On Monday 20 December 2010 07:58 PM, Eugen Leitl wrote:
People who design such systems can attack them. And do it so cleverly, you won't realize until the entire vote is stolen. And you won't even be able to prove it's been stolen.
Eugen, can you imagine a system that is vulnerable to (undetectable) attack, but because of (external, non-software) processes in place, is such that all that the attack can succeed in doing is screwing with the system rather than favouring a particular candidate or another?
- Pranesh
signature.asc
Description: OpenPGP digital signature
