Implementing the Lambda Calculus in Machine Code

The Church-Turing Architecture for Computer Science

Episode Summary

The podcast discusses various critical aspects of computer science, contrasting von Neumann's traditional, but 'outdated-by-AI', General-Purpose Binary Computer Architecture, with a proposed "Church-Turing Machine" architecture. It critiques the vulnerabilities and limitations of binary computing paradigms, highlighting issues of malware, cybercrime, and the inherent insecurity of von Neumann's shared memory and the authoritarian, centralised operating systems, all inherited from the mechanical age of World War II-era designs. Conversely, the information age demands the science of a Church-Turing Machine, a future-safe and fail-safe solution founded on Alonzo Church's Lambda Calculus, creating object-oriented machine code. This alternative architecture uses capability-limited addressing and digital encapsulation to ensure data privacy, verifiable software integrity, and democratic and secure cyberspace, through Babbage's Infallible Automation and Ada Lovelace's function abstractions, aligning computing with mathematical precision.

Episode Transcription

Speaker 1  0:00   You know that feeling like you're constantly patching holes in a leaky digital boat, the endless software updates that don't really seem to fix the big problems, that creeping fear of cyber attacks or just, well, the unease about deep fakes and whether you can trust what you see online anymore?

Speaker 2  0:16  
Yeah, it definitely feels like shaky ground sometimes  

Speaker 1  0:19  
Exactly, we're living in this world built on digital tech, but it often feels more like navigating a minefield than standing on a solid foundation. So today, we're taking a deep dive into some really thought provoking stuff. We've been looking at a new computer architecture based on lambda calculus and some excerpts from a paper called rewrite civilizing cyberspace.

Speaker 2  0:41  
And they make a pretty bold claim, don't they?

Speaker 1  0:44  
Audacious, really. They argue, the very foundation of our digital world, the general purpose computer, or GPC, as they call it, is fundamentally flawed,

Speaker 2  0:51  
right? And that a scientifically sound, reliable alternative has been well, largely ignored.

Speaker 1  0:57  
So our mission here is to unpack that argument. We want to understand the history, the missteps Our sources say led us here,

Speaker 2  1:04  
And explore this monumental solution they propose, one that they claim can protect our data, maybe even our democracy and our future online.

Speaker 1  1:13  
It's kind of a shortcut to understanding why things feel so precarious, and what this Church-Turing machine they talk about could actually mean for you the listener, we all get frustrated with tech being unreliable,

Speaker 2  1:25  
Right.

Speaker 1  1:26  
But why is it so consistently unstable? It feels like we're always just chasing down the next problem.

Speaker 2  1:31  
Well, what's fascinating in these sources is they pinpoint the core problem, the architecture of the general purpose computer itself.

Speaker 1  1:38  
Okay?

Speaker 2  1:38  
They have this vivid description an outdated, rickety binary bridge to cyber society. Imagine like building a modern skyscraper on foundations meant for a log cabin. It just wasn't designed for today's stresses,

Speaker 1  1:51  
right? It doesn't scale

Speaker 2  1:52  
exactly, and this architecture, the authors argue, is inherently predisposed to vulnerabilities. It practically invites undetected cyber crime and spying uncivilized digital corruption, they even suggest it can facilitate what they call branded dictatorships. Now they're not talking about traditional politics here, but rather scenarios where power gets concentrated and enforced through unchecked control of the underlying digital systems.

Speaker 1  2:17  
So control through the tech itself, not through external laws necessarily.

Speaker 2  2:22  
Precisely because the checks and balances aren't built into the architecture. The sources say it's a system built on blind trust and unfair hardware privileges, and this, they contend, fuels global cyber conflicts and poses real threats to democratic processes. The author uses this striking analogy, the GPC has a Dr Jekyll and Edward Hyde split personality, meaning it's fundamentally incapable of the Infallible Automation (from the past, the Abacus, Slide Rule, and Babbage's Thinking Machines) we desperately need for critical services, banking, power grids, you name it.

Speaker 1  2:50  
So that inherent flaw,

Speaker 1  2:51  
yeah, that's the root cause of the endless patching and the cyber insecurity we all experience.

Speaker 2  2:56  
That's the argument presented. Yes, it's baked into the design

Speaker 1  3:00  
That Jekyll and Hyde thing really hits home. It highlights the contradictions. So if the authors see these flaws as so deep seated, how did we end up adopting this architecture in the first place? What led us down this rickety bridge path?

Speaker 2  3:14  
Right? Let's step back a bit. The story really kicks off just after World War Two, a pivotal moment for computing.

Speaker 1  3:21  
Okay?

Speaker 2  3:21  
John von Neumann proposed a computer architecture that well. It became the standard for these general purpose computers,

Speaker 1  3:29  
the one we still use, essentially,

Speaker 2  3:30  
pretty much the foundation. Yes, but our sources argue very strongly this was an expedient shortcut, one that crucially ignored Alonzo Church's lambda calculus and overstretched Alan Turing's a-machine. And this decision, in their view, actually destroyed scientific integrity right at the birth of modern computing.

Speaker 1  3:49  
Wow, destroyed scientific integrity. That's a really strong statement. What evidence did the sources offer for that? And did anyone else raise concerns back then? According to these authors,

Speaker 2  3:58  
Well, the sources argue the critical foundation that got bypassed was the church Turing thesis. This is this powerful idea combining Alan Turing's theoretical Alpha machine,

Speaker 1  4:09  
Okay, the alpha machine.

Speaker 2  4:10  
Think of it as like the absolute basic blueprint for what any computation can do, a survival machine for computation, as the sources put it

Speaker 1  4:17  
Right.

Speaker 2  4:18  
And the other half is Alonzo Church's lambda calculus. That's a mathematical system for expressing computation using functions described here as the elastic half, providing universal, dynamic scalability, especially for secure systems.

Speaker 1  4:32  
Okay, so Turing's machine is the what, and Church's calculus is the how, almost

Speaker 2  4:38  
Sort of, yeah, it provides the flexible structure. Now, Turing's amazing work on the 'bomb' at Bletchley Park that obviously shortened WWII, but his deeper work with Church on this foundational thesis, our sources say, essentially lay fallow. It was set aside after Von Neumann architecture took over.

Speaker 1  4:53  
So that's the original sin, so to speak, in their narrative,

Speaker 2  4:57  
That's how they frame it. This misstep led to GPCs being compared to a pile of binary stones lacking the inherent structure and security of a machine built on these sounder mathematical principles.

Speaker 1  5:09  
So the argument is, there was a better path mathematically sounder, but we missed it. You know, this whole idea of reliable computing, it actually goes way back, doesn't it? It's not just a modern thing?

Speaker 2  5:20  
Oh, absolutely not. The quest for infallible automation, as our sources call it, is much older. Think Charles Babbage in the 19th century,

Speaker 1  5:27  
The Analytical Engine guy.

Speaker 2  5:29  
Exactly. He demanded mechanical and mathematical perfection. And Ada Lovelace, you know, the first programmer? She was writing pure mathematical expressions, things like Bernoulli numbers, envisioning programs that could last forever,

Speaker 1  5:42  
And she predicted computers being used for art and music too, right? Incredible foresight,

Speaker 2  5:46  
Truly and Babbage himself, he was so meticulous, the sources note, he even automated the printing of results, just to avoid the printer's errors,

Speaker 1  5:54  
huh? Even then,

Speaker 2  5:55  
even then. But go back further ancient wisdom, things like the Babylonian abacus, the slide rule. They're cited as mathematical machines embodying what they call the Babylonian golden rule. Physical form matches mathematical function,

Speaker 1  6:11  
Meaning they did exactly what they were designed to do, reliably,

Speaker 2  6:14  
Precisely. They achieved reliability, and sort of evolved through natural selection, becoming incredibly dependable because their structure matched their purpose.

Speaker 1  6:24  
So this idea of reliable, self-correcting correcting machines has deep roots. How does that history connect to the solution they propose for today, this Dream Machine, the Church-Turing machine, you mentioned,

Speaker 2  6:35  
That's exactly the bridge they build. The solution, they argue, is a return to the principles of a Church Turing machine.

Speaker 1  6:43  
Okay

Speaker 2  6:41  
They call it the proven way to guarantee trusted software throughout cyberspace, the dream machine we need now. And crucially, this wasn't just theory.

Speaker 1  6:47  
It was built.

Speaker 2  6:49  
It was proven back in the 1970s in the UK, the PP 250 Plessey's System 250 it was used for telecommunications, a field needing, well, decades of software reliability.

