funsec mailing list archives

REVIEW: "The Quantum Thief", Hannu Rajaniemi


From: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <rmslade () shaw ca>
Date: Tue, 20 Nov 2012 12:28:28 -0800

BKQNTTHF.RVW   20120724

"The Quantum Thief", Hannu Rajaniemi, 2010, 978-1-4104-3970-3
%A   Hannu Rajaniemi
%C   175 Fifth Avenue, New York, NY  10010
%D   2010
%G   978-1-4104-3970-3 0765367661
%I   Tor Books/Tom Doherty Assoc.
%O   pnh () tor com www.tor.com 
%O  http://www.amazon.com/exec/obidos/ASIN/0765367661/robsladesinterne
  http://www.amazon.co.uk/exec/obidos/ASIN/0765367661/robsladesinte-21
%O   http://www.amazon.ca/exec/obidos/ASIN/0765367661/robsladesin03-20
%O   Audience n Tech 1 Writing 2 (see revfaq.htm for explanation)
%P   466 p.
%T   "The Quantum Thief"

This is the type of space opera that creates whole worlds,
technologies, and languages behind it.  The language or jargon makes
it hard to read.  The worlds are confusing, especially since some are
real, and some aren't.  The technologies make it way too easy to pull
huge numbers of deuses ex way too many machinas, which strain the
ability to follow, or even care about, the plot.  In this situation,
the plot can be random, so the impetus for continued reading tends to
rely on the reader's sympathy for the characters.  Unfortunately, in
this work, the characters can also have real or imagined aspects, and
can change radically after an event.  It was hard to keep going.

Some of the jargon terms can be figured out fairly easily.  An agora,
like it was in Greece, is a public meeting place.  Gogol wrote a book
called "Dead Peasants," so gogols are slaves.  Gevulot is the Hebrew
word for borders, and has to deal with agreed-upon privacy deals.  But
all of them have quirks, and a number of other terms come out of
nowhere.

I was prompted to review this book since it was recommended as a piece
of fiction that accurately represented some interesting aspects of
information security.  Having read it, I can agree that there are some
cute descriptions of significant points.  There is mention of a
massive public/asymmetric key infrastructure (PKI) system.  There is
reference to the importance of social engineering in breaking
technical protection.  There is allusion to the increased fragility of
overly complex systems.  But these are mentions only.  The asymmetric
crypto system has no mention of a base algorithm, of course, but
doesn't even begin to describe the factors in the PKI itself.

If you know infosec you will recognize some of the mentions.  If you
don't, you won't learn them.  (A specific reference to social
engineering actually relates to an implementation fault.)  Otherwise,
you may or may not enjoy being baffled by the pseudo-creativity of the
story.

copyright, Robert M. Slade   2012     BKQNTTHF.RVW   20120724


======================  (quote inserted randomly by Pegasus Mailer)
rslade () vcn bc ca     slade () victoria tc ca     rslade () computercrime org
`So...do you believe me?' I say. `Do you believe we're sisters?'
For a moment Jess just focuses on her feet, which are encased in
thick socks and brown hiking boots.  She raises her head and
surveys my turquoise diamante kitten heels, all scraped and
covered in mud.  My Marc Jacobs skirt.  My ruined glittery
T-shirt.  Then she lifts her eyes to my bruised, battered face,
and we just look at each other.
`Yes,' she says at last.  `I believe you.'
                          - `Shopaholic and Sister,' Sophie Kinsella
victoria.tc.ca/techrev/rms.htm http://www.infosecbc.org/links
http://blogs.securiteam.com/index.php/archives/author/p1/
http://twitter.com/rslade
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: