veryard projects - innovation for demanding change

trusting Harry Potter

veryard projects > trust > potter
on this page some problems of wizard trust more pottering
The Harry Potter books provide some excellent illustrations of some important issues in relation to Trust and Security. Trusting in Appearance Wizards are vulnerable to the tricks of other wizards, and so place their trust in unreliable things - people, artefacts, evidence. 

Context-Dependent Trust Can we trust Professor Lupin with the care of our children? Not when there's a full moon ...

Networks of Trust Who betrayed Harry Potter's parents
Muggle Ontology

... some more references to Harry Potter


veryard projects - innovation for demanding change

Trusting in Appearance

veryard projects > trust > potter > appearance

J.K. Rowling has created a wonderful and nearly consistent world, but there are some strange anomalies.

One of the things I find surprising is the fact that wizards are regularly fooled by the tricks of other wizards, and so place their trust in unreliable things - people, artefacts, evidence. One wonders how the Ministry of Magic is able to perform any useful function at all, if it is systematically unable to detect these tricks.
 
PolyJuice
Potion
This magical potion apparently enables one wizard to impersonate another. In the Goblet of Fire, even Dumbledore is fooled.
Time
Turner
This allows a wizard to be in two places at once. In the Prisoner of Azkaban, Harry and Hermione use this to frustrate the plans of the Ministry of Magic, while retaining a cast-iron alibi.

Interestingly, Hermione's possession of the Time Turner had previously been authorized by the Ministry of Magic - presumably by a separate department. Clearly the wizarding world has failed to embrace Joined-Up-Government.

Memory
Modification
In the Order of the Phoenix, a quick-witted wizard alters the memory of a witness, to avoid a potentially dangerous disclosure.
Quidditch The opportunities for cheating at Quidditch seem endless. For example, there are several instances in the book where key artefacts (brooms, bludgers) are jinxed by watching stakeholders.

(In contrast, some of the cheating that goes on around the Triwizard Tournament seems touchingly naive.)

Of course, in the Muggle world, there are no such tricks.  Therefore we can always place perfect trust in our sense of What Is Going On.


veryard projects - innovation for demanding change

Context-Dependent Trust

veryard projects > trust > potter > context

Can we trust Professor Lupin with the care of our children? Not when there's a full moon ...

Remus Lupin has two identities - man and werwolf. As man, he is an excellent teacher. As werwolf he is a danger to himself and others. However, the werwolf identity manifests itself only at the full moon; at other times Lupin is perfectly safe.

It is not unusual for decisions of trust to make a distinction between different identities of the same person. Let's say I have a friend called John. John-sober and John-drunk are two different identities, with recognizably different patterns of behaviour and risk. I am happy to lend my car keys to John-sober, but not to John-drunk.

If a person has a gun to his head, or his children are held hostage, his behaviour is likely to be uncharacteristic. ("You are not yourself today.") Signatures and voice patterns change under stressful conditions, including duress and torture. If this uncharacteristic behaviour is detected at a security checkpoint, then it might be appropriate to hinder his entry, until the identity difference is resolved.

This is about a difference in identity, not just a difference in behaviour. I am not refusing John my car keys because of his slurred speech; I am refusing them because he is drunk  It may be his slurred speech that alerts me to the fact that he is drunk; but if he convinces me that his slurred speech on this occasion is a result of a visit to the dentist, I may let him have the car keys. Conversely, if he learns to speak normally even when drunk, I shall just have to find a different way to determine when he is drunk and when sober.
 
more Differentiated Identity


veryard projects - innovation for demanding change

Networks of Trust - Who Betrayed Harry Potter's Parents?

veryard projects > trust > potter > networks of trust

The best-selling children’s novel, Harry Potter and the Prisoner of Azkaban, illustrates several important points about trust. Harry’s parents are hiding from the Dark Lord ("He Who Must Not Be Named"). James Potter can nominate one friend to guard the secret of his whereabouts, and chooses his strongest and apparently most trustworthy friend – Sirius Black. But for Sirius, being the obvious choice makes him immediately vulnerable to attack: in systems engineering terms, he is a single point of failure. He decides that the Potters’ secret would be better guarded by a less obvious person, and delegates the responsibility to a weaker wizard – Peter Pettigrew – who immediately betrays the Potters.

This is an example of transitive betrayal. It illustrates the following points:

transitive networks of trust (trust - delegation - betrayal)
The strongest component is the most obvious place to attack – and this makes it vulnerable. A powerful adversary trying to break the system, or to breach its security, may well think it worth investing effort into finding how to break the strongest component. (The system is as weak as its strongest link.) 
This leads to the Decoy pattern. A highly visible component draws fire, but isn’t really worth attacking. This is like sending an armoured truck out of the front gate containing the sandwiches, while the gold bullion slips quietly out of the back gate in an unmarked, unarmed van. (The system is stronger than its strongest visible link.)
However, the Decoy pattern is worthless once the illusion is broken. Strength that depends on secrecy is always vulnerable to leakage. A linear (one-to-one) delegation chain is as strong as its weakest link.
To delegate responsibility to weaker components, we need to use the Distributed Delegation pattern – where the system now relies on the concerted strength of all the components working together, rather than being vulnerable to the weakness of each. Parallel (one-to-many) delegation is much stronger than linear delegation.
Trust is transitive – whether you like it or not. If you trust a component from company X, and this depends on a component or service from company Y, then you are implicitly trusting company Y as well, although you may not even know that company Y exists.
CBDi forum This is an extract from an article in the April 2001 issue of Interact.  For the full article, plus relevant patterns and discussion forum. please register at the CBDi Forum website (Silver/Gold membership required for access to articles, but free Bronze membership will give you access to lots of other resources, including the pattern catalog).
more trusting components factsheet (pdf)

veryard projects - innovation for demanding change veryard projects > trust > potter
Page updated July 4th, 2004
Copyright © 2003-4 Veryard Projects Ltd 
http://www.veryard.com/trust/potter.htm