Re: [OVC-discuss] Fwd: [election] VIDEO: SANTA BARBARA Computer Security Group Shows How to Hack Voting Machines and Defeat Post-Election Audits

From: John-Paul Gignac <jjgignac_at_fossfactory_dot_org>
Date: Wed Sep 10 2008 - 19:06:03 CDT

It might be worth contacting the group at UCSB to ask them to analyze
OVC's system.

I believe that OVC's system would prevent each of the attacks
described in the video with the exception of attack #2. That is, the
*trusting* voter who doesn't bother to read the printed ballot. In
this case, the attack would have a lower chance of success, since the
voter must hold the ballot in his/her hand and drop it into the ballot
box.

As for the fleeing voter scenarios, I'm assuming that OVC's system
would not count the votes of fleeing voters. Please correct me if I'm
mistaken.

John-Paul

On Wed, Sep 10, 2008 at 4:23 PM, Edward Cherlin <echerlin@gmail.com> wrote:
> I assume that these methods of fraud do not apply to our printed
> ballots, since we have various extra audit capabilities that do not
> apply to DREs with "voter-verifiable printed records". But we should
> say so publicly, and explain.
_______________________________________________
OVC-discuss mailing list
OVC-discuss@listman.sonic.net
http://lists.sonic.net/mailman/listinfo/ovc-discuss
By sending email to the OVC-discuss list, you thereby agree to release the content of your posts to the Public Domain--with the exception of copyrighted material quoted according to fair use, including publicly archiving at http://gnosis.python-hosting.com/voting-project/
==================================================================
= The content of this message, with the exception of any external
= quotations under fair use, are released to the Public Domain
==================================================================
Received on Tue Sep 30 23:17:02 2008

This archive was generated by hypermail 2.1.8 : Tue Sep 30 2008 - 23:17:02 CDT