Re: Re: Trusted Persons

From: Ron Crane <voting_at_lastland_dot_net>
Date: Fri Apr 08 2005 - 20:17:02 CDT

> TROJAN HORSE: Refers to the existence of hidden content within a system
> or its software.  Such content is frequently associated with the
> execution of undocumented or surreptitious functions.  In a voting
> context, it is a piece of software intended (a) to alter, or to permit
> the alteration of, the outcome of any election; or (b) to release, or
> to
> permit the release of, non-public data concerning an election to a
> person not authorized to receive it. A Trojan Horse may alter the
> outcome of an election by modifying the presentation of information to
> the voter; by changing, adding, or deleting votes; by making it
> difficult or impossible to vote; or by any other means tending to
> achieve the desired outcome. A Trojan Horse may release non-public
> information concerning an election via networks, wireless devices,
> encoded printouts, or otherwise. See also Covert Channel, Security
> Analysis.
> Association: Security

I suggest combining the first two sentences into: "Hidden content
within a system or its software, usually associated with the execution
of undocumented or surreptitious functions." Also, I think "usually"
better reflects the state of the world than "frequently".

See also my most recent take on "Trusted Entity/Person", just posted.

-Ron

_______________________________________________
OVC discuss mailing lists
Send requests to subscribe or unsubscribe to arthur@openvotingconsortium.org
==================================================================
= The content of this message, with the exception of any external
= quotations under fair use, are released to the Public Domain
==================================================================
Received on Sat Apr 30 23:17:04 2005

This archive was generated by hypermail 2.1.8 : Sat Apr 30 2005 - 23:17:22 CDT