From: jbriggs444 on
On Apr 7, 1:18 pm, Globemaker <alanfolms...(a)cabanova.com> wrote:
> > What use can be made out of such a computer with a "novel" instruction
> > set?
>
> One application is for a business to buy a thousand computers for its
> thousand employees. Then, all of the employees can run secret software
> that nobody else can use and no virus can infect. This provides
> "ownership" of the computing power, instead of using a shared
> operating system licensed with a 50 page agreement from a monopoly
> that is subject to government parasites. This new computer
> architecture allows private programs to be executed while never
> exposing the intellectual property to thieves and government scum.

You haven't described the interesting parts.

How much is public?
how much is secret?
who keeps what secrets?
Is the user a custodian of his own secrets?
Or does he have to delegate his knowledge to the company of one
thousand employees in order to reap the benefits of shared secrecy?
How many distinct entities can he delegate authority to before the
secret is out and j.random.hacker can feed him virii again?
How much is shrouded in tamper-resistant packaging?
What stops someone from deploying an emulator which, given the CPU
keys to machine A and machine B allows A to run B's programs?
What stops someone from deploying an emulator which, given the CPU
keys to machine A, allows A to run programs written in some
"universal" code.
Given the CPU keys to machine A, what stops someone from disassembling
A's code into universal code?
If universal code becomes popular, what about universal virii?
What stops someone from deploying a registry of CPU codes that makes
software swapping trivial?
What stops someone from discovering the unique key to a machine by
examination of the machine?
What stops one from discovering the unique key to a machine by
examination of its software?
What assurances do you have that the instruction set of machine A is
Turing complete?
Is it just a permuted instruction set?
Or is it random microcode where 99.9% (and maybe 100.0%) of all
instructions do nothing useful?
From: Globemaker on
For details, please read the on-line documentation that is weakly
encrypted using ANTI-GOON-SQUAD ARMOR. It is readable by scholars but
not by goon squads. After you comment on this publication, another
charpter will be revealed:
http://nutron.folmsbee.com/Alan/drums/vphuges.doc