A Framework of Multidimensional Context for Web App Security

Matty K.
Cyberpower Telenoia
6 min readMay 2, 2024
Cyberpunk humanoids in spheres.
“Glowing transparent cyberpunk humanoids with a sphere crystal and a point in center.” — Runway.ml T2I prompt

In one of my previous articles, “Multi-dimensional Security Mapping of Websites”, I began writing about an abstract way of envisioning the structure of the functioning aspects of possible human intelligence, based on my experience, as it may relate to fields of research in Cyber Security.

I’m specifically curious about its practice in Web Application Security because of the emergence of Artificial General Intelligence and the lack of security in the promises of Cyber Security risk insurance policies. However, this article is merely a visualization of the concept with an expanded explanation.

ATTUNED LEARNING

The current state of this concept is reimagined below with the title “Attuned Learning”. I call it as such because I had a realization come to me as I was sketching this, as usually happens — and this is a primary reason to create such maps — that this is the observation of my functioning when I am attuned and in a state of reception, which includes an openness and allowance of a state of convergence within me, having resonated with the point of attention in order to observe what is new and exciting. Yet first I may benefit from being attuned, which is basically a way of remembering myself.

Attuned Learning — a point within a realm.
Attuned Learning — A point in a realm.

When “spirituality” is defined as the extent to which one allows oneself to experience, this image shows the foundations of the abstract theoretical functioning of humans who may have more objective experiential wisdom and actual direct knowledge of something of interest to those seeking to find an understanding of how to treasure the confidentiality, integrity and accessibility of their valuables.

I have certified foundational training in both altered states and the possibility of journeying in and out of these altered states. I have also found certain publicly available psychoactive elements to be of inductive fuelling guidance on rare occasion.

When the aim is attuned learning, it is a journey into the state of receptivity, not necessarily a final destination, spiritual guidance or daily operations.

I am learning that everyone is neuro-atypical to some extent, nevertheless I succeed in a sojourn of this kind of learning only occasionally — it has provided for a certain depth in life which makes me wonder if I’m supposed to share this to help others who may have a need to know, and if I should do this more often, since I am able to.

Bitcoin Security Maps podcast video episode of this article.

I thought it might be humorous at this point to mention that this “mapping” could also be titled “How to blow your mind” or “Spiritual neuroatypical diversity explained” or “What I thought everyone sees” or “Now I get it why so many people are certain” and “Aha! It’s only me who sees this…” etc. It’s an introductory mapping of my own journeys and experiential capabilities.

This is significant because I see that the risks, likelihoods and impacts of the threats to the Internet of contemporary civilized societies are about to be radically transformed at an alarming rate.

If security professionals in all disciplines working for the right aims continue to have misunderstandings about the realm we live in as human beings then that might induce our peril simply because we failed to have a consensus on reality.

FRAMEWORK EXPANSION

Today I am expanding on this framework because it is something of increasing significance. I find myself referring to this concept of multidimensionality more often now due to the increasing misunderstandings between people, especially in the business of Information Security.

This framework shows why not all opinions are equal. It also displays why with any significant question, such as the general security of a website — and all the way to an audit of the knowledge base of electricity — it is beneficial to consider the dimensions of more developed spheres.

What is an opinion? And what is a developed sphere?

Let’s begin with the fact that there is a certain time frame, an opening in time, during which it is still possible to purchase cyber risk insurance before Artificial General Intelligence. This framework may increase the chances of more attuned InfoSec professionals to gain insight into the nature of human beings who can provide valuable new information about the nature of holistic intelligence and also counter-intelligence, as with the severest cases of covert, rogue, malicious destructive entities such as nefarious lurking psychopaths of war.

DEFINITIONS OF HEADINGS

I will be expanding on these over time, the following is my initial wording which I am presenting in order for new formulations to come to me later.

REALM
Allness in human spiritual life. Metaphysical wisdom.
Perhaps boundarylessness.
Enables one to experience directly, the spheres, dimensions and points.
A higher level of depth of holistic intelligence.
Aptitude of abstraction in knowledge.
Includes at least knowledge of other realms beyond human, if not experience in them.

A realm can be the human contemporary civilian matrix in which known textbook science rules. This is used everywhere on the planet and it is rarely questioned by the average person.

Another realm can be that of an atom, an animal, a plant, a rock, the spirit of the wind, a planet but also that of galactic beings. These can overlap any parts of the human realm.

SPHERE
One’s life inside a paradigm matrix.
Resonance capacity.
The sphere is the experiential distance to the mastery of the realm. To read the description of when a sphere equals to the realm, please see [The Art of Living].

The boundary of one’s sphere is used in attending to a point (experiential visible realm) and is the LEVEL: depth of holistic intelligence that is the simultaneous depth of new original abstract information received if attuned.

New information is received as LAYERS of a point, the abstract knowing. One can move between layers by tuning and detuning to one’s minimum and maximum.

DIMENSION
Another perspective on the paradigm.
In worst cases, our sphere is made of one dimension.
That dimension should cover all points in one’s life.
Some dimensions do not cover the point.
Some dimensions include the point by overlapping on it, but differ on some other aspects.

POINT
Raw datum under attention.
Sensory meditation.
A point can be in another dimension, in another sphere.

MULTIDIMENSIONALITY OF WEB APPLICATIONS

Websites on clearnet and the darknet can be found within one sphere, in all their dimensions. If one understands this threat to the sphere itself— which can be a rogue misaligned artificial general intelligence, then one can deduce that all websites are vulnerable, and the impact to critical systems of a nation could be instantaneously severe.

CONTEMPLATIONS OF PROGRESS

In order to display the progression in the contemplation of the presentation I include the photographs of the previous draft versions of the mapping of multidimensionality:

This was version 2.
Version 1.
This was version 1.

ORIGINAL QUOTE

Here is the original specific reference from the mentioned article:
“For example, a point is a specific raw datum under attention. A layer is the depth or abstraction in knowledge. A dimension is another perspective on knowledge, such as that between a horse lover experience and a missile scientist experience when focused on the same context. A sphere is one’s life inside a paradigm or way of living asserted by oneself and others as fact. A realm is a much deeper ability to interconnect between various atmospheres. And levels are the various depths of holistic intelligence in one’s attention. — me.”

CONCLUSION

I hope this visualization of “Attuned Learning” begins to bring some new clarifications to what I find to be of paramount significance when communicating with other humans in the field of whatever Cyber Security is becoming. My next articles will continue to refer to this framework in practical approaches.

A map of this article.

--

--

Matty K.
Cyberpower Telenoia

Niche InfoSec Consultant - Stealth Recon for Red Teams