Proplets: Devices for Controlling Property
Civilization has highly evolved practices for determining whether certain actions are allowable or not, or who should prevail in a dispute, namely law. Such a body of knowledge cannot be reinvented from scratch, so instead e-commerce security should draw heavily on it—building property rights, contract and tort law into technology at a very basic level. Proplets define the basic security architecture for local evidence gathering, enforcement, and negotiation of such laws.
Proplets do not rely on central planning, AI, or a single trusted third party for any function. Central planning is not able to account for the distributed and diverse knowledge and preferences of different people. A “trusted third party” is a nice-sounding synonym for a wide-open security hole that a designer chooses to overlook. Proplet design places strong emphasis on eliminating such exposures.
The key is building in, at the most basic level of technology, code (in both the legal and software sense) that allows a widely distributed people, each person having his own unique information, circumstances, and preferences, to cooperate within well known, mutually agreeable, and strongly enforced constraints. With these constraints the risks and benefits of technology are balanced, weapons are monitored and securely restricted in their use to only very narrow, specific, lawful conditions, and for every person there is more profit from peace than from destruction.
The goal of proplet design is to control physical objects with digital protocols. Proplets protect its structure and function from non-owners, and observe the environment for phenomena impinging on a region, on matter, or on its owner. A proplet is an electromechanical device (e.g. a MEMS device) with the following core abilities:
- It knows who owns it
- It knows where it is in space and time
- It can communicate securely with nearby proplets, over a public network, and with its owner
- It contains a computer, called the ownership module, that is a secure extension of the owner’s trusted computing base
- The ownership module securely exercises control over a machine via entanglement (explained below), or over nearby inanimate matter via sensors, effectors, public registration, and law.
- It can securely recognize nearby proplets owned by the same owner
A proplet may optionally also have the following abilities:
- It can cooperate with nearby proplets, especially those owned by the same owner or under contract with the owner. This can include the manufacture of larger structures and machinery.
- Guest computation modules—extensions of the trusted computing base of a non-owner of the proplet for purposes of rapid protocol communications. The guest can store proprietary data and programs on the proplet in his guest modules where they are inaccessible to the owner, except through services designed by the guest. The guest modules also can locally execute smart contracts with the owner.
- Deed modules—these operate the smart contracts, or deeds, created by previous owners to bind future owners.
No computational module can be read or controlled by physical tampering—it will shut down, erase itself, or even self-destruct depending on the severity of tampering. Computational modules are “transparent” to their publically registered controller and opaque to other entities.
Only protocols that are simple and composable with provable security govern the communications between the security kernel (private key operations), control box, sandbox, and other components of a computation modules. Similarly for communications between modules and between proplets.