Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Libertina
Thanks for the ping (and noted for detailed read later). What was frightening right off was this:

The computer programs that tell electronic voting machines how to record and tally votes are allowed to be held as "trade secrets."

Cryptography guru Bruce Schneier has long maintained that the worst form of security in cryptography is in hiding the algorithm. It gets no review, it gets no test, and as all too many real-life situations show (including the cracking of the Nazi Enigma machine, which though being quite powerful had a subtle weakness amplified by certain usage patterns), it's the things the developer doesn't foresee that become the weakness. (The most superior key in the world is still worthless if you continue "hiding" it under the front door mat.)

In my position as a humble but vaguely technically aware techie, this voting system cannot be considered secure or safe unless *everything* except the keys (passwords) are made completely public and subjected to intensive review in an open forum.

Any piece of code that remains hidden -- that could be the back door that isn't supposed to exist. But how would you know unless you could examine it, and rebuild the identical executable software yourself from the source?

22 posted on 08/27/2003 6:39:34 PM PDT by Eala (Annoy PETA -- try the Atkins diet.)
[ Post Reply | Private Reply | To 15 | View Replies ]


To: Eala
In my position as a humble but vaguely technically aware techie, this voting system cannot be considered secure or safe unless *everything* except the keys (passwords) are made completely public and subjected to intensive review in an open forum.

Slight disagreement: a voting system should only be considered secure and safe if its integrity would not be compromised by publicizing everything INCLUDING all encryption keys [actually, I don't see much use for encryption, though I do see some use for secure hashing].

In a normal encryption scenario, the guy who creates the keys is presumed trustworthy. In a voting system, by constrast, nobody is deemed trustworthy.

24 posted on 08/27/2003 6:45:13 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 22 | View Replies ]

To: Eala
You are correct about events unforseen by the programmer being the weakness, and it would be safer for coding to be open. but even then I see it as a problem... How many people can understand the code? Atleast with pieces of paper, they are understood by most. What I don't understand is why the Rs stay silent on this issue of voting fraud in general, and high-tech voter security specifically.
32 posted on 08/27/2003 7:16:59 PM PDT by Libertina
[ Post Reply | Private Reply | To 22 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson