Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Voting System Proposal
ZPRC ^ | 12/05/2020 | Zeugma

Posted on 12/05/2020 9:13:41 PM PST by zeugma

Voting System Proposal

The recent Presidential election has brought up a lot of issues surrounding voting and the tallying of these votes. After thinking about it a bit, I figured I'd write up what I think would be a proposal for a way to have voting and vote tabulating systems that would be verifiable, open, and transparent.

  1. All voters shall be positively identified via standard state or national ID, i.e., drivers licenses, state ID cards, military ID, or passport). Each positively identified individual shall be logged both locally and reported immediately to a centralized location to combat fraud. This list of individuals will be consulted to validate any mail in ballots. Mail in voting shall be restricted to military or expatriate individuals. If you want to vote, show up.

  2. All actual ballots shall be paper. They shall be human readable, and also able to be processed easily by machines for tabulation.

  3. Ballots shall be printed on demand via laser printers at leach polling location. The only thing that should be necessary at the polling places is toner and paper.

  4. All ballot printing devices shall be identical to the maximum degree possible. The computer used to produce ballots shall have no local hard drive, and shall be booted from read-only media such as CD-ROM or DVD. Information about ballots that will be used to print them shall be contained in XML or CSV format that is human-readable and verifiable. All config files shall have a cryptographic hash that can be verified and validated by any concerned party. (See PRINTING below.)

  5. All tabulating systems shall be identical to the maximum degree possible. All software on the tabulating systems should be open source, so that they can be validated by any organization that cares to do so.

  6. Tabulating systems would be booted from read-only media such as CD-ROM or DVD

  7. Tabulating systems should have no local storage, except for removable media, such as SD cards, which will be individually numbered. Micro-SD cards are too small to be individually numbered, so they should not be used.

  8. Each SD cards would initially be identical, and verifiability so. All configuration files shall have a cryptographic hash that can be validated both before and after the election. Each configuration file would be human readable, as either XML or CSV data.

  9. Upon the conclusion of all voting, a copy shall be made of each SD card used by any printing and/or tabulating device. (see IMAGING below). Once this copy is made, all cards shall be sealed in a tamper-evident enclosure. A copy of the results of each cryptographic hash and actual disk images shall be provided to any interested party. A copy of each of these should also be provided to each candidate listed on the ballot if requested.


 

Printing

As mentioned above, there will be no pre-printed ballots. This prevents issues arising of not having enough ballots at a particular location. A given polling location might want to use touchscreens. That is OK, but the ballots produced by these touchscreen devices must be human-readable. Ideally, the only difference between a touchscreen ballot and a standard paper ballot would be that all of the squares or boxes used to indicate a voter's preferences would be filled in by the printer as it is produced.

The individual choices available on the ballot will be determined when the voter presents his ID. If a touchscreen is used, the voter will be handed a slip of paper that will contain whatever information is necessary to display/print the correct ballot. In those locations using strictly a paper system the printed ballot given to the voter would be generated in a similar manner.

I live in Texas, so I am going to use the information found on my voters registration card as an example. My address indicates exatly which races/districts and whatnot are appropriate for me. Here's the information I get on my card (None of the numbers are actually the numbers on my personal card):

Voter number:1234567890
GenderM
Valid from01/01/2020
Valid Through12/31/2021
Year of Birth1968
  
Prec. No4112-01
CONG020
St. Sen011
St. Rep050
Comm003
JP/Con016
City032
City Ward000
St. Edu12
QR Code

Using the data from the above table, the exact proper ballot can be printed. This information should be printed on the ballot in both human readable and an easily verifiable machine readable format (such as a QR Code, which can be read by almost any cellphone.) The voter number would not be printed on the ballot (else you'd be able to correlate a particular voter to a particular ballot) Perhaps a random unique string could be used and logged so as to facilitate forensics, as long as the number could not be associated with an individual voter. If the number printed on the ballot is not in the logs, it would be an invalid vote. Only the information above starting with "Prec. No" would be used along with that unique random number. One way to keep from being able to do this would be to have a stack of 10 or so identical ballots. The voter would pick randomly from the stack, and another blank for that precinct added to the stack. Once all voting is completed. Each unused ballot in the stack would be marked as spoiled (which would be a checkbox on the ballot) and either placed aside, or fed into the counting machine as a spoiled, null, ballot. Thus a log entry for every valid and invalid votes would be maintained.

I'm tempted to say that there should also be a QR Code image of the information on the ballot, but that would tempt someone who might be interested in bribing folks to vote a certain way, because the person paying for the vote could actually validate what was voted. This is something that has to be considered in any voting system. Of course, these days it's also possible for the voter to take a picture of his vote given that just about every phone on the planet has a camera built in, so maybe that might be less of a concern than it might have been in the past. I would lean against it in any case.


 

Imaging

As mentioned above, the only thing in the Printing / Tabulating systems that can be written to are removable media such as SD cards. One thing that those interested in the integrity of the vote would be interested in would be a verifiable way to obtain copies of all data relevant to the vote. The following is a method that might be useful to generate such documentation.

All hardware would be designed in such a way that a given device can be used at any polling location. The information printed or displayed to the voter would be based on config files contained on the removable media, which for our purposes at the moment, we'll assume are SD cards. I'm also going to focus below primarily on cards utilized for tabulation purposes. Those used for printing ballots would all be identical. Using the same methods below, this could be trivially validated.

With observers present. The procedure below will create a validated image of the card that can be saved, and provided to anyone who wants to look at it from a forensics or data perspective.

All of the following can be performed from just about any Unix/Linux computer, and is completely read-only on the card itself. At no point is the card even mounted for writing. In the following, lines that start with "###" are my comments explaining what is being done. Lines that start with "$" are the actual commands being issued.

### First, create an empty directory
$ mkdir votecards

### change to that directory $ cd votecards/

### verify the directory is empty $ ls -l total 0

### Without mounting the card, create an image of it on the local hard disk $ sudo dd if=/dev/sdd1 of=card0001.img 246175+0 records in 246175+0 records out 126041600 bytes (126 MB, 120 MiB) copied, 16.2103 s, 7.8 MB/s

### verify that the image file exists. $ ls -l total 123092 -rw-r--r-- 1 root root 126041600 Dec 5 19:49 card0001.img

### Get a cryptographic hash of the image. Have all observers write this hash down. $ sha256sum card0001.img 6f4624afb94125a4ca0ac0c3a1cde7b4e9566f5de89f26eb1125d2977b44cf08 card0001.img

### Do the same thing, except this time dump the results into a file. $ sha256sum card0001.img >> card0001.img.sha256sum.txt

### Validate the contents of the hash file. Observers can compare against written value. ### If the number above and the number below do not match, something is wrong. $ cat card0001.img.sha256sum.txt 6f4624afb94125a4ca0ac0c3a1cde7b4e9566f5de89f26eb1125d2977b44cf08 card0001.img

### Mount the image file $ sudo mount -o loop card0001.img /mnt

### Check contents of the mounted filesystem $ ls -lR /mnt /mnt: total 6 drwxr-xr-x 2 root root 2048 Dec 5 17:23 config drwxr-xr-x 2 root root 2048 Dec 5 17:14 logs drwxr-xr-x 2 root root 2048 Dec 5 17:13 votedata

/mnt/config: total 14 -rwxr-xr-x 1 root root 73 Dec 5 17:21 precinct-001.cfg -rwxr-xr-x 1 root root 73 Dec 5 17:21 precinct-002.cfg -rwxr-xr-x 1 root root 73 Dec 5 17:21 precinct-003.cfg -rwxr-xr-x 1 root root 73 Dec 5 17:21 precinct-004.cfg -rwxr-xr-x 1 root root 73 Dec 5 17:21 precinct-005.cfg -rwxr-xr-x 1 root root 73 Dec 5 17:22 precinct.cfg -rwxr-xr-x 1 root root 494 Dec 5 17:23 precinct.sha256.txt

