Startseite   |  Site map   |  A-Z artikel   |  Artikel einreichen   |   Kontakt   |  
  


informatik artikel (Interpretation und charakterisierung)

Dreams & nightmares of the digital age


1. Java
2. Viren

Recently a lot of worrying has been done about the Internet. People who are concerned about anarchy tend to see it as a thrumming hive of villainy, where crazy extremists exchange nerve-gas recipes whereas people who are fearful about government see the Internet as the perfect tool for Big Brother.
If the Internet had gone wrong in just the right way, either of these threats might have resulted. But it hasn\'t. When you want information on the Internet, either you know exactly where it is or you don\'t. If you already know where it is, then the fact that it happens to be on the Internet is irrelevant; you could just as well get it by fax or mail. If you don\'t know where it is, you have to use a piece of commercial software called a search engine. You type in a few key words or phrases, and the engine tries to find World Wide Web documents that contain them. When you try this, the search engines will turn up either irrelevant texts (documents in which the words nerve, gas and recipe happened to appear separately) or references to the general idea of nerve-gas recipes.
The Internet is the only place where worrying about something makes it less likely to happen. Every time someone posts a message to a newsgroup about the danger of nerve-gas recipes on the Internet or a journalist writes an article about the same topic, which is then available on the Internet, a little more noise is added to the system, and any would-be terrorist who tries to search for a nerve-gas recipe finds literally hundreds of thousands of red herrings.
Even if a person was able to download a string of words billed as a nerve-gas recipe, he would face a long time of anxiety if he got the ingredients together and sat down to mix them. Who would be crazy enough to trust an anonymous recipe that, if it goes wrong, will kill him? The very anonymity that makes it possible to post nerve-gas recipes makes the people who have posted them untraceable and unaccountable and hence difficult to trust.
Crypto (cryptographic technology on the Net) is going to change that, however. If we are going to worry about a technology, let\'s worry about crypto.
Crypto is a collection of protocols. \"Protocol\" here means a set of rules governing an exchange of data, agreed to by all participants. The number of core protocols in crypto is fairly small.
One example is the digital signature. Data can be given a digital signature that, like an ink signature on a contract, verifies that they were signed by a particular person. It is stronger than an ink signature because it proves absolutely that the data have not been meddled with. Another protocol is public-key encryption, which, to make a long story short, can encode documents so securely that no government on earth can decode them in a reasonable amount of time. These and a few other basic protocols can be combined to make more complicated ones, such as digital cash--a system for transferring real money (not just credit-card numbers) from one person to another, anonymously and untraceably.
An advanced protocol that has been getting a lot of attention from high-technology developers has to do with reputations. Anyone who has found his E-mail box filled with junk mail or done a Web search that turned up hundreds of thousands of irrelevant documents may have wished that his computer would select only the stuff he finds interesting. This reduces to a problem of assigning an unforgettable reputation--an index of reliability, tailored to the user\'s personal interests and biases--to the source of each piece of information. This in turn is related to digital signatures.
Put it all together, and in a few years we might have something to worry about. Someone searching for a nerve-gas recipe might be able to tell his search engine, \"Show me only the good stuff,\" where \"good\" means that which is highly regarded by fellow terrorists. The recipe would arrive encrypted so securely that no government-watchdog agency could read it. The digital signature would prove that it came from a well-reputed chemist and that its contents had not been tampered with on the way. The terrorist could mix up some amount of the stuff, leave some of it sealed in a container in a public place and then send an untraceable E-mail to the authorities telling them where to find it and demanding that a certain ransom be paid lest more be dumped into a subway vent during rush hour. The payment would then be made, not through an exchange of cash but through an untraceable, digital-cash transfer to an anonymous electronic bank account--with no risk to the terrorist.
There is almost no limit to the ways in which generalized cryptographic technology could be used by bad guys. Wiretapping will be abolished as crypto telephones become widespread. The battle to control electronic transmission of child pornography will soon be lost. It will be much more difficult to track down drug dealers by following their money trail.
All this explains why the U.S. government has long been worried about crypto and has tried to combat its spread with increasingly foolish measures, such as declaring cryptographic software to be a munition. From a careers perspective, a crypto programmer with a non-U.S. passport is a good thing to be.
Nearly all Silicon Valley companies must build some form of crypto into their products to make them competitive. Since U.S. regulations forbid the export of such technology, these companies simply order that portion of the work be done overseas.
Naturally we look to the government (for all its faults) to exercise some control in these situations. But one thing that makes crypto unique is its potential to cripple government. Governments can\'t function without revenue, which they get mostly from taxes. Hence large tax-collecting agencies exist that have exceptional powers. The spread of electronic cash will eventually give everyone the ability to carry out most of their financial transactions behind a cloak of anonymity that no government agency can pierce.
Any effort governments can make to combat this problem will require money, of which they will be collecting less and less. Once the government gets on the wrong side of this feedback loop, there\'s no way out of it, except of instituting some kind of totalitarian system.
Few tears would be shed for the government in Silicon Valley, where libertarianism is popular. But in the long run anarchy on the local or global scale is a more serious threat than Big Brother. And it\'s hard to see what the libertarian approach has to offer on this front. One of the best ways to discourage terrorism is by threatening massive retaliation against sponsor states, but this doesn\'t work without a powerful central government running a big, sophisticated military.
Beyond that the only way to prevent terrorist acts is through surveillance of everyone and everything. This might seem incompatible with the general anti-government trend. But terrorism is deeply disturbing; anything that appears to combat it, is reassuring; and the citizens of a libertarian Utopia may one day eagerly accept such surveillance. Having failed to sneak in through the back door, Big Brother may return via the front and be welcomed.
Crypto may offer at least one solution to this ultimate nightmare. There is a cryptographic protocol called secret sharing, which is a way of dividing a piece of information into several pieces, which are called shadows. The shadows can be distributed among several recipients. A single shadow or several combined are unreadable gibberish. In order to reconstruct the original information, the shadows of all the recipients must be put together.
Now imagine a digital-video camera on every block, directing its output into a tamper-proof chip that divides it into several shadows. One shadow goes to, say, the local police department, one to the local block-watch group, another to the Civil Liberties Union. As long as any one of these groups withholds its shadow, the information cannot be reconstructed; it effectively does not exist.
It\'s as if there were no camera. But if a crime takes place in view of the camera--let\'s say the terrorist puts down his nerve-gas sample in front of it--then the groups can combine their shadows to re-create the original video and catch the terrorist in the act. Implemented on a wide scale, this could make it very difficult for a criminal to get away with a crime. And as long as at least one shadow holder is responsible, the privacy of citizens would not be threatened.
As new technologies continue to appear, we will probably see a lot of initial enthusiasm, followed by a rush of anxiety as we realise how evil people could use them, and then a gradual relaxation as we come to understand how the technologies could also be used to thwart the bad guys\' schemes.
Science is an eternal process of consuming and destroying its own dogmas. This can work only where the free and open expression of ideas is fostered. It is no coincidence that science has flourished in the freest countries and that totalitarian societies eventually lost their scientific edge as new ideas were put through an ideological filter.

