SlideShare a Scribd company logo
1 of 10
Download to read offline
Triple Strange Loop
               Double Cross System
                         Information Security based on deception
                               Special Thanks to A. Turing

                                   Michael Calvin Lee
                                  Tuesday July 21 2009
                Filing USPTO patent application and applying for DARPA
                   SBIR research funding = formal statement of intent.

Tuesday, July 21, 2009                                                   1
Single Strange Loop

                         send lots of data
                         most is false
                         some is true
                         only Valid Participants know the
                         difference


Tuesday, July 21, 2009                                      2
Problem: inefficient!


                         most data is noise and a waste of
                         bandwidth
                         high noise/signal ratio to be secure



                                                                3

Tuesday, July 21, 2009                                              3
Triple Strange Loop
                         Most Data is true, a tiny bit is false
                         use p2p relay mesh clusters to send data
                         Multipoint to Multipoint efficiency
                         The valid recipient is only known to
                         participants
                         The context of data only known to
                         recipient.
                                                                    4

Tuesday, July 21, 2009                                                  4
Principles of Operation
                         You can intercept data, but you don’t
                         know who it’s intended for
                         Even if you determine that, you don’t
                         know the context
                         If you get both of those, there is a
                         question of is it true or not.

                                                                 5

Tuesday, July 21, 2009                                               5
Algorithm!
                         Representation of base 10 integer as base
                         phi positional numeral system
                         Reduction to minimal representation in
                         base phi
                         Mathematically offers two unique
                         properties for data security
                         third loop is based on a quormum/
                         consensus prototcol to clarify truth        6

Tuesday, July 21, 2009                                                   6
Security is Prove-able!
                         By unique two properties of base phi
                         representation and reduction to
                         minimalist representation
                         Truth is that the unique properties hold
                         after the random modifier is applied
                         The nodes don’t even know until a
                         message block decode is agreed by
                         consensus
                                                                    7

Tuesday, July 21, 2009                                                  7
Explanation of last bit!
                         The call to clarify is based on
                         autonomous systems and some random
                         variable
                         can be made at any time and changes
                         all three strange loops
                         only after message block is received by
                         all does ‘what to do with data’ step used
                                                                     8

Tuesday, July 21, 2009                                                   8
The Beauty of It
                         Transmission is automated and does
                         not require human intervention
                         Interception and decryption does
                         knowledge of base phi numerals, private
                         key of all peers, and autonomous
                         systems to be certain anything is true
                         should drive most people nuts
                                                                   9

Tuesday, July 21, 2009                                                 9
Conclusion

                         Without being certain of all three double
                         cross loops are actually true...
                         what use is the data?
                         nagging doubts is an intentional
                         design aspect...



Tuesday, July 21, 2009                                               10

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

redone pdf of prior slideshow fix errors

  • 1. Triple Strange Loop Double Cross System Information Security based on deception Special Thanks to A. Turing Michael Calvin Lee Tuesday July 21 2009 Filing USPTO patent application and applying for DARPA SBIR research funding = formal statement of intent. Tuesday, July 21, 2009 1
  • 2. Single Strange Loop send lots of data most is false some is true only Valid Participants know the difference Tuesday, July 21, 2009 2
  • 3. Problem: inefficient! most data is noise and a waste of bandwidth high noise/signal ratio to be secure 3 Tuesday, July 21, 2009 3
  • 4. Triple Strange Loop Most Data is true, a tiny bit is false use p2p relay mesh clusters to send data Multipoint to Multipoint efficiency The valid recipient is only known to participants The context of data only known to recipient. 4 Tuesday, July 21, 2009 4
  • 5. Principles of Operation You can intercept data, but you don’t know who it’s intended for Even if you determine that, you don’t know the context If you get both of those, there is a question of is it true or not. 5 Tuesday, July 21, 2009 5
  • 6. Algorithm! Representation of base 10 integer as base phi positional numeral system Reduction to minimal representation in base phi Mathematically offers two unique properties for data security third loop is based on a quormum/ consensus prototcol to clarify truth 6 Tuesday, July 21, 2009 6
  • 7. Security is Prove-able! By unique two properties of base phi representation and reduction to minimalist representation Truth is that the unique properties hold after the random modifier is applied The nodes don’t even know until a message block decode is agreed by consensus 7 Tuesday, July 21, 2009 7
  • 8. Explanation of last bit! The call to clarify is based on autonomous systems and some random variable can be made at any time and changes all three strange loops only after message block is received by all does ‘what to do with data’ step used 8 Tuesday, July 21, 2009 8
  • 9. The Beauty of It Transmission is automated and does not require human intervention Interception and decryption does knowledge of base phi numerals, private key of all peers, and autonomous systems to be certain anything is true should drive most people nuts 9 Tuesday, July 21, 2009 9
  • 10. Conclusion Without being certain of all three double cross loops are actually true... what use is the data? nagging doubts is an intentional design aspect... Tuesday, July 21, 2009 10