/mnt/logs: total 2 -rwxr-xr-x 1 root root 84 Dec 5 17:14 logfile.01.txt

/mnt/votedata: total 2 -rwxr-xr-x 1 root root 82 Dec 5 17:13 votes.txt

### Get a cryptographic hash of each individual file. Write these down or take screen shot. ### Note, piping the output through sort will make sure all files are displayed in the same ### order each time. $ find /mnt -type f -exec sha256sum {} \; | sort -k2 4511277a6fd1f513ef6448e7b89e554aa155351960501c69f050b77434aac0c5 /mnt/config/precinct-001.cfg 0e940e44a02c22217af9f40eab2f55c1bb763a85baf84f7c78068ab9a95d8e87 /mnt/config/precinct-002.cfg f87612e4c850324a3dd7999d1b48078a154d35319989c304d8681c7b64a0d953 /mnt/config/precinct-003.cfg eb7b5c0bba630a60abba2919543fb4374b0d392f6aa9fd2de0fa6deb93035321 /mnt/config/precinct-004.cfg 5b6eb9e719edb9b53675cec35a19fcc0d68c012e068a47ded4f141cab25b790e /mnt/config/precinct-005.cfg 0e940e44a02c22217af9f40eab2f55c1bb763a85baf84f7c78068ab9a95d8e87 /mnt/config/precinct.cfg b940d2ae1447984dd41285a63b056270ff2f1b5df32525944c7ad95cbfb384a9 /mnt/config/precinct.sha256.txt a9b71823d534f6f7dcb04af1f4975057d4045b27c1e795e828b513790afae881 /mnt/logs/logfile.01.txt acb1018d99ec642ffcc006b2885f9bc5ff0ef70ce4b3f070d3b9ac3c8d1ef9f5 /mnt/votedata/votes.txt

### Get cryptographic hash of each individual file, and store it in a file. $ find /mnt -type f -exec sha256sum {} \; | sort -k2 > card0001.files.sha256sum.txt

### Check contents of file hashes. Make sure the contents of the file matches ### the written hashes or screenshot. $ cat card0001.files.sha256sum.txt 4511277a6fd1f513ef6448e7b89e554aa155351960501c69f050b77434aac0c5 /mnt/config/precinct-001.cfg 0e940e44a02c22217af9f40eab2f55c1bb763a85baf84f7c78068ab9a95d8e87 /mnt/config/precinct-002.cfg f87612e4c850324a3dd7999d1b48078a154d35319989c304d8681c7b64a0d953 /mnt/config/precinct-003.cfg eb7b5c0bba630a60abba2919543fb4374b0d392f6aa9fd2de0fa6deb93035321 /mnt/config/precinct-004.cfg 5b6eb9e719edb9b53675cec35a19fcc0d68c012e068a47ded4f141cab25b790e /mnt/config/precinct-005.cfg 0e940e44a02c22217af9f40eab2f55c1bb763a85baf84f7c78068ab9a95d8e87 /mnt/config/precinct.cfg b940d2ae1447984dd41285a63b056270ff2f1b5df32525944c7ad95cbfb384a9 /mnt/config/precinct.sha256.txt a9b71823d534f6f7dcb04af1f4975057d4045b27c1e795e828b513790afae881 /mnt/logs/logfile.01.txt acb1018d99ec642ffcc006b2885f9bc5ff0ef70ce4b3f070d3b9ac3c8d1ef9f5 /mnt/votedata/votes.txt

### Pro Tip: ### Rather than staring at that huge mass of random characters, pipe the entire ### output through sha256sum so that only one line of output prints. If the two lines ### below are the same, then the data is the same in both raw output and the file. $ find /mnt -type f -exec sha256sum {} \; | sort -k2 | sha256sum 85aee5b269910bcf47bf9096a136e8cc80722142826e40cd99cfea5c1d4e41fa -

$ sha256sum card0001.files.sha256sum.txt 85aee5b269910bcf47bf9096a136e8cc80722142826e40cd99cfea5c1d4e41fa card0001.files.sha256sum.txt

### Unmount the image file

$ sudo umount /mnt

### take a look at the files that now exist in the directory. $ ls -l total 123100 -rw-rw-r-- 1 amp amp 845 Dec 5 19:59 card0001.files.sha256sum.txt -rw-r--r-- 1 root root 126041600 Dec 5 19:57 card0001.img -rw-rw-r-- 1 amp amp 79 Dec 5 19:51 card0001.img.sha256sum.txt

See the section below about cryptographic hashes for more detail why the above hashes are so incredibly useful.