 
 

Datenschutz
Top Themen / Analyse
indicator Navision Attain
indicator Datenbankmodelle, ihre Entwicklung und Bedeutung
indicator Iterative inkrementelle Entwicklung; Implementierung
indicator Interneteinsatz
indicator Proxy- (Caching-)
indicator Computervirus ist ein Programm
indicator Kontrollfragen-
indicator Düsen für Tintenstrahldrucker
indicator Wettkampfverfahren - CSMA/CD
indicator Netzprotokolle


Datenschutz
Zum selben thema
icon Netzwerk
icon Software
icon Entwicklung
icon Windows
icon Programm
icon Unix
icon Games
icon Sicherheit
icon Disk
icon Technologie
icon Bildung
icon Mp3
icon Cd
icon Suche
icon Grafik
icon Zahlung
icon Html
icon Internet
icon Hardware
icon Cpu
icon Firewall
icon Speicher
icon Mail
icon Banking
icon Video
icon Hacker
icon Design
icon Sprache
icon Dvd
icon Drucker
icon Elektronisches
icon Geschichte
icon Fehler
icon Website
icon Linux
icon Computer
A-Z informatik artikel:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #

Copyright © 2008 - : ARTIKEL32 | Alle rechte vorbehalten.
Vervielfältigung im Ganzen oder teilweise das Material auf dieser Website gegen das Urheberrecht und wird bestraft, nach dem Gesetz.
dsolution