-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PEV subversion #1
Comments
On Wed, 17 Jun 2015, Daniel Richman wrote:
I think the access to the voting server required would be equivalent to In very early incarnations, the lists of tokens were printed out, both
The current system would definitely have problems handling this margin's
Thank you for suggesting this. I am not up to date regarding the actual Since the salt should not be remembered by the server (to aim to effect |
On 17 June 2015 at 12:52, David Eyers [email protected] wrote:
Agreed, though these are mainly compromising anonymity? In BOB.php there is "The catch-all for handling (a) is the post-election verification process" so I guess at the very least I'm arguing that the documentation there may
To a certain extent, a small malicious group could still cause trouble by
I'm not 100% sure what you meant here, but for avoidance of doubt I'm not
I don't think anything can stop a voter claiming their vote was recorded I think that a salt+hash based method would prevent dishonest voters —
|
On Wed, 17 Jun 2015, Daniel Richman wrote:
Ahh, got it. So more like "The attempted catch-all for handling..."? ;-)
The hope was that the legitimate counting margins would be larger than the
Yes, that all good, and understood.
Agreed.
I agree, although I suspect that everything rapidly gets messy, as the
Yep, agreed both that the server doesn't and shouldn't need to store the |
I was wondering if you had considered this / whether this method for subverting the post election verification process would actually work:
Other fun scenarios:
An idea?
Voting token could be
hash(salt + identity of voter)
; salt being unique per voter; salt revealed to voter. Identifying voters from the published list requires breaking the hash; a voter can demonstrate that a token is theirs by revealing the salt; assigning two voters the same token requires finding a collision.The text was updated successfully, but these errors were encountered: