Skip to main content

Cancer

Looking at a picture of my mother laying in her hospital chair taking her chemo medication makes me think about cyber. Our bodies are a network of connected computers. Blood and lymph are the communication channels that relay information between these computers. The mainframe, of course, is your brain, which is another highly connected network of computers.

When cancer invades it starts by infiltrating a system. The system is homomophic usually, which makes it easier for the cancer (cyber infiltrator) to gain its foothold. Sometimes the infiltrator moves fast and runs through multiple systems wrecking havoc. Yet there are those infiltrators who move slow, learning each system as it goes slowly through the entire system. Nonhodgkins Lymphoma is that slow hacker. That's what my mother has. She's had this for a very long time. Mostly ignored by her "doctors" 8, 12, maybe 30 years ago, finally they see the infiltration and recognize the need to respond.

Once the cancer becomes apparent, like the infiltrator, we struggle to figure out where it started. That's where we need to address the treatment otherwise we just move it around. That sounds exactly like the cat and mouse chase of counter infiltration. How do we backtrack?

None of the medical "doctors" who work on my mother are savvy enough to even think about this concept. They are mostly preoccupied with billing medicare and collecting their fee for their time. The nurses care, but they're so overwhelmed (like those network techs) that they don't have time to think deeply. Who can stomach a deep dive on the root cause when your system is about the suffer a catastrophic failure, right? Dead humans make for bad test subjects.

Let's work backwards from the visible evidence of infiltration. We see the "cancer" tumor which is the equivalent of a malware drop or data erase, or even a damn DNS exfil that the Cisco guy described. How the infiltrator get into that zone? We look at the path you would take, follow the network, the connected lymp tissue and where it could stage. Look for a similar exploit in that staging area and then again, backtrack. Like a worthy infiltrator, you eventually find rings of exploit that lead back to themselves. That's the frustrating part, and it's the part where most just stop looking. There's always a trail, often some escape that transcends the homomorphic nature of the system.

So you jump across system barriers too. Instead of on a Windows system, you look into the Linux network that has a physical separation (maybe it was your IB HPC network). This is akin to looking into the circulatory system (blood) where it intersects with the lymphatic system, i.e. the liver. The liver would be another computing system with an embedded switch. You look for signs of collateral infiltration, for instance signs of renal cancer (she had that a few years ago).

In all of this backtracking you keep looking for the infiltrator. There is a fingerprint out there, there is always a fingerprint. No matter if it's cancer or a hacker, each infiltrator leaves its mark where it started. Not even the most fantastic NSA red team hacker is immune to leaving a trace. Not every trace is measured in the system they infiltrator.

I am a firm believer that most cancers are the result of viral infection that goes unstopped by an immune system. Sometimes that IPS doesn't know how to handle the foreign "zero day" known as cancer. Maybe one day I will be able to reconnect with Travis, the virology cohort I knew during my SERS experience.

Until then, somebody still needs to collect on the $100 challenge. How many neutrons does it take to make a black hole? My hundo awaits...

Popular posts from this blog

Stock Option Debt Income

The 2024 Presidential election has brought out a topic of interest that seems to have been perverted. There is this "Taxing Unrealized Capital Gains" [1] movement that is being falsely attributed to Vice President Harris. Clearly, this is a change in the revenue code that was designed by someone in office long before VP Harris was in office. My money is on Elizabeth Warren and Bernie Sanders. What is this change in the revenue code though? For that you have to understand what Silicon Valley zillionaires are doing with their stock options. Many of these people in this special economic area have huge discounts on stock prices for companies that are not public yet, or are public and can not be sold [2]. To be fair to these holders of equity, banks allow them to finance debt using leverage against those options. If you hold an option that is worth $5M then a bank might lend you a share of that value, thus realizing a debt against the option [3]. This is a fair debt instrument and...

A Self Defeating Race False Narrative

2020 is the year of the pandemic. The SARS-Cov-2 (Covid19) virus has rampaged across the planet infecting 4,893,136 [1] people by May 20, 2020. At this time, of those 4.8M people, 323,256 people have perished from complications that arise from the infection. Arising out of this pandemic has been a narrative about non-white ethnic groups being disproportionately affected by the infection [6,7,8]. A narrative that conditions people to believe that they are perpetually victims only creates a "collective victimhood" [4,5] in that group. This "collective victimhood" costs its members millions in unrealized potential, sends them cowering from social interactions that would otherwise benefit them, and ultimately creates an environment that perpetuates itself. Let's try to dispel that false narrative and deal just with data. I pulled my data from the CDC [9] looking at mortality only. The mortality data from CDC contains per-state mortality rates on a per-infectio...

Number of Primes

Anderson's Theorem (a) The number of primes in [1,n] is no more than 2+floor(n/2). The probability of n being prime when n is not prime is 1/2 - see Dasgupta,Papadimitriou,Vazirani "Algorithms" page 26. Therefore, the E(pi(n)) is n/2. (b) There does not exist another set of adjacent primes other than {1,2,3} 5: 2 + floor(5/2) = 2 + 2 = 4:=> {1,2,3,5} : 4 <= 4 7: 2 + floor(7/2) = 2 + 3 = 5 => {1,2,3,5,7} : 5 <= 5 11: 2 + floor(11/2) = 2 + 5 = 7 => {1,2,3,5,7,11} 6 <= 7 26: 2 + floor(26/2) = 15 => {1,2,3,5,7,11,13,17,19,23} : 10 <= 15 Lagrange's Theorem is Inaccurate Lagrange's theorem about primes states that pi(x) is the number of primes <= x. The pi(x) is approximately x/ln(x). He postulated that the lim of pi(x)/(x/lnx) as x-> infinity was 1. This is incorrect. if the number of primes is bounded by n/2 then refactoring and reducing Lagrange's Theorem results in the lim of ln(x) as x approaches infinity. This is alwa...