Like I said, there are true limits to what we can do, but that doesn't mean we don't do what we can.
> On Mar 18, 2016, at 4:15 PM, Daniel Gruno <humbed...@apache.org> wrote: > > On 03/18/2016 09:07 PM, Jim Jagielski wrote: >> One thing that the previous STV code had was that if >> the code running the election itself was changed, it >> invalidated the running election. This was to prevent >> someone from changing the software (say, by silently >> dropping 'AC' from the counts) during the election >> in order to change the election. > > But couldn't that in itself be circumvented by overriding that check? > >> >> Again, there is some limit to how much we can really >> do things: even the previous could be circumvented if >> one was root after all. But it Good to do what we can, >> imho. >> > > The current system revolves around the base assumption that whoever has > access as a 'vote admin' does not generally have access as a 'sys admin' > to the actual system on the machine (iow shell/disk access) and thus > can't change anything without the alarms going off (if you change > election data during an election, big red letters appear and you get > very afraid ;)). > > Having said that, I'd love for us to work more on the credibility > aspects of this and especially document best-practice for people that > might not know how this is supposed to be set up. I don't know that we > can create a fully tamper-proof system, but we can try :) > > With regards, > Daniel.