open range of decipherment, yet like
a random number generator, do not necessarily hold intention or
intelligible structure by default of their 'random' creation. Enigma RNG,
like a slot machine with symbols that tally, except these could instead be
TLAs or gap substitutions or mutated or phased dynamics, or various
movements etched, all of it libraried such that patterns could be revealed
that are insightful and map to existing other frameworks-- in that like
archetypes and tarot (applied symbolism) or especially crystal balls,
something is revealed momentarily and this may not be connected to another
via obvious key exchange- instead it could exist via SAD and quantum
correlations, the entanglement of a shared resonant instance that pops out
like a constellations or its key revealed this way, accessing a noosphere
like collective consciousness where truth actually does determine reality
and in this surrender to the weather-like dynamics of this ephemeral
condition, its magic- what is grounded can be made accessible this way,
revealed.

A computer may be able to parse or frame small aspects, yet to decipher or
read or make sense of it, more would need be involved, shared
consciousness, to consider the questions that may arise that could weight
certain variables over others in a given moment, and then transform the
context and provide a path down another previously unseen interpretation as
a result, only to have the wave function collapse and the idea disappear
from view, safely stored in its state of mystery. That is, more of the
realm of "information" as ideas existing outside the brain, in the
atmosphere, accessible by others, and not just about brains in skulls and
neurons blipping as if all language and knowledge can be flattened to a
graph or visualized by modern-era phrenologists with dangerous beliefs.

This is more than parallel worlds model of relation, entanglement inherent
in shared ideas if the 'original' is pinged by distributed others, then how
accurate the relation with the idea and with others as a basis for trust
and security. In binary worldview everything occurs in the same set theory
universe (U1) yet this is a false POV, whereas in a paradoxical logic
approach, the shared universe (U) is born from their integration and
structural interconnection of all relative universes (U1, U2, U3 ... U^N)
that are grounded in truth, removed of error, and thus modeled and related
to and through via shared perspective; archetypes, language, communication,
shared identity, trust, value, exchange, information as current and
currency, onward to hidden civilization, cosmic lineage, secret order.

The crypto-bomb is that, as with set theory, there can be hierarchic nested
relations within a conceptualization of code and secret communication such
that issues of apparent and vaunted 'peak complexity' that declare
cryptographic integrity today (transparent ziplock as if brown bag) are
themselves quite simplistic and rudimentary in comparison to the
mathematics involved in this other phenomenally and incomparably more
intense "intellectual" evaluation -- involving ideas themselves in the
security model -- in that, take for instance the Kryptos enigma (
http://en.wikipedia.org/wiki/Kryptos) -- it is very impressive such a
sculpture exists and a single message can be deciphered that is said to
explain its various grid of letters. So its hidden patterns must be
accessible via the established conventions that indicate a correct way to
go about and solve the puzzle. Yet what if there is more than one puzzle or
that 'intention' may exist beyond the quote unquote author (finite person
versus cosmic intelligence) and that like a RNG those same letters could
carry other meaning that is potentially relevant in a given instance or
could be referenced or a shared or unshared key could decrypt.

This is more the Hunter S. Thompson-Timothy Leary key exchange approach to
cryptography, psychodelicode perhaps, akin to cloud-code, observing the sky
for recognizable patterns of meaning or significance, consciousness as
divining rod, tuning into N-variables depending on individual or shared
literacy, all about language in its symbolic, mathematical, logical
foundation in terms of patterning, constellations of ideas, building from
truth (A:A), finding it, locating it, securing it, yet with time it could
move, change shape, and so trying to grasp what is there if it is there,
the grounded moving toward sanity, ungrounded fast tracked to madness and
extreme anguish. one time pad of mind, else post-it notes and micro-cut
security shredder to consider the calculus, the math is already witin the
alphanumeric structure, HIOX of the spinning horizontal letters and
vertical, twisting around to reveal themselves the same while others
mutate, letters, words, sentences, texts, ideas this way, stories, beliefs.
back to into logic, circuitry, matter, energy, this information. Crypt code
in context, WYSINWYG. It is a question with potentially many correct
answers depending on viewpoint, frame of reference, quantum versus
classical dynamics, methodology, thought, belief. Sequencing alphabet,
tabulating uppercase, lowercase cut in half along middle line, mirroring.
Chess move patterns, anything mapped onto its structure as a potential
interpretive device. Fractal code, within the noise, more and more
structure reveals itself, likely more information in that potential
framework than computational power on the order of magnitude of today's
crypto breaking claims (death of universe). Can you map all the information
in Kryptos, its potential relational meaning, via machine translation, how
many series of encyclopedia would be needed to explain the data mining of
deep significance of random connections in their associational relevance--
who decides what is true, how is it weighted probabilistically, especially
if the code functions as oracle? That is, what is true within it is true,
however so. How to access it, how much is there- can mathematicians figure
out and model such a scenario of bounded infinities within infinities in
seemingly arbitrary noise, looking, searching for structure, relational,
value? And what if that is tapped as a shared reference, a small part of
it, say a 2x2 grid of letters via coordinates-- is not this détournement also
cryptographic. That is, its apparent noise containing meaning, given
perspective- if it were to exist, and who is to say it does or does not-
how is that decided-- by a binary algorithm that tests against its own
conventions and modeling? Or perhaps are the machines blind in such a
context if the map does not represent the territory. Of course it's black
and white! -- said the grey to the gray.

