If matching voter-rolls is the goal, this would work well. And, that might be good enough for many applications.

Note, though, that not a whole lot of verification is required to appear on the voter rolls. Mail in a form, you're done. You don't even need to receive the mailed confirmation to vote later. Many (most?) polling places in the US do not require proof-of-identification.

The penalties are large for fraud, hypothetically, but the risk of discovery & prosecution seem low. At a couple of addresses I've lived with large resident turnover, I've seen official voting guides delivered that were addressed to names that seemed suspiciously humorous.

- Gordon

On 4/20/14, 2:11 PM, Will Holcomb wrote:
I've been thinking about the problem of limiting accounts to single
individuals.

For any type of workable liquid democracy
<https://www.youtube.com/watch?v=fg0_Vhldz-8>, you need to guarantee one
vote per person.

I've been thinking that our current system of verification is open to
digitization.

You can get voter rolls, they're used by politicians for mailings all
the time.

 1. A user creates an online account and enters their registered voting
    address.
 2. The system send mail to that person in such a way it is against the
    law for someone else to open it.
 3. The user enters a code and verifies who they are.

The users can then create pseudo-identities which have public data ala.
Reddit.

So a voting site contacts the identity service and passes a list of user
ids. It returns a list of ids such that there is an equivalent number of
actual human voters.

-Will

P.S. I've been thinking about another application for this with STD
tests. When you meet a potential partner, you're able to provide a
digitally signed test. Along with the test you get an encrypted link to
the real identity of the pseudonym you're interacting with.

There is also a signed agreement that if you knowingly had contact that
might have changed your test results, you agree to compensatory damages.
When the victim files suit, in the discovery phase the data will be
unencrypted and the perpetrator held liable.

P.P.S. The reason the victim holds the encrypted is users should be able
to download a signed encrypted link between their identities and then
the server deletes it.

Users are able to reconnect their identities and create new accounts.
The server can keep track of which identities have the same root without
keeping the roots.


_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to