On 03/18/2016 09:07 PM, Jim Jagielski wrote:
> One thing that the previous STV code had was that if
> the code running the election itself was changed, it
> invalidated the running election. This was to prevent
> someone from changing the software (say, by silently
> dropping 'AC' from the counts) during the election
> in order to change the election.

But couldn't that in itself be circumvented by overriding that check?

> 
> Again, there is some limit to how much we can really
> do things: even the previous could be circumvented if
> one was root after all. But it Good to do what we can,
> imho.
> 

The current system revolves around the base assumption that whoever has
access as a 'vote admin' does not generally have access as a 'sys admin'
to the actual system on the machine (iow shell/disk access) and thus
can't change anything without the alarms going off (if you change
election data during an election, big red letters appear and you get
very afraid ;)).

Having said that, I'd love for us to work more on the credibility
aspects of this and especially document best-practice for people that
might not know how this is supposed to be set up. I don't know that we
can create a fully tamper-proof system, but we can try :)

With regards,
Daniel.

Reply via email to