DEV Community

b0bby_seal
b0bby_seal

Posted on

#1 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

Systems void of traceability at micro level; comprehensible at the macro level, point of observation.

Self sustained systems (void of direct externalization) are more difficult to break-in
based on the following: in order to break in you have to
subvert their medium of exchange (communication).

When this system can be self-aware enough to run lock down subroutines; we'd consider it a smart piece of software...

What about the a-typical system that is designed from a static perspective despite having dynamic features?

Any other system that is none-self aware is
far more easier to break into given they are designed on the
principal of centralization, dependent on external validation.

These systems solely rely on the authenticity of external
subjects against their own model of relative authenticity...

What happens when their own authenticity is compromised by the external subject(s) pretending to be an authentic user?

Very quickly you start to see the loop-holes in most central systems; they can be easily exploited, even by the external subject augmenting their intent as authentic against the validator.

Simply put: anything dependent on reception can be easily broken into; no matter how complex you build it.

A system built on the need for reciprocation (validation) is guaranteed to be exploitable.

What if they was a way to validate systems without the need for external/direct exchange?

Solution: The Self-Aware, Intuitive, Dynamic, Self-Updating System

  1. None-verbose, succinct validation from both parties using escrow-like medium for validation.
  2. Validation for resolve is based on signature in relation to incoming traffic by subject(s) via escrow-like medium.
  3. Each subject has unique variable detail make-up:
  4. Authentication is a dynamic algorithm based on signature generated via profile of variable detail makeup using machine learning.
  5. Successful authentication: using signal match (external & internal) references from profile; parsed through a blind escrow-like system.
  6. Self-updating & intuitive system for cyber threat detection...
  7. If mismatch happens at any step of process; access scopes to specific parts of system are immediately disabled; similar to iPhone incorrect password lock down feature

Ideal End Result:

In technical terms this would be essentially combining
machine learning, a creative & imperative design that
aligns with the very same ways we interact on a humane level: intuitively with intent-ful action.

The final result is a self-aware system that behaves dynamically & intuitively as if a human being was operating it in real-time.

Top comments (0)