rising_moon (
rising_moon) wrote2008-12-04 05:33 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Entry tags:
Systems of Magic, and a request
Recently I've read a few excellent fantasy novels which were written around believable, consistent, and reasonable systems of magic. Believable magic is one of the elements that will sell me on a writer. I've enjoyed The Abhorsen Trilogy, by Garth Nix, and, most recently, The Name of the Wind, by Patrick Rothfuss.
I've learned that Brandon Sanderson, who wrote this essay on systems of magic, is going to finish Robert Jordan's 12th and final novel of the Wheel of Time series. Depending on my Lady's response to his work, I might take up the first one. :)
Unrelatedly (maybe): can any of you recommend a good history (articles, blogs, anything) of technical approaches to affixing Identity? That is, assuring that individuals are who they say they are? I'm making a study of transaction psychology -- financial services inclined but not fixed -- and would love some background data on approaches to identity assurance. Thanks!
I've learned that Brandon Sanderson, who wrote this essay on systems of magic, is going to finish Robert Jordan's 12th and final novel of the Wheel of Time series. Depending on my Lady's response to his work, I might take up the first one. :)
Unrelatedly (maybe): can any of you recommend a good history (articles, blogs, anything) of technical approaches to affixing Identity? That is, assuring that individuals are who they say they are? I'm making a study of transaction psychology -- financial services inclined but not fixed -- and would love some background data on approaches to identity assurance. Thanks!
no subject
no subject
And this is one of the reasons I love your commentary! :D
Your review of Last Call described the chief fallout from the Rules hangup: half a book's worth of Law, then half a book's worth of the writer shoehorning the plot into the Law.
Then there's China Mieville, whom you know I adore, who simply makes shit up as he goes along, and you realize that his rules are beside the point.
Susanna Clark, eh? Where should I start?
no subject
(no subject)
no subject
(no subject)
no subject
i find myself thinking about it in terms of mystery novels: you can totally end your mystery with "oh, it turned out the butler had an evil twin, ha ha" but some readers will feel cheated. similarly, coming up with a new magic rule that solves everything strikes me the same way.
no subject
The only people I ever hear talk about Hard vs Soft SF are people who love the former, and usually show a bit of contempt for the latter. Sanderson goes out of his way to assert that he believes both the approaches he describes to be equally valid, but, to be blunt, I don't believe him.
I do think his proposed rule is worth musing on, I think it is nowhere near as hard-and-fast as he asserts. Exhibit A here would once again be Jonathan Strange, which is way to the Soft end if I understand the essay at all, and does not fall neatly into the problems-sloved-with-magic/problems-solved-not-with-magic dichotomy.
More generally, yeah, if you're setting up a puzzle game like a mystery novel, explicit rules are necessary. Not all fantasy novels are, or should be, puzzle games.
My New Theory
the how-not-to-do-it examples in your and Sanderson's descriptions have two salient qualities: arbitrariness and effortlessness. The former, I think, is a matter of tone more than anything else. Magic needs to feel consistent, it does not need to necessarily be consistent.
The deus-ex-machina climaxes that Sanderson warns against are really more about that effortlessness. An example: in WoT, which, as I said, is generally too Hard for my tastes, there's a wicked important climactic bit where the main protaganist attempts a massive alteration of the very nature of magic itself. It is a very Soft moment--there had been no prior indication that human effort could produce any such effect.
However, Jordan emphasizes what a huge amount of work, skill, suffering, and risk it requires, and that's what makes it not feel like a cheat.
Conclusion: magic has to cost somehow. I suspect that this is why so much of the magic in Harry Potter felt flat to me--Rowling made so much of it costless & effortless.
no subject
I believe this (http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog) is the definitive starting point for any such an endeavor. Maybe to the point of cliché by now, but hey, it does have a couple of references that might be useful.
no subject
Wau! Wau!
no subject
Generally speaking, people tend to confuse or conflate Identity and Authentication, but that is not necessary. Consider LJ - you might grant some people certain rights to read your blog because of what they write, say or do - but never know their real name and identity. You Authorize them via a Friends list.
Meanwhile, when they log in, they Authenticate their credential to LJ (or, since LJ accepts other ID servers and their authentication, maybe to someone else).
I cannot recall where I first read about these issues, I can do a little digging. For interesting browsing, you might look at some of the articles in Wired (and other places) by Bruce Schneier, CTO of Countepane. You might also ask
no subject
Yeh, I'm a big Schneier fan. :)
Thank you for the pointer to patsmor! I'll go poke at her info page and introduce myself.
no subject
The secrets are broken down into "what I have, what I am, what I know". An example of each is: a token that generates large numbers over a period of time -or- a fingerprint -or- a password". Highly secure systems use two or even three of those, and often use rotating systems of information, or variable challenges.
When passing the secrets back and forth, every single step of the way must be secure, or in the end the security is worthless. That means not just careful transmission, but careful handling. For example, some old software used to accept a password, and store it clearly, in memory. Users that wanted to break into the system could search used memory, or unauthorized memory or disks for patterns that contained those passwords.
Some of the more sophisticated systems use leased access concepts - where access is temporary, and must be periodically renewed automatically. (Kerberos was one such system, developed at MIT. The Jini software project used leases for everything, including access, and was developed at SUN Microsystems.)
One can proxy authentication to another system - meaning that the two systems can authenticate each other in a complex way, and then the proxying system will trust the other to do the work.
There are two major threats to authentication, although there are countless more. One is compromise of a secret, and the other is to play a "man in the middle" and somehow capture all traffic. Means of losing secrets are legion.
I hope this lecture is helpful. If not, please chalk it up to good intentions. :-)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
no subject
no subject
no subject
no subject
no subject
The thing is, he knows all this full well, and uses that image to his advantage in lots of situations. So, besides practical dealing with magic, you also get a dose of clever court politicking.
no subject
ZOMG I can chuck this moldering monkey corpse off my back!!
no subject
no subject
other than the books he wrote himself, of course...
(Grr. Crack monkey, get thee behind me! ;)
no subject
no subject
There are certain types of puzzles that are easy to create but hard to solve if you don't know how they were created. Factoring large prime numbers is an example. We have math that lets us quickly test if numbers are prime, but it's really hard to factor composite numbers into the primes that make them up. This means we can quickly find two large (hundreds of digits) prime numbers and multiply them together to get a really big composite number that pretty much only the person who knows the original two primes can factor.
Here's the cool part. You can put up the really big composite number on the web so that anyone can see it. It is so hard to factor that no one will be able to. Now, when anyone needs to authenticate you, all you have to do is prove that you can factor it. You now have a public test that only you can pass and that anyone can use to verify your identity.
The tricky part is making such a test reusable (proving that you know *how* to factor the number without revealing what those factors actually *are*), but that's a whole different topic.
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
no subject
no subject
Refer to the Media Lab "Amulet" project, i.e. the Wireless Universal Key.
While the professor rummaged in his pockets I hopefully imagined a tidy little lozenge like the old SecureIDs. Seeing the actual artifact, it occurred to me that cultural resistance to inelegant visual/physical design might trump other constraints to a system's adoption. (The Amulet is kinda big. I don't want to wear one around my neck -- which is where my magical mind expects to put an amulet.)
no subject
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)
(no subject)