fraud modes become possible. Coercion and vote selling are just
the most obvious.
Ed Gerck
Yeoh Yiu wrote:
Ed Gerck [EMAIL PROTECTED] writes:
The 'second law' also takes precedence: ballots are always secret, only
vote totals are known and are known only after the election ends.
You get totals per nation, per state, per county, per riding,
per precinct, per polling stion
election. You can do it in a private election for a club,
for example, but even then only if the bylaws allow it.
Cheers,
Ed Gerck
, which is 100% under state and/or federal
jurisdiction.
But there are additional scenarios -- a bug, Trojan horse, worm and/or
virus that infects the systems used by all trustees would also
compromise voter secrecy and, thereby, election integrity.
Cheers,
Ed Gerck
or place of origin or destination of
any human involved in the communication. Humans can't send
electrons in the wire, airwaves in the ether -- there is always a
piece of technology in-between.
Cheers,
Ed Gerck
This solution, like others based on the same principle, may not
scale past ~150,000 users because of clock drift problems.
Cheers -- Ed Gerck
Marc Branchaud wrote:
Any thoughts on this device? At first glance, it doesn't seem
particularly impressive...
http://www.quizid.com/
Lovely idea
Windows and killed IBM's OS/2 in the process.
3. Embedding keys in mass-produced chips has
great sales potential. Now we may have to upgrade
processors also because the key is compromised ;-)
Cheers,
Ed Gerck
PS: We would be much better off with OS/2, IMO.
Ross Anderson wrote:
http