Topic Actions

Topic Search

Who is online

Users browsing this forum: tlb and 40 guests

Hacking 2000 years from now...

Join us in talking discussing all things Honor, including (but not limited to) tactics, favorite characters, and book discussions.
Re: Hacking 2000 years from now...
Post by JohnRoth   » Mon Sep 26, 2016 9:40 pm

JohnRoth
Admiral

Posts: 2438
Joined: Sat Jun 25, 2011 6:54 am
Location: Centreville, VA, USA

cthia wrote:
...

The problem is to write programs that the programming can prove correct. Impossible to do in such a complex system being attempted. That's why the strategy is to attack it in pieces -- to prove parts of the system foolproof. Akin to the area under the curve solution and mapping.


There are lots of problems that were "too complex or too big to solve" that have yielded to time and various work. "Too big to solve" is simply an admission of insufficient knowledge of history and a sense of humility in the face of what's known, and more importantly, unknown.

JohnRoth wrote:The objective isn't to try to prove the correctness of software which was constructed by Klingon Software Development and which looks like the illegitimate offspring of Cthulhu and the Flying Spaghetti Monster. It's to create software that works and is bulletproof. That may require throwing what we've got out and starting over.



cthia wrote:I agree, as does most others in the field. (There was a heated debate on that at the symposium.) Yet, start over with what, so that the inherent problems of the beast won't still be there?


Well, starting over with a language that has provably correct strong typing might be a start: the C language is at the root of a lot of hacks. It's just too hard to do all the manual checking that its complete lack of type safety mandates.


JohnRoth wrote:By the way: I regard LISP as one of the major reasons why the original approaches to artificial intelligence failed. (It's not the only one, or even the biggest.) Revisiting some of that with the advantage of another 45 years of development in linguistics is somewhere on my bucket list. It will not be in LISP.


cthia wrote:Suit yourself.

Huh? LISP is not why the original approaches to AI failed. LISP and the lambda was what originally made it possible. The lack of hardware that could run such a powerful language on at the time and to digest such am ambitious project was the failure. This was 1958! LISP MACHINES was a start. But, the hardware and tech at the time was horribly lagging behind a language that hasn't changed since its conception, because it is so fundamentally and intrinsically sound that it doesn't have too. You don't change lambda. Lambda changes you.

Hardware and tech is ready for LISP now, and the power of LISP is still there. Unfortunately, so is the immobilizing fear of parenthesis.


Natural language understanding is the hard problem of Artificial Intelligence. Lisp does nothing to address this, other than its proponents claiming it can do anything, like the fabled sonic screwdriver.

Lisp is too powerful. Seriously. Lisp was created to take advantage of the IBM 709 and 7090 hardware, which had two address and a few additional bits in each word. Lists were its only data structure because that was all it could do.

There were a number of reasons the original AI enterprise failed; Lisp was not among them. One was, as you note, the fact that machines weren't powerful enough. Another was Noam Chomsky.

I know that last statement is going to be rather contentious. Now that Noam has walled himself off in a self-referential echo chamber, where he and his acolytes simply don't recognize that anyone else has any valid opinions on language they need to recognize, let alone discuss, it's possible to begin to assess the damage he's done to the field of linguistics.

That's a strong statement, but it's not stronger than what a lot of properly-qualified linguists are thinking, and quite a few are saying. During Chomsky's reign as the High Priest of linguistics he focused on syntax to the essential exclusion of the rest of the field: semantics (the study of meaning), pragmatics (the reason why "yes" is not a proper answer to "Could you pass me the salt"), socio-linguistics, (the study of language as it's used in real linguistic communities) and phonology (the study of sound systems). There are other subtopics as well.

Chomsky's early work included the idea that language was too complex to have evolved; it originated in a single burst of something or other, complete with a "language acquisition device," because it was too complex for children to learn otherwise. "The poverty of the stimulus" is the standard phrase. Chomsky was a creationist! Who knew?

Needless to say, that first formulation failed. He's now on his fourth complete revision and it's showing all the same signs of failure as the other three. Just for starters, he's never given up on the idea of recursion being fundamental, while all the evidence is that human beings simply don't do the kind of recursion he favors.

Meanwhile, he sucked all the oxygen out of the field for other researchers and other approaches.

Making progress on natural language understanding requires studying meaning, that is, semantics, not syntax. I've run across two things in that area that seem promising. One is Frame Semantics, due to Charles Fillmore. See Framenet for one approach. That's pretty standard. The other is Natural Semantic Metalanguage, which seems to have actually solved one of the long-standing hard problems in linguistics by finding an actual semantic core that underlies all human languages.

That's what I'll be tackling at some point, God willing and the creek don't rise.

cthia wrote:You will not be able to hide from Lisps data structures of "lists." Even in the description of the goals, lists are used. Unavoidable. Unless there's a miracle language waiting in the wings.


I don't need to hide. Lisp is headed for the Dumpster of History now that MIT has finally bowed to the inevitable and quit requiring that all its undergraduates learn it. The field has moved on.

cthia wrote:Say what you may. Godel and the halting problem is like an awaiting croc with its mouth open -- if a truly secure, and not somewhat secure system is the goal. You can bank on it, or leave your currency under a mattress.


Come back in a hundred years, and we'll discuss it then. That's the appropriate time frame for statements like that.
Top
Re: Hacking 2000 years from now...
Post by Annachie   » Tue Sep 27, 2016 4:36 am

Annachie
Fleet Admiral

Posts: 3099
Joined: Fri Jun 17, 2011 7:36 pm

Social hacking is a different kettle of fish.
And is what Sir Horace used to gain access.


Sent from my SM-G920I using Tapatalk
~~~~~~~~~~~~~~~~~~
You are so going to die. :p ~~~~ runsforcelery
~~~~~~~~~~~~~~~~~~~
still not dead. :)
Top
Re: Hacking 2000 years from now...
Post by The E   » Tue Sep 27, 2016 5:02 am

The E
Admiral

Posts: 2704
Joined: Tue May 07, 2013 1:28 pm
Location: Meerbusch, Germany

Annachie wrote:Social hacking is a different kettle of fish.
And is what Sir Horace used to gain access.


That's what got him in the door, but he had to do a bunch of priviledge escalation attacks afterwards in order to get access to the various subsystems he is commandeering later.
Top
Re: Hacking 2000 years from now...
Post by Annachie   » Tue Sep 27, 2016 5:59 am

Annachie
Fleet Admiral

Posts: 3099
Joined: Fri Jun 17, 2011 7:36 pm

Yes. Easier once you're inside the system than trying from ourside.

Sent from my SM-G920I using Tapatalk
~~~~~~~~~~~~~~~~~~
You are so going to die. :p ~~~~ runsforcelery
~~~~~~~~~~~~~~~~~~~
still not dead. :)
Top
Re: Hacking 2000 years from now...
Post by cthia   » Tue Sep 27, 2016 7:31 am

cthia
Fleet Admiral

Posts: 14951
Joined: Thu Jan 23, 2014 1:10 pm

The E wrote:
Annachie wrote:Social hacking is a different kettle of fish.
And is what Sir Horace used to gain access.


That's what got him in the door, but he had to do a bunch of priviledge escalation attacks afterwards in order to get access to the various subsystems he is commandeering later.

Social hacking — which almost always is a quicker way and Sir Horace was up against the impending opponent of time. By the way, social hacking is a proponent of the "human element" — the most prolific element on Earth. It is what causes people to use less than weak passwords of birthdays, personal names, etc., as a first huge mistake, then to write them down as a compounding mistake.

The "human element" — Murphy's only true associate and partner in crime.

Son, your mother says I have to hang you. Personally I don't think this is a capital offense. But if I don't hang you, she's gonna hang me and frankly, I'm not the one in trouble. —cthia's father. Incident in ? Axiom of Common Sense
Top
Re: Hacking 2000 years from now...
Post by Lord Skimper   » Tue Sep 27, 2016 10:27 am

Lord Skimper
Vice Admiral

Posts: 1736
Joined: Wed Aug 07, 2013 12:49 am
Location: Calgary, Nova, Gryphon.

Unhackable is easy, don't use binary systems. Don't use Digital systems. Don't use software. Don't use signal's use Quantum Entangled Teleportation. Unhackable, here and now technology. Implementation 5-10 years.

Gives everyone FTL comms.
Gives everyone instant Planet to Planet Comms.
Not in Weber books because we didn't know about this in the 1990's, most of us. ;)
Every sensor on every missile is direct linked to every firing ship which is direct linked to every other ship, with direct linking to every home fleet base.

QE Quantum Entanglement, is clocked somewhere between 10,000 x Light speed to Instant speed. And the lower end is looking more and more like a testing equipment limit.

Even so, 10,000 x light speed gives one in system, near instant comms, unjammable weapon systems. (One could still spoof the targeting sensors) At 50 light minutes with 10,000 x C you are 0.333 seconds for signal speed. Even at 100 lyrs you would be 3.65 Terran days off. If that limit exists, but certainly faster than any streak drive.
________________________________________
Just don't ask what is in the protein bars.
Top
Re: Hacking 2000 years from now...
Post by Joat42   » Tue Sep 27, 2016 10:47 am

Joat42
Admiral

Posts: 2162
Joined: Tue Apr 16, 2013 7:01 am
Location: Sweden

Lord Skimper wrote:Unhackable is easy, don't use binary systems. Don't use Digital systems. Don't use software. Don't use signal's use Quantum Entangled Teleportation. Unhackable, here and now technology. Implementation 5-10 years.

Gives everyone FTL comms.
Gives everyone instant Planet to Planet Comms.
Not in Weber books because we didn't know about this in the 1990's, most of us. ;)
Every sensor on every missile is direct linked to every firing ship which is direct linked to every other ship, with direct linking to every home fleet base.

QE Quantum Entanglement, is clocked somewhere between 10,000 x Light speed to Instant speed. And the lower end is looking more and more like a testing equipment limit.