Speaker 1  7:00  
Wow. Okay, so what makes this Church-Turing Machine fundamentally different? How does it actually work in a way that avoids the problems of our current computers? You mentioned some key concepts.

Speaker 2  7:12  
Great. Let's break those down. First, there's capability limited addressing, or CLA.

Speaker 1  7:16  
Okay, Capability limited addressing. What's that mean for, you-know-me, as a user.

Speaker 2  7:20  
So normally, an address in computing just points to memory. CLA is different. It's a security mechanism built in instead of today's mess of shared memory and system wide privileges, where one bad app can potentially access anything

Speaker 1  7:34  
Right, so free for all

Speaker 2  7:34  
exactly, CLA uses immutable capability keys to encapsulate software components or object oriented machine code. Think of it like a physical lock and key for every single piece of data and every single program function,

Speaker 1  7:48  
A unique key for everything,

Speaker 2  7:49  
A unique key defining exactly what it's allowed to access and do, nothing more, nothing less. The sources say no freedom exists to do more or less than is expressed scientifically by its design.

Speaker 1  8:00  
So it forces software to stay in its lane, basically prevents it messing with things it shouldn't. What's the next piece?

Speaker 2  8:06  
Next up - Namespaces. You know how namespaces usually just keep names unique in programming? Yeah. Here it's more profound. The sources suggest you, the user, get your own private digital shadow, like a secure personal bubble online, a cyber suit built on that lambda calculus Foundation,

Speaker 2  8:24  
My own private digital space,

Speaker 2  8:25  
Exactly a space you truly own and control, secured by these principles. It flips the script from the current model, where you know big tech companies or the OS or the centralized authoritarian master. Instead, your digital tools become transparent, faithful and loyal servants. Power shifts back to you.

Speaker 1  8:44  
That sounds like a massive shift in control. Okay. What about the software itself? How is it structured

Speaker 2  8:49  
That leads to object oriented machine code? Software isn't one big clunky block. It's built from hardened object oriented, atomic processors. Think of them as secure components, dynamically linked together

Speaker 1  9:00  
Like Lego bricks.

Speaker 2  9:01  
That's a great analogy Legos, where each brick is totally self contained, does one specific job and can only connect where it's supposed to physically unable to interfere with the others. They call them function tight and data tight objects, okay,

Speaker 1  9:15  
Contained in specific How is that containment enforced? What stops a bad Lego brick?

Speaker 2  9:22  
That's where the immutable capability keys come in. Again, they are the enforcement

Speaker 1  9:26  
Immutable, meaning

Speaker 2  9:27  
Unchangeable,

Speaker 1  9:28  
Unchangeable. Digital tokens of authority. They prevent fraud and forgery because they strictly enforce type controlled need to know at least authority rules only the minimum necessary privilege is ever granted, right? And this means your data's pedigree becomes traceable. You do verifiable authenticity. You can see where data came from, who authorized access, and it can't be faked.

Speaker 2  9:50  
Traceability and authenticity built in. That sounds huge for trust. How does it all hang together and evolve?

Speaker 1  9:56  
Finally, there's a DNA hierarchy. The software is structured using a direct DNA hierarchy of these capability keys,

Speaker 2  10:02  
DNA like biological metaphorically, yes, each Namespace is compared to genetic software versions of a digital Darwinian species. It allows the system to evolve incrementally, robustly adding new features or fixing things without introducing those chaotic, unforeseen side effects or vulnerabilities we see now. It's designed for resilience.

Speaker 1  10:22  
Okay, wow. That paints a picture of a radically different digital world. Security and control seem baked in by design, not bolted on afterwards with endless patches.

Speaker 2  10:32  
That's precisely the argument and these concepts, they're not just abstract ideas. The author argues they directly tackle the biggest cyber threats you face every day.

Speaker 1  10:41  
How? So let's talk applications cybersecurity first.

Speaker 2  10:44  
Right, With this Infallible Automation, software errors get detected, not ignored. Malware hacking attempts, they're blocked instantly on the spot, red handed the very microsecond they try to cross an unauthorized boundary defined by a capability key,

Speaker 1  10:59  
So it stops attacks before they can even start. Essentially No more playing catch up.

Speaker 2  11:03  
It eliminates the detection problem that plagues current security, according to the argument,

Speaker 1  11:08  
Okay, what about things like deep fakes, misinformation?

Speaker 2  11:11  
Those immutable capability keys provide information pedigree. You can trace data back to its verified, watermarked source. It offers a way to distinguish authentic information from manufactured realities, a huge deal in today's climate.

Speaker 1  11:26  
Yeah, no kidding. And the bigger picture, democracy control.

Speaker 2  11:30  
The sources are quite explicit here. They contend this architecture reverses the unfair, centralized power of suppliers, corrupt governments, criminals, enemies and self serving monopolies.

Speaker 1  11:40  
Strong words.

Speaker 2  11:41  
Very, The idea is that putting cyber power and capability keys into the hands of individuals creates a more level playing field for cyber civilization to excel. They directly link it to ensuring government of the people, by the people and for the people, translates into the digital sphere

Speaker 1  11:59  
And the threat of AI rogue AI, AI-malware, AI-breakouts.

Speaker 2  12:03  
The inherent design, the compartmentalization with CLA and keys, detects and prevents every digital bit of the perimeter boundary from external attacks or breakout attempts. It's designed to contain processes,

Speaker 2  12:13  
right?

Speaker 2  12:14  
Think about the tragic 737 Max crashes, where the software fought with the pilots for control.

Speaker 1  12:21  
Oh, yeah, terrible. A church Turing machine, they argue, would ensure software remains a loyal, faithful servant, not a dictatorial, capricious master. It prevents those kinds of catastrophic, dictatorial intrusions by design.

Speaker 2  12:37  
The stakes really do seem incredibly high when you put it like that, safety democracy. If this solution, this Church-Turing approach, is potentially so critical, why isn't it everywhere, why are we still, as they say, stuck on the rickety bridge?

Speaker 1  12:52  
That's the million dollar question, isn't it? And the authors don't mince words. They call their own book provocative, addressing a terminal sickness they believe threatens democracy.

Speaker 1  13:01  
Okay,

Speaker 1  13:02  
The reason this monumental milestone, as they term the CT machine principles, remains largely unique or ignored, they argue, is because it was ignored by mainstream computer suppliers who monopolize the semiconductor industry and limit competition

Speaker 2  13:16  
Monopoly interests.

Speaker 1  13:17  
That's their claim. They specifically point to the early Intel microprocessors built on Von Neumann architecture as having effectively told the death bell on all competitive alternatives, and that included the PP 250 project we mentioned earlier. So corporate decisions and market dominance essentially shut down this alternative path decades ago, according to the sources,

Speaker 2  13:38  
That's the argument laid out. It's quite a stark warning they present. The authors assert that monopoly interests and the interests of the spy agencies override concerns for citizens and the survival of democracy.

Speaker 1  13:50  
Wow. Okay, it's important we stress we're relaying the arguments and the strong language used in the source material here. They clearly see this as a massive global issue.

Speaker 2  14:00  
Yes, they frame it as an unseen world war. They argue for a huge national effort like the Manhattan Project, urging Washington to step up and demanding lawmakers set minimum standards for industrial strength software.

Speaker 1  14:12  
Again, presenting the author's viewpoint. They see making Church-Turing machines a national priority as essential to prevent what they call a human made disaster and dictatorial digital oppression, we're conveying their perspective on the urgency and the proposed solution. So quite a journey we've taken from ancient ideas of reliable calculation

Speaker 2  14:31  
Through Babbage and lovely

Speaker 1  14:32  
To the core of today's cyber threats, uncovering how our sources believe a historical oversight created this delusion problem in our tech infrastructure,

Speaker 2  14:42  
And exploring the promise of industrial strength, computer science, the church Turing machine as a potential blueprint for a more secure, democratic, digital future.

Speaker 1  14:52  
Putting control back in your hands, the user's hands, through things like immutable capability keys and those personal name spaces

Speaker 2  14:59  
A fundamentally different approach.

Speaker 1  15:01  
But let's end with a final provocative thought drawn directly from these sources. They warn the point of singularity is the point of no return. They suggest that sticking with what they see as the flawed general-purpose computer means that superhuman powers like advanced AI cannot be civilized and brought under the control of a democratic society,

Speaker 2  15:22  
Leading to

Speaker 1  15:22  
leading they fear to potential enslavement by AI malware and the rise of digital dictatorships. So the question they leave us with, and maybe leave you with, is, as a citizen in this increasingly digital world, what can you do? What should we advocate for to push for the foundational changes needed to secure digital freedom and build a truly civilized cyberspace.

Transcribed by https://otter.ai