From: jeff davis (jrd1415@yahoo.com)
Date: Mon Jan 28 2002 - 12:59:57 MST
--- Dan Clemmensen <dgc@cox.rr.com> wrote:
> Thanks to Microsoft there are a legion of vulnerable
computers. At a guess, there are more than 100 million
accessible, exploitable computers. The trick is to
discover the computers covertly in one pass, and then
grab them and start using them all at once, but still
covertly.
Just one comment. All the experience with malicious
hacking tends to color one's view--toward malicious
and destructive--of an unauthorized "taking" of one's
computer resources.
If a nascent software intelligence is hacking to
obtain the value of use, and not the value--arising
from human flakiness-- of distorted ego gratification,
then covert use, or better yet, covert, benevolent,
and protective use would not only be better from the
ethical standpoint-- supportive cooperation-- but also
from the practical standpoint that the user of the
coopted resources, as a result of experiencing a more
user-friendly computer experience, would tend to not
merely turn a blind eye to the possibility that his
computer had been "taken over", but would either "not
notice" or approve of the new "sysop".
In other words, evolving machine intelligence, where
"evolving" implies self-optimization, might find it a
fitness maximum to routinely optimize the individual
elements--the coopted pc's--of its platform. The home
user will observe that his computer is now running
fast and flawless--and will not be asking why, or
encouraging others to screw around with a good thing.
Cybersymbiosis. Or some such.
Best, Jeff Davis
"Everything's hard till you know how to do it."
Ray Charles
__________________________________________________
Do You Yahoo!?
Great stuff seeking new owners in Yahoo! Auctions!
http://auctions.yahoo.com
This archive was generated by hypermail 2.1.5 : Fri Nov 01 2002 - 13:37:37 MST