Bertrand Russell's Barber
Ni dom
- Local time
- Tomorrow 9:42 AM
- Joined
- Jul 23, 2018
- Messages
- 66
Greetings.
I hope you can indulge in the following thought experiment.
I would like to first propose an analogy.
On a computer, different programs run on different processes. A process is associated with its own virtual memory which makes the process "think" it is the only program running on the computer. For communication between different processes, there are inter-process communication protocols provided by the operating system. One can also make calls to different programs by means of shared libraries.
The details are not important, just three things bear taking note of: there exists different processes in isolation, managing resources for these processes and inter-process communication protocols is maintained by the operating system, one can "break-out" of the resources allocated for a program and write to other regions by means of exploiting vulnerabilities in the code.
Now, it seems to me that this would be a nice way to model how reality works.
We are each individual programs in the sense that we each (supposedly) have first-person privilege - I can't access the inner contents of your mind just like you can't access mine. (presumably - this can break down in the case of privilege escalation)
We are able to communicate with other programs like the air around us or rocks or butterflies or humans by means of protocols dictated by something else - we can't interact with air the way we can with people or rocks for example. They also appear to us differently.
By analogy, this means that there is some kind of operating system that is managing all of these resources. Naturally, the laws of physics would take on that role. However then, the questions which arise are the following: where and what is this computer that is running the physics engine (the OS) and all the things which exist within it (the processes) and more importantly, how do we escalate our privileges in this model? I.e., what flaw in our own process can we exploit to be able to do things that are not allowed by our "program"?
The first thought that came to mind are all the psychedelic drugs out there which seem to exploit some entity within our process such that the process interacts with areas of the computer that it's not allowed to access conventionally.
So what is the exploit that these psychedelic drugs take advantage of and how do we create more robust and varied attack vectors?
Thanks. I would greatly appreciate any thoughts on the matter.
I hope you can indulge in the following thought experiment.
I would like to first propose an analogy.
On a computer, different programs run on different processes. A process is associated with its own virtual memory which makes the process "think" it is the only program running on the computer. For communication between different processes, there are inter-process communication protocols provided by the operating system. One can also make calls to different programs by means of shared libraries.
The details are not important, just three things bear taking note of: there exists different processes in isolation, managing resources for these processes and inter-process communication protocols is maintained by the operating system, one can "break-out" of the resources allocated for a program and write to other regions by means of exploiting vulnerabilities in the code.
Now, it seems to me that this would be a nice way to model how reality works.
We are each individual programs in the sense that we each (supposedly) have first-person privilege - I can't access the inner contents of your mind just like you can't access mine. (presumably - this can break down in the case of privilege escalation)
We are able to communicate with other programs like the air around us or rocks or butterflies or humans by means of protocols dictated by something else - we can't interact with air the way we can with people or rocks for example. They also appear to us differently.
By analogy, this means that there is some kind of operating system that is managing all of these resources. Naturally, the laws of physics would take on that role. However then, the questions which arise are the following: where and what is this computer that is running the physics engine (the OS) and all the things which exist within it (the processes) and more importantly, how do we escalate our privileges in this model? I.e., what flaw in our own process can we exploit to be able to do things that are not allowed by our "program"?
The first thought that came to mind are all the psychedelic drugs out there which seem to exploit some entity within our process such that the process interacts with areas of the computer that it's not allowed to access conventionally.
So what is the exploit that these psychedelic drugs take advantage of and how do we create more robust and varied attack vectors?
Thanks. I would greatly appreciate any thoughts on the matter.