Once all of the above is complete on each card, the originals should be sealed until the all of the legal issues have been dealt with. The state can by a new stack of fresh cards/drives or whatever to use in the upcoming election.

Any competent Unix/Linux nerd can validate the above procedure. The disk images can be provided to any person or organization that would like to take a look at them. One of the cool things about using the 'dd' command to image the cards is that it actually provides a byte-for-byte copy of the card itself. There are tools you can use to see deleted files and other information on the card. It does not just copy the files/directories of the file, but is actually an exact image of the card itself.

Anyone can validate after that point that the hashes match. The hash data should be publicly published so that anyone can look at it. In fact, I would strongly argue that the individual images should also be make publicly available. The computer used to generate all of this data can be a completely stand-alone box that has no network connection, and for the truly paranoid, could be installed from validated media immediately before this imaging process is initiated.


 

Cryptographic Hashes

A Cryptographic Hash is a strong one-way function that can be used to validate that specified data has not been altered. Wikipedia has a pretty good article about it, that explains it in much better detail than I can. However, the following is an attempt at explaining it in general terms that hopefully is understandable by most folk.

A 'cryptographic hash' is a humnan-readable string of hexidecimal digits. The number of digits is dependant upon the type of hash being used. In the examples below, I'm using a program called 'sha256sum' that will take any data input and reduce it to a 64 character string. This string will be unique for any input. It is theoretically possible for two different files to create the same hash, but the likelyhood of this happening by chance is really astronomical. Picture yourself standing on one of Jupiter's moons, and hitting a golfball that flies across the almost unimaginable distance to Earth, and lands directly in the cup on the first hole of your favorite golf course. It's roughly the same likelihood. One of the cool things about a hash of this type is that it is completely independent of the amount of data that is fed into it. No matter how big the file is, you always get exactly 64 characters as output. It can be easily written down, or otherwise saved, and then used as a comparison at a later date.

Here's a quick example of using a hash to see if a file has been altered...

The following is something that you can do using just about any standard Linux or Unix computer. I am pretty sure the tools also exist for MS-Windows, but I do not believe they are standard tools. In the following, the lines that start with '##' are my comments about what is being done. The lines that start with '$' are the actual commands being executed.

## The following is the original file. It is the Project Gutenberg version of 
## the King James version of the bible.
$ ls -l
total 4844
-rw-r--r-- 1 amp amp 4959549 Nov 28 20:30 The_Bible-KJV.txt

## This is the hash generated via the 'sha256' program. $ sha256sum The_Bible-KJV.txt 6d1c5625cad6b6f619bd8b5cb5e77ea20dcf052082743f27bc8c8be2fb7e8a55 The_Bible-KJV.txt

## Now I make a copy of that file. $ cp The_Bible-KJV.txt The_Bible-KJVa.txt

## I check the hash of both files, and they show as being identical $ sha256sum The_Bible-KJV.txt The_Bible-KJVa.txt 6d1c5625cad6b6f619bd8b5cb5e77ea20dcf052082743f27bc8c8be2fb7e8a55 The_Bible-KJV.txt 6d1c5625cad6b6f619bd8b5cb5e77ea20dcf052082743f27bc8c8be2fb7e8a55 The_Bible-KJVa.txt

## I edit the copy... $ vi The_Bible-KJVa.txt

## The following is a listing of the first 3 lines of each file. ## Note only difference is the first line starts with "T" in the first ## and "t" in the second. $ head -3 The_Bible-KJV.txt *This King James' Bible is the SECOND Project Gutenberg Version* This 10th edition should be labeled biblea10.txt or biblea10.zip ****This edition is being officially released on Easter 1992****

