The Conspiracy is the Theory

Posted on: May 18th, 2005 5:29 PM GMT

By: Greg Reimer (Code Monkey Extraordinaire)

Topic: conspiracy theory, tech, thought

Conspiracy Theory is analogous to an internet worm, henceforward referred to as worm.ct, where the systems being infected are human minds, the network is any communication between them, and the security flaw is an overflow in the mind's incredulity buffer.

How the Virus Works:

First a signal containing the worm.ct payload is transmitted from an infected host to a non-infected host (i.e. Victim). Victim is immediately struck with a sense of incredulity so strong that an overflow occurrs in Victim's incredulity buffer. Skeptical, but wide-eyed comments starting with "What the..." might be uttered at this time.

At this point, what should happen is Victim's Crap Detection Process (CDP) (part of the logic system) would quarantine this particular memory block so that no malicious code will be executed. Eye-rolling might represent Victim bouncing the request and closing the connection, or Victim might allow the connection to fail silently out of politeness; doing the smile-and-nod while internally routing everything to /dev/null.

Unfortunately what sometimes happens is that the buffer overflow causes the CDP to hang, and malicious worm.ct instructions are executed in Victim's trusted memory. These instructions effectively trojan the CDP so that each time it runs it exits without error if the topic resembles any kind of Conspiracy. This is done by using a recursive algorithm that could be expressed in English as "The very act of questioning the existence of the Conspiracy further proves the existence of the Conspiracy." This is the core of worm.ct and gives it high-level clearance within Victim's logic system.

Even so, worm.ct cannot freely propagate itself without authorization from Victim's emotive system. This is trivially done by embedding code sequences within worm.ct such as "A group of five people secretly own and control all of the world's banks" and "The US government is concealing an alien plot to take over the world". Such sequences almost always trigger the Sensational Story Daemon (SSD) which, like most of the emotive system, runs independently of the logic system. SSD assigns a high-level authorization with the emotive system, thus worm.ct is free to propagate; as evidenced by various elements in today's society.

Fortunately, patches are available in the latest security bundle available at ftp.commonsense.org or, alternatively, the FTP mirror sites downloads.getaclue.net and ftp.growabrain.edu. There are still quite a few compromized machines out there spewing this worm so, please, remember to patch your current system and/or any new ones you bring onto the network.

(Originally posted on 20 Jul 2004 at my work blog)

weblog home »
show all posts »