And here I was thinking, "finally, a good use for platform lock-down!"
Technological protection measures should only be used where something legitimately needs to be
protected, and then they should work. The security of a voting system in operation is
certainly a legitimate example of a place where hard verification and few keys should be used.