1. authenticate incoming SMS?
a. have a pre-registration of all those who want to send SMS messages, and text back them back an MD5/SHA1/whatever hash computed from their registration info. Tell them to include the hash whenever they want to send back information. Do some random sampling of those pre-registered persons to make sure they are not working for some political party. Do all this before the actual elections.
b. display the actual cell number together with the value they texted. So if someone in the precinct notices that the numbers don't match, they can send back the correct information and probably make a very angry call to the person who texted the wrong data. This will work even if there is no pre-registration
2. check / audit the messages sent to received?
(ie. lost in transmission)
a. item 1.b above would work with this regard. If you don't see the info in the website, then re-send the message. The system can use the timestamp of the messages sort out the latest information.
3. handle large number of incoming messages?
I would believe as the SMS capital of the world our service providers and TXT Promo software companies have a lot of experience on this. But here are some alternatives I suggest: If the text message can't get through, then
a. call up a hotline where the count can be entered by someone in front of a computer. (Think call-center....). The number doesn't have to be in the Phils.
b. Enter the number yourself via on a secure web-portal. Of course this means some means of authentication,
Ambo
Ariz Jacinto <[EMAIL PROTECTED]> wrote:
*oops. the questions are for mr. verzola.On 9/17/06, Ariz Jacinto <[EMAIL PROTECTED]> wrote:if i may ask, how are you planning to:
1. authenticate incoming SMS?
2. check / audit the messages sent to received?
(ie. lost in transmission)
3. handle large number of incoming messages?
On 9/17/06, John Peter Loh <[EMAIL PROTECTED] > wrote:What's wrong with making the source available to cheats? It's not like they're going to change the code. How can transparency be delivered if the code is not even publicly available. Who knows? Maybe there's a man-in-the-middle vulnerability during the SMS transmission of the messages. Or some hocus pocus mght be happening during the tally. There is barely a guarantee that it is transparent. It's not that hard to generate fake data and simulate it as if it was happening real time. By the time the source is available, the show will be over.
Just my opinion.
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph
Talk is cheap. Use Yahoo! Messenger to make PC-to-Phone calls. Great rates starting at 1ยข/min.
_________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Read the Guidelines: http://linux.org.ph/lists Searchable Archives: http://archives.free.net.ph

