{"id":105,"date":"2008-02-05T00:21:36","date_gmt":"2008-02-05T08:21:36","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/05\/electronic-voting-how-about-opensource\/"},"modified":"2008-02-05T00:21:36","modified_gmt":"2008-02-05T08:21:36","slug":"electronic-voting-how-about-opensource","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/05\/electronic-voting-how-about-opensource\/","title":{"rendered":"Electronic voting?: How about OpenSource?"},"content":{"rendered":"<p>A recent article posted on slashdot (http:\/\/slashdot.org\/article.pl?sid=08\/02\/03\/173241) talks about the possibility of software on electronic voting machines being open source. One claimed benefit is that open source will provide transparency and lessen the distrust that the public have for e-voting. But the article concludes that as of now there is no person or group working on it.<br \/>\n<!--more--><\/p>\n<h3>Main points<\/h3>\n<h4>Lack of Voting Standard<\/h4>\n<p>The US is plagued with a massively different voting standards due to the freedom individual states have in implementing their preferred method.\u00a0 This lack of standard provides a plethora of different types of voting machines, each with their own security flaws.\u00a0 It also causes a problem for trying to develop open source code for these machines.<\/p>\n<h4>Paper versus Electronic<\/h4>\n<p>Many opponents of electronic voting fail to take into account how insecure paper ballots can be.\u00a0 Ballot boxes can go missing, mechanical methods can fail, and other problems which even plague electronic voting such as corrupt poll workers.<\/p>\n<p>But even electronic voting has it&#8217;s problems, especially the way some current generation machines store and tabulate their votes, many of which we talked about in class.<\/p>\n<p>These problems lead many people to distrust e-voting machines.\u00a0 There are fears that &#8220;a single programmer could &#8216;rig&#8217; a major election.&#8221;\u00a0 It could be because you take two things which people don&#8217;t trust, politics and technology, and you get something people distrust twice as much.<\/p>\n<h4>Open Source Saves the Day<\/h4>\n<p>By making the software open source, you provide peer review, transparency, and if you&#8217;re a fan of open source, basically ultimate zen.<\/p>\n<h4>Well not quite&#8230;<\/h4>\n<p>The main thing is that none of the voting machine makers have revealed what their proprietary code looks like.\u00a0 Another massive problem is there hasn&#8217;t been any funding for such a project, so there has not been any large group forming to develop code for these closed source machine.<\/p>\n<p>But things might change in the future if federal and state election organizations standardize voting machines.\u00a0 So who knows?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent article posted on slashdot (http:\/\/slashdot.org\/article.pl?sid=08\/02\/03\/173241) talks about the possibility of software on electronic voting machines being open source. One claimed benefit is that open source will provide transparency and lessen the distrust that the public have for e-voting. &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/05\/electronic-voting-how-about-opensource\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":33,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-105","post","type-post","status-publish","format-standard","hentry","category-current-events"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}