Security quotes of the week
Getting security right is hard for the best teams on the world. It's impossible for average teams.
And yet, we're letting people who don't understand even the slightest bit of the problems and challenges run the show. What a mess.
Posted Jul 19, 2018 16:30 UTC (Thu)
by smitty_one_each (subscriber, #28989)
[Link] (9 responses)
Posted Jul 19, 2018 19:42 UTC (Thu)
by tome (subscriber, #3171)
[Link] (7 responses)
"Our end-to-end online voting platform provides a way for the voter to follow their vote into the ballot box to ensure their vote was cast as intended and counted as cast. It also provides the voters transparency into the ballot box as a whole to ensure the election results that are being reported are truly accurate. Elliptic curve cryptography technology keeps the voting process secure, while protecting each voter’s right to privacy within the system."
and that using this platform, a voter
"submits their ballot to a secure blockchain based ballot box, while retaining anonymity and ballot secrecy."
Superficially that all sounds just about perfect, though
1) I don't know if that ballot secrecy includes privacy from the eyes of platform administrators,
2) I haven't taken the time to verify these claims, and to do so would be very non-trivial and I haven't even started, and
3) the Matt Blaze quote might lead one to suspect it's full of holes.
So I'm curious what others have to say who know more about this stuff in general and Followthevote in particular.
Posted Jul 19, 2018 22:35 UTC (Thu)
by smitty_one_each (subscriber, #28989)
[Link]
Too, the insider threat cannot be eliminated.
This may be an example of a system with a requirement to sub-optimize itself by using a non-technical component, in support of a non-technical security requirement.
#NedLuddForever
Posted Jul 26, 2018 0:07 UTC (Thu)
by mstone_ (subscriber, #66309)
[Link] (5 responses)
This is an actual thing, and it's why we have the secret ballot system that we have.
Also, since they mention blockchain, it's snake oil.
Posted Aug 7, 2018 18:50 UTC (Tue)
by bfields (subscriber, #19510)
[Link] (3 responses)
Posted Aug 8, 2018 21:04 UTC (Wed)
by nix (subscriber, #2304)
[Link] (2 responses)
(Sure, you could change it again -- but that's why this is done just before the vote closes. They stay with you to assume unchangingness until the vote has closed...)
Posted Aug 14, 2018 18:17 UTC (Tue)
by bfields (subscriber, #19510)
[Link] (1 responses)
But I'll admit I was imagining basically a single rogue actor. The "attacker" could be more pervasive (like husbands acting to protect a patriarchal system).
Posted Aug 16, 2018 10:03 UTC (Thu)
by nix (subscriber, #2304)
[Link]
Posted Aug 9, 2018 0:45 UTC (Thu)
by nybble41 (subscriber, #55106)
[Link]
Not *all* of them. Consider this scheme: Each choice on each ballot is secretly associated with a unique code. You record the code for your choice on a separate piece of paper and place that paper in the ballot box, optionally keeping a copy it for later verification. The page with all the codes on it is then destroyed. If you want to "prove" that you voted a different way, you record the code for that choice and then request a new ballot (without putting anything in the box). The first ballot is set aside. When the voting period is over all of the codes in the ballot boxes *and* all of the codes on the discarded ballots are shuffled together and publicized, along with the choices they represent—since the discarded ballots include one code for each choice these extra codes do not favor any particular position and can simply be subtracted from the final tally. Anyone who wishes to verify their vote can check that their code is present and associated with the correct choice. However, only the voter knows whether the code they recorded was the one they actually submitted or the one on the discarded ballot. To an aspiring vote-buyer these appear identical, but only the real code increases the tally for that choice relative to the other options.
Posted Jul 23, 2018 15:40 UTC (Mon)
by iabervon (subscriber, #722)
[Link]
The system used in my district is actually pen on paper, with an optical scan machine that (a) counts the votes so they can announce provisional results and (b) tells you to try again if the ballot isn't valid or has stray marks. After the election, they can just count the ballots that didn't get rejected by hand if there's any question as to the accuracy of the results.
The main issue with paper is how you handle having one blind person in the district; I believe we let each blind person have a trusted assistant as the best available compromise, but I don't really know the details.
Posted Jul 26, 2018 20:26 UTC (Thu)
by Wol (subscriber, #4433)
[Link] (2 responses)
When you turn up at the polling station, you are given a ballot, and the serial number is recorded on the voter list. The completed ballot is placed in a sealed box.
When the voting station closes, the voter list goes in one direction to secure storage. The ballot papers go off to the town hall to be counted. That is the LAST time the voter list and the ballot papers are in close proximity.
So to find out how someone voted you need to (a) know their voting station, (b) gain access to the voter lists, and (c) be able to search through the ballot papers to find their ballot. Do-able, but far from trivial.
Cheers,
Posted Jul 26, 2018 23:09 UTC (Thu)
by ErikF (subscriber, #118131)
[Link]
Posted Jul 27, 2018 9:36 UTC (Fri)
by excors (subscriber, #95769)
[Link]
(* ignoring a few lunatics saying you should use pen instead of pencil, else MI5 will rub out your mark and change your vote)
If you don't have a society that strongly respects and enforces laws, and a free press that will investigate abuses and push for action to be taken even against the government's wishes, then I suspect no brilliant technical solution for voting will really be good enough. If you do live in a good society, you should be alright as long as you avoid pathetically bad technical solutions (like, say, most current electronic voting systems).
Security quotes of the week
The ultimate security constraint is the secret ballot.
Other security constraints are hugely important, but if you lack the confidence to vote your conscience because there is no way to tie a specific ballot to you, then the election is moot.
All of the shiny ideas about automating elections (that I've ever heard of) seem to end up making it possible to tie the ballot casting to the individual.
Too, there are some technologies, like a paper ballot, that provide advantages that are too often poo-pooed by technical people.
Trading immediate feedback for certain aspects of security could be a reasonable tradeoff, folks.
Security quotes of the week
Security quotes of the week
Security quotes of the week
Can't you mitigate by allowing people to change their vote? Then they can sell their vote and still go home and cast a new ballot for whoever they really want.
That's not perfect, but it might make the vote-buying attack no longer worth risking jail for.
Security quotes of the week
Security quotes of the week
Security quotes of the week
Security quotes of the week
Security quotes of the week
Security quotes of the week
The UK system
Wol
The Canadian system also has serial numbers on the ballots, but the DRO (deputy returning officer)'s responsibility to remove the counterfoil, so there should be no way of tracing a vote to a voter once the ballot has cast. IMO, this is as private as you can probably get, while still preventing fraud.
The UK system
The UK system