Brindabella Chronicles

Directory Tree
Show Files
Show Images
Show File Info
Show Summaries
Post a Comment
Add a Note
Show Notes



Branch: .


Brindabella Chronicles Summary The Brindabella Chronicles span three years at the turn of the twenty third century. This is realist future fiction with technologies that are achievable over this current century if we make the effort, and science that is constrained within the bounds of plausibility.

The stories are set in two quite distinct societies. Brindabella is a Janeite community that, with minimal help from modern technologies, has recreated the world of Jane Austen in the Brindabella valley of New South Wales. In contrast, Arkadel – a small floating city in the centre of the Pacific Ocean – is one of the most future oriented societies of the time. It is a swarm hive that's inhabitants devote their lives to preparing their Personal Archives to command spindles – tiny space craft designed to explore the galaxy in large swarms, and sow the seeds of settlement.

Book 1: Brindabella 2200. Arkadelian mathematician and social modeller Mary Wang recruits Tom Oldfield to help solve a scientific quest of her great grandmother Sara, and returns with him to Brindabella. The quest is successful. There are weddings.

Book 2: Brindabella Aftermath. Their findings shock the planet, and shock is quickly turned to fear by groups who's aim is to undermine The Treaty that has maintained peace for the past century. Mary returns to Arkadel in an attempt to quell the fears. She explores worlds of the secretive cybs and learns much from their understanding of swarming. There is another wedding.

Book 3: Brindabella Trust. Mary turns her efforts to reforming The Treaty. Back in Brindabella, she learns about the evolution of religions, gods and ideologies. Now that the world has finally recovered from the collapse of the institutions of the First Enlightenment it is moving into a Second Enlightenment based on trust. There is a death.

./Book 1 - Brindabella 2200
./Book 2 - Brindabella Aftermath
./Book 3 - Brindabella Trust
./Excerpt from Book 2.htm

Personal Archives
A History of the Personal Archive
Mary Wang PA, April 2181

The Personal Archive has its origins in the silicon era. The earliest silicon based machines, called "computers", were built to perform mathematical calculations, so provisions for information security were not included in their designs, which were based on the flexible but inherently insecure Turing Machine architecture. Problems were exacerbated by the highly centralised models for information storage and a general lack of concern for privacy of personal information.

Concern for personal privacy spread as Knowledge Technologies, then categorised as Artificial Intelligence, gained in sophistication, and gained in impact as the as the amount of detailed personal information on individuals multiplied. The Privacy Architecture was developed to replace the Turing architecture, and quickly developed into the PA.

Seven fundamental changes have been introduced to produce the PA as we know it now. These were:

1. Because of the high cost of early silicon memory, computers had transient memory which allowed records to be modified. In a PA the memory is indelible. This was a necessary requirement for records to be trusted.

2. The architecture does not provide any physical means of reading an archive other than through a hardware gatekeeper. Access via the gatekeeper is under the sole control of the owner of the PA. This is a necessary condition for privacy.

3. The gatekeeper records all its actions as part of the archive, which is a necessary requirement for reconstruction, analysis and verification of its actions. This underpins both trust and privacy.

4. Rather than the arcane specialised control languages used in computers, a human language is the operational language of the device down to the hardware level. This gives operational transparency and a direct means for the owner to provide instructions and check that they are being interpreted correctly.

5. There is a core set of standard access rules. These provide trusted answers to basic questions such as ‘Who are you?’ along with diagnostic evidence that the answer was derived from the core rules. The core uses an unambiguously defined subset of the natural language in use.

6. Manufacture is completely transparent. To trust a PA we need to know exactly what's going on inside it, or rely on a wide community of users who have checked the system you start with. This has been the most difficult requirement to satisfy since it relies on trusting others with the construction. We've solved it through multiple projects with a diverse range of people constructing the units.

7. Public use of PAs has required the introduction of technical protocols for maintaining the privacy of others.

A notional representation of PA Architectures