Randomness, noise, entropy, "structure"-- why the dogma that a binary code
must determine this, why not a messy fragment with structure, or even a
landscape or topography or bryce-3D model as data set, is it a
deterministic view based on unique numbers, primes- what if each bit was
effectively larger than the largest prime, and there are infinite bits? The
issue of infallibility, infallible perspective or one correct shared
viewpoint as presumption versus the cosmically difficult work of
establishing this through hard-fought and hard-won hypothesis, including
blood and agony- to arrive at _tentative and contingent models versus
faith-based mathematics and belief systems functioning as techno-religion
and crypto-theology, yet fundamentally flawed in terms of the ideas
invovled at the level of the propositions, the dogma ear-shattering as if
loudspeakers given official viewpoints over and over everyone is supposed
to conform to, believe, "trust the technologists- trust the code" when this
is exactly opposite the idea, trust truth- verify everything first, stay
vigilant, check and error correct eternally. Instead that is process
hacked, subverted, errors standardized-- so what is trust in such a shared
environment- perhaps crypto is not so limited in terms of ideas that may
use the technology as its carrier wave yet exist otherwise, as a kind of
poetry of a people, a living truth that is shared, versus an inaccurate,
flawed, and genuinely stupid worldview to sustain due to its basis in
corruption. Does the transparent ziplock bag really surprise anyone
operating in this environment? What if that is the assumption all along
(presumably) and the crypto is occurring outside the 'official' lines,
beyond the perspective of unshared observer, exploiters...

The question of the question involves a critical detail related to what is
rational, a rational versus irrational approach. Inconceivable, perhaps is
the meaning of the latter though i tend to think that irrational may not
really exist as a concept in terms of thinking, because like a circuit, if
cause is involved, likely there is a direct connect to the path some event
is occurring on, and it is a matter of perspective, if another person can
understand it (rational, reasonable) or not ("irrational" yet still likely
rational in some sense for the other person). This idea of paradox and
crypto may be believed just an issue of some sign-based leetspeak where it
appears the sign remains its original referent in a modified form, in that
the letter S becomes 5 yet still functions as the letter S. A narrow
consideration of this would evaluate it only in terms of the original, thus
the 5=S, and essentially A=A. Though a paradoxical view could extend this
into a question, what if 5 means something via kabbalah or numerology that
substitutes for the letter E because it is the 5th letter of the alphabet,
and thus E=S and onward into oblivion. That moves quickly into symbolism,
mapping of numbers and letters onto other events and each variable could
have multiple definitions or references and together function much like
Chinese characters (ideographs). With alphanumerics (26 letters and 10
numbers) of 16 segment and 7 segment electronic displays, it is basically
its own mastercode-base that makes every aligned text into its shared
universe (U) of a global Kryptos document, any given combination running
into infinity given perspective, conceptual scaffolding, shared libraries.
It is not surface, not a foil or ploy though it could be if a deception to
establish barriers. And so how is the person without the key to know where
to enter and how to interpret, and even if they have the key and the
'official plaintext' how do they know where the encryption begins and
ends-- unless to assume software and hardware crypto defines the 'side',
that there is no edge to land on, it can only be the simplest view...
albeit wrong. And to either constantly be wrong in interpretation or run
into limits, much like binarization in reverse, though paradox in its
place. A wall of chaos, unintelligible communication- even with keys, even
with decodes, one time in one context may vanish like a raindrop into the
ground to be recycled elsewhere, it no longer exists the same, the field
has changed or not, the truth has transformed, time has passed, the coin
still spins eternally until it stops.

What if their stopped time is the wrong view, built upon a warped, skewed,
distorted framework. Trying to relate from that relativism into another
could cause it to be torn apart, any structural connections would bring
down their weakened connections and constructions -- yes go ahead, copy it,
use it, make assumptions and join the conversation... and it will be
entropy in action once the bending takes hold, crushing at the false views,
the lies and deceptions unable to reason or continue the charade,
collapsing upon themselves via unbearable pressures, the difference
continually falling, falsity unable to be sustained, geologic events in the
lives of peoples nervous systems, psychically torn apart, unable to cope,
adapt, continue. Brutal involution, fracturing, implosion, insane weakening
via intolerable stresses, shattered into fragments the schizoid imposters
moving straight toward the extreme each and every variance from their false
modeling. A false universe torn apart piece by piece, bit by bit, the
psychological impact of losing total control due to serving fundamentally
wrong ideas and beliefs. To know and realize that there is only nothingness
to embrace as the remaining option, the void, emptiness, hopelessness,
death, that that is the future of such activity.

What is worse than trying to kill off the human race? -- failing to do so
and having to deal with the consequences.

#half of what i write here is false (right)

---
holographic context, multiperspectival, unexpected, psychic blips,
assumption of freudian slip as conventional tell, mystical code, inversion:
signal is noise; noise is signal, error and anomaly, question of time, x=y
as false POV, pT=T is security exploit

binary decrypt => reveal? [official plaintext] : + [secret1] [secret2] ...
[secretN]

SPECIAL SYMBOLS TEST: [∞] [∞] [∞]  <== infinity ??

ATTACHMENT TEST: capture.9!f
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20130912/d6a1b60a/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Capture.gif
Type: image/gif
Size: 587 bytes
Desc: not available
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20130912/d6a1b60a/attachment.gif>


More information about the cypherpunks mailing list