33
Comments (7)
sorted by:
1
deleted 1 point ago +1 / -0
1
the-new-style 1 point ago +1 / -0

Ring 0 used to be the privileged mode

Then came Ring -1

Then Ring -2, then Ring -3

See the work by Christopher Domas

DEF CON 26 - The Ring 0 Facade Awakening the Processors Inner Demons

Your computer is not yours. You may have shelled out thousands of dollars for it. It may be sitting right there on your desk. You may have carved your name deep into its side with a blowtorch and chisel. But it's still not yours. Some vendors are building secret processor registers into your system's hardware, only accessible by shadowy third parties with trusted keys. We as the end users are being intentionally locked out and left in the dark, unable to access the heart of our own processors, while select organizations are granted full control of the internals of our CPUs. In this talk, we'll demonstrate our work on how to probe for and unlock these previously invisible secret registers, to break into all-powerful features buried deep within the processor core, to finally take back our own computers.

1
spinometer 1 point ago +1 / -0

blockchain could actually help

BUT never give up the paper ballot

use blockchain to record and count paper ballots

think of votes like a crypocurrency. you would be able to see anyone's account and where their votes are going, but only you would know which account belongs to you

just need a way to make sure accounts map to voters correctly with no more and no less

1
the-new-style 1 point ago +1 / -0

blockchain could actually help

depends who's executing the hashes

aka. the 51% problem

2
spinometer 2 points ago +2 / -0

Yes, but the good news is it would be transparent, i.e. everyone would be able to see the bad actors doing it.

1
BunnyRabbit 1 point ago +1 / -0

When did XKCD go from "I'm with her" to "election fraud is a thing" ?