There’s something funny to me about seeing the name “Davi”. It’s unique enough that I rarely have the luxury of finding my name directed at some other person.
So, imagine my surprise when I was doing some research on poetry and came across a recent childrens’ book called A Boy No More, by Harry Mazer. The protagonist has a Japanese American friend who is named “Davi Mori”. I find it very odd to see the reviewers saying “Davi” this and that.
What does this have to do with security? I suspect many people who have common names use a number of other criteria to determine who is actually the subject of a phrase. Voice recognition, or even intonations, must be a big part as well as context. In a reverse sense, when someone calls me on the phone and can not pronounce my name correctly, I can immediately identify them as a stranger.
Oh, and speaking of strangers, I only just discovered that Davi Walders is a famous poet. It’s not clear how she pronounces her name, though, or if it is an abbreviation/nickname.
First we hear that Einstein and Darwin used rapid and succinct messaging as a foundation of their correspondence, and now Amazon has announced that you can buy chapters of books. Given Apple’s success in selling songs rather than albums…altogether it seems to me that Attention Defecit Disorder should be regarded as something of a normality for human consumption and communication rather than the exception. After all, why force yourself through 200 or more pages of nonsense when an important thought only needs twenty-five pages (or a brief blog entry)? Or, as some album-bands of the 80s pointed out, there is nothing particularly necessary about trying to tie a single brillant riff or expression into two or three hours of messy pyrotechnics and big hair costumes. In food terms, a lot of noise is being made about the “supersize” phenomenon, which shows that people are susceptible to wanting quantities of superficial chemically-enhanced filler instead of a simple and effective bite of nutrition. Or…dare I say it…poetry as a more succinct form of communication?
And the implication for security is that it could be easier to defend smaller packages with fewer attack vectors, but it may also be more difficult if it becomes necessary to extend beyond each instance and defend a dynamic relationship/network of connected material. In other words, it’s easy to secure a single workstation compared with securing a workstation’s network (perimeter-shift).
Among the flowers from a pot of wine
I drink alone beneath the bright moonshine.
I raise my cup to invite the moon, who blends
Her light with my shadow and we’re three friends.
The moon does not know how to drink her share;
In vain my shadow follows me here and there.
Together with them for the time I stay
And make merry before spring’s spend away.
I sing the moon to linger with my song;
My shadow disperses as I dance along.
Sober, we three remain cheerful and gay;
Drunken, we part and each goes his way.
Our friendship will outshine all earthly love;
Next time we’ll meet beyond the stars above.
a blog about the poetry of information security, since 1995