Prev: Collecting true randomness/entropy from decimal part of the values calculated in stock exchange market
Next: Difficulty of Matching an SHA-512 Hash By Brute Force
From: jbriggs444 on 12 Apr 2010 12:41 On Apr 7, 1:18 pm, Globemaker <alanfolms...(a)cabanova.com> wrote: > > What use can be made out of such a computer with a "novel" instruction > > set? > > One application is for a business to buy a thousand computers for its > thousand employees. Then, all of the employees can run secret software > that nobody else can use and no virus can infect. This provides > "ownership" of the computing power, instead of using a shared > operating system licensed with a 50 page agreement from a monopoly > that is subject to government parasites. This new computer > architecture allows private programs to be executed while never > exposing the intellectual property to thieves and government scum. You haven't described the interesting parts. How much is public? how much is secret? who keeps what secrets? Is the user a custodian of his own secrets? Or does he have to delegate his knowledge to the company of one thousand employees in order to reap the benefits of shared secrecy? How many distinct entities can he delegate authority to before the secret is out and j.random.hacker can feed him virii again? How much is shrouded in tamper-resistant packaging? What stops someone from deploying an emulator which, given the CPU keys to machine A and machine B allows A to run B's programs? What stops someone from deploying an emulator which, given the CPU keys to machine A, allows A to run programs written in some "universal" code. Given the CPU keys to machine A, what stops someone from disassembling A's code into universal code? If universal code becomes popular, what about universal virii? What stops someone from deploying a registry of CPU codes that makes software swapping trivial? What stops someone from discovering the unique key to a machine by examination of the machine? What stops one from discovering the unique key to a machine by examination of its software? What assurances do you have that the instruction set of machine A is Turing complete? Is it just a permuted instruction set? Or is it random microcode where 99.9% (and maybe 100.0%) of all instructions do nothing useful?
From: Globemaker on 12 Apr 2010 13:13
For details, please read the on-line documentation that is weakly encrypted using ANTI-GOON-SQUAD ARMOR. It is readable by scholars but not by goon squads. After you comment on this publication, another charpter will be revealed: http://nutron.folmsbee.com/Alan/drums/vphuges.doc |