Even so, 10,000 x light speed gives one in system, near instant comms, unjammable weapon systems. (One could still spoof the targeting sensors) At 50 light minutes with 10,000 x C you are 0.333 seconds for signal speed. Even at 100 lyrs you would be 3.65 Terran days off. If that limit exists, but certainly faster than any streak drive.

As the theory stands today it's not possible to transmit information at faster than light speeds, see The Road to Reality: A Complete Guide to the Laws of the Universe by Roger Penrose.

Additional information about this according to Wikipedia:
Certain phenomena in quantum mechanics, such as quantum entanglement, might give the superficial impression of allowing communication of information faster than light. According to the no-communication theorem these phenomena do not allow true communication; they only let two observers in different locations see the same system simultaneously, without any way of controlling what either sees. Wavefunction collapse can be viewed as an epiphenomenon of quantum decoherence, which in turn is nothing more than an effect of the underlying local time evolution of the wavefunction of a system and all of its environment. Since the underlying behaviour doesn't violate local causality or allow FTL it follows that neither does the additional effect of wavefunction collapse, whether real or apparent.

The uncertainty principle implies that individual photons may travel for short distances at speeds somewhat faster (or slower) than c, even in a vacuum; this possibility must be taken into account when enumerating Feynman diagrams for a particle interaction. However, it was shown in 2011 that a single photon may not travel faster than c. In quantum mechanics, virtual particles may travel faster than light, and this phenomenon is related to the fact that static field effects (which are mediated by virtual particles in quantum terms) may travel faster than light (see section on static fields above). However, macroscopically these fluctuations average out, so that photons do travel in straight lines over long (i.e., non-quantum) distances, and they do travel at the speed of light on average. Therefore, this does not imply the possibility of superluminal information transmission.

There have been various reports in the popular press of experiments on faster-than-light transmission in optics — most often in the context of a kind of quantum tunnelling phenomenon. Usually, such reports deal with a phase velocity or group velocity faster than the vacuum velocity of light. However, as stated above, a superluminal phase velocity cannot be used for faster-than-light transmission of information. There has sometimes been confusion concerning the latter point. Additionally, a channel that permits such propagation cannot be laid out faster than the speed of light.

---
Jack of all trades and destructive tinkerer.


Anyone who have simple solutions for complex problems is a fool.
Top
Re: Hacking 2000 years from now...
Post by jdtinIA   » Tue Sep 27, 2016 4:34 pm

jdtinIA
Lieutenant (Junior Grade)

Posts: 49
Joined: Sun Mar 13, 2016 10:21 pm

noblehunter wrote:
why do people write down their passwords on sticky notes where someone else can find them?
Just once, I want to see protagonists bust into someone's computer by finding sticky notes in a drawer instead of guessing the password because of the pictures on the desk.


NCIS, Mcgee and Dinozo find Gibb's password on a piece of masking tape on the bottom of his keyboard.
Top
Re: Hacking 2000 years from now...
Post by The E   » Tue Sep 27, 2016 4:48 pm

The E
Admiral

Posts: 2704
Joined: Tue May 07, 2013 1:28 pm
Location: Meerbusch, Germany

Lord Skimper wrote:Unhackable is easy, don't use binary systems. Don't use Digital systems. Don't use software. Don't use signal's use Quantum Entangled Teleportation. Unhackable, here and now technology. Implementation 5-10 years.

Gives everyone FTL comms.
Gives everyone instant Planet to Planet Comms.
Not in Weber books because we didn't know about this in the 1990's, most of us. ;)
Every sensor on every missile is direct linked to every firing ship which is direct linked to every other ship, with direct linking to every home fleet base.

QE Quantum Entanglement, is clocked somewhere between 10,000 x Light speed to Instant speed. And the lower end is looking more and more like a testing equipment limit.

Even so, 10,000 x light speed gives one in system, near instant comms, unjammable weapon systems. (One could still spoof the targeting sensors) At 50 light minutes with 10,000 x C you are 0.333 seconds for signal speed. Even at 100 lyrs you would be 3.65 Terran days off. If that limit exists, but certainly faster than any streak drive.


I know you hate reading real science, but you really need to read up on the relevant literature, not stupid SF written by people with no understanding of what quantum entanglement can (and more importantly, can not) do.
Top
Re: Hacking 2000 years from now...
Post by ZVar   » Thu Sep 29, 2016 10:39 pm

ZVar
Lieutenant Commander

Posts: 115
Joined: Fri Jul 04, 2014 1:45 pm

cthia wrote:Social hacking — which almost always is a quicker way and Sir Horace was up against the impending opponent of time. By the way, social hacking is a proponent of the "human element" — the most prolific element on Earth. It is what causes people to use less than weak passwords of birthdays, personal names, etc., as a first huge mistake, then to write them down as a compounding mistake.

The "human element" — Murphy's only true associate and partner in crime.


A good, if a bit dated now, movie to watch showcasing social hacking is the 1992 film Sneakers
Top

Return to Honorverse