My two cents worth.

Considering the technical difficulties in cheating nationally. We  
might finally realize the dream of clean and fair elections on the  
national level. Specially with PLUG on the job. Ehem ehem (plugging  
PLUG)

I'm afraid however that cheating will simply be done locally by  
sabotaging, destroying or simply invalidating the machines credibility  
by destroying the seals of the voting machines before, during or after  
the elections. Therefore forcing the local elections to be postponed  
or use a manual system again. If done nationally, halata. But if done  
locally, specially in isolated regions, they could simply blame the  
MILF or Abu's. (are the bombings recently a dry run to condition our  
minds to accept that bombings on election day are not totaly out of  
the question) In a tightly contested race whether local or national.  
This could be enough to win.

I harken back to SysAdmin 101: Secure the server physically first!  
Otherwise, all bets are off. Is the comelec putting up guidelines for  
physical protection of the server? Because from why I know, police and  
military men are not allowed within 100 meters of the precints for  
fear of intimidation tactics. Has this been revised? If not, are we  
arming the teachers then? (just kidding by the way). How do we protect  
the integrity of the machines?

I for one do not wish for all this technical planning and expertise go  
to waste because our corrupt politicians will simply force the use of  
manual systems because that is the system they know how to "hack".

Regards,
Danny Ching


On Jul 14, 2009, at 2:13 PM, Pablo Manalastas <[email protected]>  
wrote:

>
> My GPG 1.4.9 supports the following algorithms:
>
> Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
> Cipher: 3DES (S2), CAST5 (S3), BLOWFISH (S4), AES (S7), AES192 (S8),
>        AES256 (S9), TWOFISH (S10)
> Hash: MD5 (H1), SHA1 (H2), RIPEMD160 (H3), SHA256 (H8), SHA384 (H9),
>      SHA512 (H10), SHA224 (H11)
> Compression: Uncompressed (Z0), ZIP (Z1), ZLIB (Z2), BZIP2 (Z3)
>
> So GPG uses AES256 only for encryption/decryption, and not for  
> computing hashes.  I think SHA256 should work just fine.
>
> //PManalastas
>
>
> --- On Tue, 7/14/09, Ariz Jacinto <[email protected]> wrote:
>
>> From: Ariz Jacinto <[email protected]>
>
>> Hi Pablo,
>>
>> There's a problem with that suggestion since MD5[1] and
>> SHA1[2] are
>> both vulnerable to hash collisions[3]. Try AES-256 :-D
>>
>> [1] http://www.mscs.dal.ca/~selinger/md5collision/
>> [2] http://csrc.nist.gov/groups/ST/hash/statement.html
>> [3] http://en.wikipedia.org/wiki/Collision_%28computer_science%29
>> [4] http://www.schneier.com/blog/archives/2009/07/ 
>> new_attack_on_a.html
>>
>>
>>
>> 2009/7/13 Pablo Manalastas <[email protected]>:
>>> ....We can suggest to Comelec to compute SHA1 or MD5
>> checksums of the approved programs, and at election time,
>> the checksums can be recomputed (manually) and if the
>> original checksum and new checksum agree, then there is no
>> substitution.
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to