Restoring Integrity to Information Systems Let's return to the themes of this Daily Prophecy — wealth is knowledge, growth is learning, money is time — and add a further canonical principle: knowledge cannot be reversed or abolished. If it is denied to the forces of good, it will be relinquished to the forces of evil. Encryption is merely applied mathematics. The two most established forms in the US — AES and SHA256 — both originated overseas. It is not ours and cannot be controlled by us. My readers will recall the test of a failed paradigm: the more we spend the worse the results. Today we spend billions annually on post-hack security patches and point solutions. The paradigm is called "Defense in Depth" where data-defenses are layers of specific cybersecurity measures designed to respond to specific vectors of attack: intrusion detection systems, virus scans, malware scouts, firewalls, security patches, all reacting to attacks and assuming them. Though supported by the NSA and most of the other experts, the flaws of "Defense in Depth" are both fatal and mathematically inexorable. The potential for attacks grows according to Metcalfe's Law: essentially by the square of the number of devices attached to the network (the extent of the attack surface multiplied by all the potential attack vectors or sources). But the "Defense in Depth" applied in response grows only additively, one patch at a time. There is no way on earth the good guys can keep up. The only solution is to encrypt everything before it goes on the net. The only remedy for uncontrollable data is to render it controllable data, integrated with software in a way that removes all the so-called attack surfaces at once. As David Kruger, co-inventor of the most fully developed Cryptocosmic system writes in his new manifesto, Inherently Safer Computing: "Will Inherently Safer Computing dry up our signals intelligence and offensive cyber capability? is the wrong question to ask. The right question is will Inherently Safer Computing dry up everyone's signals intelligence and offensive cyber capability." That means stopping anyone from hacking our data and software and money and internet routers. As a side effect, this will mean we can't hack Iran or China. But if they cannot hack us, or their people, why do we care? The question is: can our computer architectures be rendered un-hackable? The answer is yes, that is what crypto and blockchain does. In the process of restoring integrity to information systems, we can provide a firm foundation for an information age and internet architecture for civilized societies with real property rights and appropriate privacy. We can overcome the current catastrophe of an Internet that no one trusts, where we cower in fear of slant-eyed routers from Huawei. We can reform a trading system fraught with ignorance and paranoia, where we feel threatened by investors or even students from abroad. We can fix a monetary system so compulsively hacked and manipulated by governments that it can no longer provide meaningful or rational prices for itself: stable currencies or real interest rates. The Cryptocosm outrages police around the world by allegedly enabling "warrant proof" encryption, beyond the realm of the law. But this is a misconception. Warrants can be served and enforced the same as always. Whether the data was encrypted before or after it went on the net is irrelevant to the issue of whether it must be divulged under a legitimate court order. But software-controllable data does create problems for surveillance states and surveillance companies everywhere. That is the source of the resistance to it. Established powers have become used to uncontrolled data that can be copied and distributed without limitations, with every copy usable by every single user in the world who can access the software for whatever nefarious or predatory purpose. This condition offers an irresistible temptation to tyrants everywhere. But it is not natural or inevitable. It can be changed through a new security architecture that renders data controllable by software bound to it. Today's Prophecy My readers know Peter Drucker's rule: "Don't solve problems. Pursue opportunities." At the same time that it sows problems for the existing power establishment, the Cryptocosm creates the world's largest opportunity today, Life After Google. It simultaneously puts the Internet on a new secure foundation and renews world money as a useful guide for enterprise. What we currently imagine to be political, economic, and even military threats, in fact, reflect a broken technology paradigm. Information does not want to be free. It wants to be property. It wants to be defensible. It wants to be useful. One of the possible uses is to publish it freely across the net. But the idea that this is the established form of information and all controls must be bolted on afterward has caused the current crisis of our increasingly vulnerable computer systems underlying our increasingly afflicted civilization. On to the Cryptocosm! It is the only path to an internet of things or an internet of free people, rather than merely free bits and bytes. Regards, George Gilder Editor, Gilder's Daily Prophecy P.S. A Few Important Updates Great news! Our website is officially live. You can view all of your content at www.GilderPress.com. If you have any questions, please don't hesitate to contact our Customer Service team here. Also, if you've signed up for my research newsletter The George Gilder Report, I'm pleased to announce that the inaugural issue is available to download. Head over to the website to access this information. One other thing: If you're a member of Gilder's Moonshots — my research service that isolates smaller stocks that promise faster gains — we are sending weekly updates about our positions. |
Tidak ada komentar:
Posting Komentar