Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, it was just a tour over the most common flawed arguments in favor of e-vote. I just got tired and stopped somewhere (you can see I got a bit into secure protocols instead of secure programs).

Last time I checked the protocols had several drawbacks (including the "destruction" problem, vulnerable to collusion, etc.) Maybe I missed good protocols? Could you please point me to good papers? (a video is too slow and hard to skim over).

Thanks! I'll check the video ASAP and report back if I have questions!



I don't know enough to point you at good protocols. The video covers basically all I know, and it's five years old.

I mainly commented to remind people that computer voting systems don't have to be glorified counters. You can actually use their strengths (crypto), instead of only inheriting their weaknesses (malleability).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: