- petrescatraian ( @petrescatraian@libranet.de ) 14•1 year ago
@Penguincoder I have no degree in Computer Science. I graduated International Relations. However I am still really passionate about FOSS due to the way it brings real world democracy into technology.
While there are some places in which technology has no place (particularly voting), I believe that technology can help our societies become more open, transparent, involving and better functioning.
- GreyBeard ( @greybeard@lemmy.one ) 6•1 year ago
There’s nothing wrong with using technology in voting, it just has to be done in an open, verifiable way.
- megopie ( @megopie@beehaw.org ) 8•1 year ago
The problem is how difficult it is to ensure it is open and verifiable. Not to mention how much easier it is to scale up attacks on digital voting systems.
If I want to forge enough paper ballets to swing an election I’m going to need a few hundred people in on it, with a group that large, someone is going to squeal, or get caught doing something dumb and uncover the conspiracy, if I want to forge digital ballots, well, I just need one person with know how and the right exploit.
It is certainly possible to make a digital voting system that is immutable once the votes are submitted, it is nearly impossible to make one that ensures that the votes being submitted are legitimate.
It’s a lot of effort and increased risk to roll out an acceptable electronic voting system, it is much easier and safer to just keep using paper ballots.
- smileyhead ( @smileyhead@discuss.tchncs.de ) 3•1 year ago
For voting where it can be seem who voted on who, this can be and was done.
But don’t even try to touch voting where everyone has to have exaclly one secret vote. There is no way to do it currently and math is debating if it’s even possible with computers.
More on that topic: https://www.youtube.com/watch?v=LkH2r-sNjQs
use 3 different open source voting systems. at the same time.
problem solved.
there is no way one exploit can be used at 3 different pieces of software.
- smollittlefrog ( @smollittlefrog@lemdro.id ) English2•1 year ago
All 3 systems use openssl and get attacked using Heartbleed.
(And even if they don’t reuse even a single piece of code, attackers can still just use multiple exploits.)
yes but 3 different exploits would result in different results. which is an indication that the voting result is irrelevant, and should be repeated
edit: I am by far no expert, yet having anykind of kniwledge in that area, so I apologize for naivity in advance.
Uhhhhhh… Doesn’t need to use the same exploit for each piece of software.
- Kissaki ( @Kissaki@feddit.de ) English6•1 year ago
https://en.wikipedia.org/wiki/Liquid_democracy
Pirate parties were already using it in practice.
- flatbield ( @furrowsofar@beehaw.org ) English1•1 year ago
Just no. I want to elect people to take care of these issues. On the other hand, I absolutely want a more open process. This includes IRV or a similar better system for choosing between options. Some sort of proportional representation would be useful too. It also includes local and national media that actually spends time looking at what is going on. So for the article, +1 on openness, but just no more tech to use time I do not have.