$ head -3 The_Bible-KJVa.txt *this King James' Bible is the SECOND Project Gutenberg Version* This 10th edition should be labeled biblea10.txt or biblea10.zip ****This edition is being officially released on Easter 1992****

## Now, lets check the hash again... $ sha256sum The_Bible-KJV.txt The_Bible-KJVa.txt 6d1c5625cad6b6f619bd8b5cb5e77ea20dcf052082743f27bc8c8be2fb7e8a55 The_Bible-KJV.txt 2cedfa1ddd401af877a03c9f9e84f675c89f86a3474372b2e45b0e777dd88c21 The_Bible-KJVa.txt

## Note that even the tiniest of changes to the file generates a completely different hash. ## You'll also note below that the two files are still exactly the same size, yet ## produce much different output even if that difference is only a single character. $ ls -l -rw-r--r-- 1 amp amp 4959545 Nov 28 20:44 The_Bible-KJVa.txt -rw-r--r-- 1 amp amp 4959545 Nov 28 20:42 The_Bible-KJV.txt

None of the above is rocket science to anyone who knows anything about security. Not only can you generate a hash for each individual file on the card, but after doing so and saving the resulting list of hashes, you can hash that resulting file as well, so that if any individual file is changed that overall has will fail as well. You can print, save, email and otherwise disseminate these hashes so everyone involved will have confidence in the data.

I'd also note, that if I were setting up something to assist with validating election results, not only would you have strong cryptographic hashes of all data, but the files on the computer as well, such that any change made would be readily apparent. I'd also implement digital signatures using strong cryptographic functions like those available with the PGP or GPG encryption programs, but that is a much longer discussion for another day.


Bonus!
Nully's modest proposal to end voter and election fraud:

Of course, all this would only apply to Federal elections, for federal offices, as that is the legitimate concern of the federal government.

Let the states who have local authority use whatever system they wish to force the elections of their favorite sons and daughters to alderman, mayor or goobernor. They can do it the cheap way, by just following the federal rules for all voting, or they can have separate ballots for local and federal. Their call. It's a free country, ain't it?


TOPICS:
KEYWORDS: fetidvanity; goplayintraffic; ridiculosvanity; validation; votingmachines
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-92 next last
To: JustaTech
2 Factor Authentication

I think you mean PKI. Two factor authentication is not secure, nor convenient. You are forced to keep your phone with you and type crap from the phone into the computer. Meanwhile someone can port your phone number and pretend to be you.

The advantage to the voter would be the ability to retain a file showing their ballot choices, and the unique identifier of their ballot.

Illegal and not desirable. People could more easily sell their votes.

Each completed ballot in the database would have metadata showing its unique number/ID, the precinct associated with the voter account, a timestamp showing when it was uploaded,

Not good. Experts could figure out individual voter's votes from that info.

Other commercial and government databases would be periodically cross-checked against the database of online voter accounts, to identify and notify voters who moved without updating their accounts, became felons, or died. (Yes you should be notified if the system thinks you died, in case you didn’t) Voter accounts would expire after ten years unless the voter renews by making another in-person appearance.

Ten years is way too long. But the suggestions there are good. In fact that is what we need to do and is missing from the OP's article. Also third parties need to have the ability to cross check, from both parties. The data must not include people's votes, but all other registration info needs to be given to third parties who can cross check across jurisdictions, other databases, etc.

41 posted on 12/06/2020 6:01:46 AM PST by palmer (Democracy Dies Six Ways from Sunday)
[ Post Reply | Private Reply | To 26 | View Replies]

To: zeugma
Recent additions from a related thread, forgot to mention them last night, sorry.
To: glimmerman70
Was trying to give Covid fearing people a chance to vote from home.

Fair enough, vote by appointment, show up, get a non-contact temperature measurement, enter by the entrance only door, shove ID into a reader, wait for green light that indicates you actually are on the voter rolls, and have not voted, retrieve ID and wipe down with provided antiviral wipe, grab a pen from the clean pen jar, go to the freshly cleaned voting privacy booth, mark ballot, place pen in the to be cleaned jar, drop ballot into the box, dip finger into the disinfectant purple dye, leave by the separate designated exit.

30 posted on 12/5/2020, 9:15:57 AM by null and void (My President is a Person Of Color, Orange is a Color...)

To: null and void

Maybe better? Scan the ID, track against voter rolls, and voted already. Anyone not properly registered, or already voted, is arrested on the spot after they drop their ballot in the box. Otherwise, like a shoplifter arrested in the store claiming they they were going to pay, they could claim they weren’t actually going to vote.

This moves any fraud down to the level of single ballots, not full pallets of ballots.

Also, word gets around, and when Auntie Fah and Bea Al’em, don’t return to the stop-at-every-polling-place ‘No Malarky’ bus, that puts a serious crimp in the “normal” fraud process...

Oh, did I mention Election Day is a holiday? No judges available to set bail...

31 posted on 12/5/2020, 9:34:02 AM by null and void (My President is a Person Of Color, Orange is a Color...)

42 posted on 12/06/2020 6:08:02 AM PST by null and void (My President is a Person Of Color, Orange is a Color...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: zeugma

Thanks for the efforts. Looks good!


43 posted on 12/06/2020 6:09:04 AM PST by mo ("If you understand, no explanation is needed; if you don't understand, no explanation is possible)
[ Post Reply | Private Reply | To 1 | View Replies]

To: E. Pluribus Unum
We should adopt Mexico’s immigration and election policies.

Seriously.

Agreed!

I posted this on 10/28:

Mexico has voter ID cards required to vote, and when you vote, they punch a hole in your card to prevent multiple votes in the same election.

I don't know if you get a 10% discount after you've accumulated enough punched holes…

Of course, all this would only apply to Federal elections, for federal offices, as that is the legitimate concern of the federal government.

Let the states who have local authority use whatever system they wish to force the elections of their favorite sons and daughters to alderman, mayor or goobernor. They can do it the cheap way, by just following the federal rules for all voting, or they can have separate ballots for local and federal. Their call. It's a free country, ain't it?


44 posted on 12/06/2020 6:51:22 AM PST by null and void (My President is a Person Of Color, Orange is a Color...)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Adder; WildHighlander57
Abolish early voting

Why?

• With the exception of absentee ballots, end early voting. Every voter deserves and has a responsibility to know the latest information before they cast their ballots. H/T WildHighlander57

45 posted on 12/06/2020 7:05:41 AM PST by null and void (My President is a Person Of Color, Orange is a Color...)
[ Post Reply | Private Reply | To 38 | View Replies]

To: unlearner
So, unless there is first a reset, such as CW2/Revolution 2, then no such proposals will move forward due to gridlock and political polarization.

Ultimately that might be what is required to have honest elections.

I suspect CW2/Rev2 would ultimately cost less treasure and fewer lives than dishonest elections in a country run by dishonest, acquisitive, and craven politicians.

46 posted on 12/06/2020 7:19:42 AM PST by null and void (My President is a Person Of Color, Orange is a Color...)
[ Post Reply | Private Reply | To 35 | View Replies]

To: FreedomPoster

The Carter-Baker report needs some serious study, thanks for posting.


47 posted on 12/06/2020 7:30:00 AM PST by null and void (My President is a Person Of Color, Orange is a Color...)
[ Post Reply | Private Reply | To 24 | View Replies]

To: zeugma

What are ways to kill the machines like Dominion?

Accidental liquid spill?
Taser to a metal part?
Trip and fall into one, knocking it over?
Warehouse fire?

2022 and beyond should be like a Terminator movie. Destroy the machines.


48 posted on 12/06/2020 8:06:15 AM PST by Pollard (Bunch of curmudgeons)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

Referencing it, emphasis on Jimmy Carter, could be useful in persuading middle of the roaders.


49 posted on 12/06/2020 8:28:08 AM PST by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 47 | View Replies]

To: FreedomPoster
Referencing it, emphasis on Jimmy Carter, could be useful in persuading middle of the roaders.

I'll be darned, Carter might end up being good for something after all!

50 posted on 12/06/2020 8:31:20 AM PST by null and void (My President is a Person Of Color, Orange is a Color...)
[ Post Reply | Private Reply | To 49 | View Replies]

To: zeugma

No need for these (frankly) archaic digital methods and reliance on multiple levels of hardware - points of failure and fraud opportunity.

Abolish the secret ballot. A foreign concept imported into this country in 1890s, it’s the core problem that allows all the ‘decoupling’ of ID from ballot.

Make all the issues of revealing information about who voted for whom a matter of ‘HIPPA’ type privacy violations, with opportunity for these violations to be prosecutable.


51 posted on 12/06/2020 8:38:47 AM PST by larrytown
[ Post Reply | Private Reply | To 1 | View Replies]

To: larrytown
Abolish the secret ballot. A foreign concept imported into this country in 1890s, it’s the core problem that allows all the ‘decoupling’ of ID from ballot.

I'd have to say that I strongly disagree with this. One of the main strengths of the secret ballot is that it frustrates the concept of verifiability. If a criminal organization, like the democrat party pays Joe to vote. When Joe goes into the voting booth, he could very well vote a straight republican ticket, and no one would know.

It also makes it harder for organizations to target people after the fact because of how they voted. This particular thing has been happening in other ways all over 'social media' for the past several years. People are being hounded for posts that they made years ago that were not even controversial at the time, yet have been decreed by the left to be an anathema.

I don't want to encourage this kind of thing. I think you'll find little support for the concept of doing away with the secret ballot.

52 posted on 12/06/2020 11:05:07 AM PST by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 51 | View Replies]

To: palmer
I think you mean PKI

No, I mean 2FA. It could be done with Google Authenticator, being emailed a link to click, receiving a PIN via text message, or answering a security question.

People could more easily sell their votes.

That already happens, and the price is usually a couple packs of cigs or beer money. The street people who sell their votes are highly unlikely to go through the procedures to become online voters. They will be paper voters, if anything.

Experts could figure out individual voter's votes from that info.

How? The file connecting the ballet metadata to the voter would not be available to "experts" unless they show cause and obtain a court order for any inquiry.

53 posted on 12/06/2020 11:11:43 AM PST by JustaTech (A mind is a terrible thing)
[ Post Reply | Private Reply | To 41 | View Replies]

To: JustaTech
that is to say, their ballot, not their ballet dancing
54 posted on 12/06/2020 11:14:33 AM PST by JustaTech (A mind is a terrible thing)
[ Post Reply | Private Reply | To 53 | View Replies]

To: JustaTech
No, I mean 2FA. It could be done with Google Authenticator, being emailed a link to click, receiving a PIN via text message, or answering a security question.

Those are all insecure. Many security questions were made insecure by China's hack of OPM clearance data which gave them a wealth of previous addresses, cities of birth, mother's maiden name, etc. Being emailed a link is meaningless. I can create an email account in two seconds, pretend to be you, then "verify" I am you with that email. Text messages are a PITA and not secure either. I can ask a phone company to port your number to my phone. Your phone company may stop that from happening but in some cases I can call them and pretend to be you and authorize the switch.

The file connecting the ballet metadata to the voter would not be available to "experts" unless they show cause

I didn't expect that. The unique ID on each ballot can be done securely if it is long enough and random enough. Many mail-in ballots are not. They have a code that's not much longer than the number of residents in the county and even assigned randomly they can figured out through process of elimination.

55 posted on 12/06/2020 11:32:19 AM PST by palmer (Democracy Dies Six Ways from Sunday)
[ Post Reply | Private Reply | To 53 | View Replies]

To: JustaTech

More on “selling votes” via the online system I propose: The arrangement I propose would actually make it child’s play to defraud a vote buyer.

The ballot image retained by the online voter would be exactly the same as the image you would obtain by downloading a ballot image from the published list. Exactly the same. Therefore a vote buyer would have no way of knowing if the image you provide is yours or one you simply downloaded. The published list would be populated in real-time as ballots come in, so you would be able to download a matching ballot image as quickly as you could actually vote and generate your own. Buying votes from online voters would be begging to be screwed.


56 posted on 12/06/2020 11:43:06 AM PST by JustaTech (A mind is a terrible thing)
[ Post Reply | Private Reply | To 53 | View Replies]

To: palmer
Those are all insecure.

Bullshit. 2FA is secure enough for online banking, for access to HIPPA, and for my brokerage and cryto-exchange accounts. How much effort do you think some nefarious entity is willing to expend to gain access to ONE vote?

Being emailed a link is meaningless. I can create an email account in two seconds, pretend to be you, then "verify" I am you with that email.

No, you can't. The email address would be part of the information you provide when appearing in person at a government office to set up or renew your voter account. Changing your email address would have be done while logged in to your account. This is the normal way of doing business online, and it's more than good enough to secure ONE vote.

57 posted on 12/06/2020 11:55:59 AM PST by JustaTech (A mind is a terrible thing)
[ Post Reply | Private Reply | To 55 | View Replies]

To: palmer
Those tech solutions for voting itself are nice but you missed the main problem that needs to solved: voter registration. One of the keys to solving that is better data sharing among jurisdictions and third parties. It's usually just third parties who find out, through very cumbersome research, that people are registered in multiple jurisdictions, are ineligible, are dead, etc.

Absolutely. Registration and validation are a huge part of the problem. I'm a nerd. I'm primarily concerned about the mechanics of how one accurately and transparently tracks valid votes. Making sure that an individual is a valid voter is another whole ball of wax.

Some of that is actually covered on my site at the end of the documents which replicates Nully's voter validation requirements.

One of our biggest problems with voting in this country is that everything is managed individually by the states. Personally, I think that this is as it should be, but there are no standards, and many jurisdictions are actively attempting to maximize fraud, or at least the ability for fraud to occur.

There ought to be national baseline standards for how to validate voters in national elections. That means strong ID requirements. It also means that there must be cooperation amongst the states to make sure that voters only vote in one state. Folk who register in one state should automatically be deregistered to vote in their previous state. Death records should be immediately forwarded to voter registration agencies. Illegal voting should have real punishment, and be swift and sure. I'd support extraordinary penalties for fraud, as every illegal vote disenfranchises a legitimate voter.

Again, this proposal is mostly concerned with mechanics of validation, to make sure that once a voter has been determined (through whatever means) to be eligible, that the casting and recording/tabulation of the vote is as transparent and easily validated.

58 posted on 12/06/2020 12:16:23 PM PST by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 39 | View Replies]

To: 9YearLurker
Plain, old-fashioned hand and paper counts and tallies with plenty of locals observing is the way to go.

None of this precludes hand counting. In fact, I'd strongly recommend random spot checks where hand counts are compared against machine tallys.

One thing I didn't mention, which I'm probably going to be adding to the document is the initial validation steps. As designed, it would be trivial to boot up the computer, and have the initial values validated against a printed or electronic document that would demonstrate that the card was virgin, and in it's initial state. It would, as a part of its boot process display those values, and any observer would be able to see what the initial state of the machine was. A similar screen would be displayed, stored and possibly printed when the voting is over. This would be the initial indication of the machine state.

59 posted on 12/06/2020 12:36:16 PM PST by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: poconopundit
Bottom line: people in the election protection business (our Secretaries of State and Governors) need to pay a high price in reputational damage and even jail time for failure to ensure the integrity of our voting system.

Absolutely agreed. Penalties for gaming and defrauding the system must be great enough to discourage those wanting to do so.

A technical solution alone is great, but it must be backed up with a strong human responsibility and skin-in-the-game approach.

Also agreed. My purpose in writing this up is to demonstrate a possible technical solution to how to gain and enforce confidence in the system. I figure a lot of folks at individual polling locations might not understand why the number strings must match. However I think they can be convinced that to maintain integrity, they must match, for whatever reason.

60 posted on 12/06/2020 12:41:24 PM PST by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 32 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-92 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson