-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How is this system going to be managed in the long term? #5
Comments
Hi! As you may know, this repo (along with the rest of the GitHub org) tracks the production code of https://camvote.org, so these providers files are for that specific instance, for the University of Cambridge. The ability to update this repo becomes a bit moot if there is no one to maintain the production server! As you've identified, this is not the most efficient way of managing providers - the reason is that we've backported this new infrastructure onto
Some potentially interesting links: Does that answer your question? |
yeah thanks for answering :) Sorry if this isn't the best place to discuss it (and I have a feeling that this is simply a necessary problem if you're keeping who voted anonymous), if an election has <100% turnout then an admin could invent new tokens and assign who they voted for in order to rig a vote while keeping the property of all the real users who voted being able to compare their tokens against the list and see that they did indeed vote. Obviously, this would require either a security breach or sysadmins to be corrupt which I am sure you are not, but wondering whether you have thought of this yourself? |
That's an important consideration! For this reason, there are two things published:
This means that in order to add new voting tokens, one would also have to add people to the "voted" list (so that the length of the lists match). This means that a bad actor forging votes raises the possibility that someone notices a vote in their name when they did not in fact cast one. In practice, most users will of course not check this list, but it is important that any vote tampering would be publicly visible; so users are encouraged to audit elections. A more sophisticated attacker could get around this by issuing the same voting token multiple times to multiple people (who voted identically), releasing a "spare" voting token which they can cast how they wish. This is something we'd like to prevent, but might require a complex cryptographic solution (e.g. publishing voting timestamps is unsuitable could reveal how individuals voted). The goal is to add as many defences as possible to make any tampering traceable and discourage any potential attackers. |
Ahhh okay, I didn't realise the list of who actually voted was published as well, that explains the note about this system not being great for say LGBT officer by-elections. Thanks so much for the detailed explanation :) |
Hi, I see that you are updating who has access to creating votes per organisation completely manually into YAML files. Is the idea that you need to be contacted to handover permission? It is not entirely clear what the long-term strategy of this is if the current maintainers become disinterested.
The text was updated successfully, but these errors were encountered: