17.8.1. The shifting sands of modern, complex systems - lots of cruft, detail...changing..related to the "software crisis"...the very flexibilty of modern software systems promotes the frequent changing of features and behaviors, thus playing hob with attempts of others to understand the structure...evolution in action - humans who use these systems forget how the commands work, where things are stored, how to unsubscribe from lists, etc. (This is just one reason the various sub-lists of our list have seldom gotten much traffic: people use what they are most used to using, and forget the rest.) - computer agents (scripts, programs) which use these systems often "break" when the underlying system changes. A good example of this are the remailer sites, and scripts to use them. As remailer sites go up and down, as keys change, as other things change, the scripts must change to keep pace. - This very document is another example. Scattered throughout are references to sites, programs, sources, etc. As time goes by, more and more of them will (inevitably) become obsolete. (My hope is that enough of the pointers will point to still-extant things so as to make the pointers remain useful. And I'll try to update/correct the bad pointers.) 17.8.2. "Out of Control" - Kevin Kelly's book - inability to have precise control, and how this is consistent with evolution, emergent properties, limits of formal models - crypto, degrees of freedom + imagine nets of the near future - ten-fold increase in sites, users, domains - ATM switching fabrics..granularity of transactions changes...convergence of computing and communications... + distributed computation ( which, by the way, surely needs crypto security!) - Joule, Digital Silk Road - agents, etc. + can't control the distribution of information + As with the Amateur Action BBS case, access can't be controlled. - "The existance of gateways and proxy servers means that there is no effective way to determine where any information you make accessible will eventually end up. Somebody in, say, Tennessee can easily get at an FTP site in California through a proxy in Switzerland. Even detailed information about what kind of information is considered contraband in every jurisdiction in the world won't help, unless every *gateway* in the world has it and uses it as well." [Stephen R. Savitzky, comp.org.eff.talk, 1994-08-08] 17.8.3. A fertile union of cryptology, game theory, economics, and ecology + crypto has long ignored economics, except peripherally, as an engineering issue (how long encryption takes, etc.) - in particular, areas of reputation, risk, etc. have not been treated as central idea...perhaps proper for mathematical algorithm work - but economics is clearly central to the systems being planned...digital cash, data havens, remailers, etc. + why cash works so well...locality of reference, immediate clearing of transactions, forces computations down to relevant units - reduces complaints, "he made me do it" arguments...that is, increases self-responsibility...caveat emptor + game theory + ripe for treatment of "Alice and Bob" sorts of situations, in which agents with different agendas are interacting and competing - "defecting" as in Prisoner's Dilemma - payoff matrices for various behaviors - evolutionary game theory - evolutionary learning, genetic algorithms/programmming - protocol ecologies
Next Page: 17.9 Crypto Standards
Previous Page: 17.7 New Software Tools and Programming Frameworks
By Tim May, see README
HTML by Jonathan Rochkind