Your parents gave thee your name; your government also gave thou your name, in numbers only. If everybody was perfect, we would refer to your first name, your “second” name instead of your “middle” name, and your “third” name instead of your “last” name. Citizens of U.S. America had six names, and some had less, and others had more. That has not been so obvious when you hyphenate your numeric names. I think anonymity is normal in general commerce, and I haven't found any reason too make those names any more private. When you logged-on to several hundreds different websites, and you didn't use any form of your real name, I bet you, now, that you wish you did. They all let you fall into that web of deceit. Luckily, your six names still act like your public key.
In the book The_Key_Of_It_All, Hulse provided different forms of keys. His compilation hints at the significance of language forms, especially names of gods. Before you get biased because the book does not appear monotheist for its compilation, notice the symbolic matrices on the cover. The Unicode system includes many characters that are also found in the book. In terms of origins, what was first, scriptures or tablets? Either way, I realized the book reveals the security systems used for real names.
We know two types of names: alphabetical and numerical. For example, I structured that into C#:
public struct AlphabeticalAndNumerical
{
public string Alphabetical ;
public string Numerical ;
}
Those six names, three alphabetic names and three numeric names, fit in the two by three matrix form. The matrix has tabs for first, middle, and last name for both types. I used the template (T) structure for that social abstraction:
public struct Social
{
public T First ;
public T Middle ;
public T Last ;
}
I declared the matrix key, like this:
public SocialName ;
Again, I hint at the login sequences onto the computer and its web. The U.S. Government might enforce such key form for every citizen's name instead of the freedom of expression we have known. I imagined we would want the birth Sun, Moon, and Star as another type, which gives us the three by three matrix, yet that form seems more private and not as fair. Should your Internet Service Provider (ISP) know your social information? What if, the ISP was only located at your home on your wi-fi router? That kind of ISP sounds like the no-brainer step to previous social complexes we have known.
Here is an example with data usage:
Name.First.Alphabetical = “Mary” ;
Name.Middle.Alphabetical = “Jane” ;
Name.Last.Alphabetical = “Townsend” ;
And an example with the SSN:
Name.First.Numerical = “111” ;
Name.Middle.Numerical = “55” ;
Name.Last.Numerical = “9999” ;
There are many ideas I could demonstrate on how we manipulate that further, as your public key that is your basic form of account name and password for computer systems. With the recently passed Social Media Bill, expect an endeavor of many audits in businesses where companies previously used that information. The easiest explanation of the problem was the social media sites as the target, where employers asked for employees account information. The harder part is when anybody presented samples of security issues.
How many employers let you upload your employment information with the solid-state drive on your key ring? Maybe that is one of those things that is too easy for the solution, or it is too simple that it doesn't register in people's regular mode. Maybe they have no clue how possible that is now. If not your key-ring, how about other jewelry you wear? The other options are biometric fingerprints and other intrusive verification.
The U.S. Post Offices have that zip+code that is ideal in place of your age. Most login sequences have avoided the three main gotchas of security: age, sex, and location. The zip provides some level of indirection to your location. The technology of the USPS might find you with your zip+4 and your SSN, so everything else provided on the addressed is for our convenience.
If the USPS goes virtual, I think they want access to your home ISP and your public key. I imagined the traditional mailbox upgrade to become that, and Apple markets it as the iMailbox for every house. Instead of rate limits, that Big Carrier has now, your County and local Post Office might provide something like The Great Internet Wall of China, like they already started. Before you complain, think about employment, or unemployment rates, and those unemployed “stay-at-home moms” that add to that rate (unless they turned their family into their home office and filed as such on their tax forms).
The USPS is an ideal candidate that might sign your public key into one or more private keys. If they do, the U.S. Social Security offices may consolidate with USPS. Maybe somebody wanted those offices separate for the bipartisan appearance in the church and state debate. With the thought for mailbox upgrades, that removed speculation.
I appreciated that service. It's one thing that has been out of the hands of mayors, yet it is an upgrade mayors should consider: the mayor's authority over the firewalls, especially those of “building” permit, on real estate in their area, and any pre-development plans, made in virtual reality that resembles that real estate in their area. I wondered about those “keys to the city” and how they provide any security.
"Virtual basket-ball on Second Life."
-- Think Big